Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
main.exe

Overview

General Information

Sample name:main.exe
Analysis ID:1577508
MD5:935ddf8c175da8cb95fff0870e0718fc
SHA1:8c026153157f0b84e29080326bbbd1ea6d1ddcb6
SHA256:19ea2bfba48a832b1342fdb60e1d5686d47f3b788d3de162f6ff087a71ed96e4
Tags:18521511316185215113209bulletproofexeuser-abus3reports
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Found pyInstaller with non standard icon
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • main.exe (PID: 1080 cmdline: "C:\Users\user\Desktop\main.exe" MD5: 935DDF8C175DA8CB95FFF0870E0718FC)
    • main.exe (PID: 4368 cmdline: "C:\Users\user\Desktop\main.exe" MD5: 935DDF8C175DA8CB95FFF0870E0718FC)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: main.exeAvira: detected
Source: main.exeReversingLabs: Detection: 44%
Source: main.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
Source: C:\Users\user\Desktop\main.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI10802\msvcr90.dllJump to behavior
Source: unknownHTTPS traffic detected: 20.233.83.145:443 -> 192.168.2.6:49708 version: TLS 1.2
Source: Binary string: C:\build27\cpython\PCBuild\select.pdb source: main.exe, 00000000.00000003.2161442847.0000000002551000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr
Source: Binary string: msvcp90.i386.pdb source: main.exe, 00000000.00000003.2157220383.0000000002659000.00000004.00000020.00020000.00000000.sdmp, msvcp90.dll.0.dr
Source: Binary string: msvcr90.i386.pdb source: main.exe, 00000000.00000003.2156562438.0000000002657000.00000004.00000020.00020000.00000000.sdmp, msvcr90.dll.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\_hashlib.pdb source: main.exe, 00000000.00000003.2161232064.00000000026E8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2196089633.000000006D0E8000.00000002.00000001.01000000.00000005.sdmp, _hashlib.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\_socket.pdb source: main.exe, 00000000.00000003.2159823373.0000000002555000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2159535838.0000000002551000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2197056073.0000000074A97000.00000002.00000001.01000000.00000006.sdmp, _socket.pyd.0.dr
Source: Binary string: msvcm90.i386.pdb source: main.exe, 00000000.00000003.2157767880.0000000002560000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2157282027.0000000002551000.00000004.00000020.00020000.00000000.sdmp, msvcm90.dll.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\bz2.pdb% source: main.exe, 00000000.00000003.2159483968.0000000002561000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2159332778.0000000002551000.00000004.00000020.00020000.00000000.sdmp, bz2.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\_socket.pdbEi source: main.exe, 00000000.00000003.2159823373.0000000002555000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2159535838.0000000002551000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2197056073.0000000074A97000.00000002.00000001.01000000.00000006.sdmp, _socket.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\unicodedata.pdb source: main.exe, 00000000.00000003.2159130410.000000000265B000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\python27.pdb source: main.exe, 00000000.00000003.2158543447.0000000002782000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2196356518.000000006D28A000.00000002.00000001.01000000.00000004.sdmp, python27.dll.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\_ssl.pdb source: main.exe, 00000000.00000003.2160566596.0000000002701000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmp, _ssl.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\_hashlib.pdb%x source: main.exe, 00000000.00000003.2161232064.00000000026E8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2196089633.000000006D0E8000.00000002.00000001.01000000.00000005.sdmp, _hashlib.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\bz2.pdb source: main.exe, 00000000.00000003.2159483968.0000000002561000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2159332778.0000000002551000.00000004.00000020.00020000.00000000.sdmp, bz2.pyd.0.dr
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF99DC0 _errno,_errno,malloc,memset,malloc,free,_errno,FindFirstFileA,free,free,free,_errno,FindNextFileA,strncpy,_errno,2_2_6CF99DC0
Source: C:\Users\user\Desktop\main.exeCode function: 4x nop then movd mm0, dword ptr [edx]2_2_6CFA28B0
Source: Joe Sandbox ViewIP Address: 20.233.83.145 20.233.83.145
Source: Joe Sandbox ViewJA3 fingerprint: e0fe397a5edfba9a6facc7c7b341f4eb
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF983A0 WSASetLastError,recv,WSAGetLastError,2_2_6CF983A0
Source: global trafficHTTP traffic detected: GET /franklenzer/0101010101/raw/main/mpc.part01.rar HTTP/1.1Accept-Encoding: identityHost: github.comConnection: closeUser-Agent: Python-urllib/2.7
Source: global trafficDNS traffic detected: DNS query: github.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: GitHub.comDate: Wed, 18 Dec 2024 13:33:53 GMTContent-Type: text/html; charset=utf-8Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-WithCache-Control: no-cacheStrict-Transport-Security: max-age=31536000; includeSubdomains; preloadX-Frame-Options: denyX-Content-Type-Options: nosniffX-XSS-Protection: 0Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
Source: python27.dll.0.drString found in binary or memory: http://python.org/dev/peps/pep-0263/
Source: main.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tools.ietf.org/html/rfc6125#section-6.4.3
Source: main.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2195332778.000000000298E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.faqs.org/rfcs/rfc2822.html
Source: main.exe, 00000002.00000002.2195332778.000000000298E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.faqs.org/rfcs/rfc822.html
Source: main.exe, 00000002.00000002.2195332778.000000000298E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
Source: main.exe, main.exe, 00000002.00000002.2196089633.000000006D0E8000.00000002.00000001.01000000.00000005.sdmp, main.exe, 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmp, _ssl.pyd.0.dr, _hashlib.pyd.0.drString found in binary or memory: http://www.openssl.org/support/faq.html
Source: main.exe, 00000000.00000003.2161232064.00000000026E8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2160566596.0000000002701000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2196089633.000000006D0E8000.00000002.00000001.01000000.00000005.sdmp, main.exe, 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmp, _ssl.pyd.0.dr, _hashlib.pyd.0.drString found in binary or memory: http://www.openssl.org/support/faq.htmlC:
Source: main.exe, 00000002.00000002.2195332778.0000000002851000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.python.org/
Source: main.exe, 00000000.00000003.2159130410.00000000026C8000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.0.drString found in binary or memory: http://www.unicode.org/reports/tr44/tr44-4.html).
Source: main.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2195316484.0000000002750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/franklenzer/0101010101/raw/main/mpc.part01.rar
Source: main.exe, 00000002.00000002.2195332778.000000000298E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/franklenzer/0101010101/raw/main/mpc.part01.rar:
Source: main.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2195316484.0000000002750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/franklenzer/0101010101/raw/main/mpc.part02.rar
Source: main.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2195316484.0000000002750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/franklenzer/0101010101/raw/main/x0x.exe
Source: main.exe, 00000002.00000002.2195332778.0000000002851000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mahler:8092/site-updates.py
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 20.233.83.145:443 -> 192.168.2.6:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00401850 ntohl,fwrite,fclose,free,0_2_00401850
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00401910 fseek,ftell,ntohl,ntohl,ntohl,fseek,ntohl,malloc,ntohl,fread,ntohl,ferror,fclose,fseek,fread,fseek,fread,fseek,fread,fseek,fread,0_2_00401910
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00401610 ntohl,ntohl,fseek,ntohl,malloc,ntohl,fread,fclose,ntohl,malloc,ntohl,ntohl,free,free,0_2_00401610
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00401CE9 ntohl,0_2_00401CE9
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00404170 free,strlen,ntohl,free,ntohl,0_2_00404170
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00401D1C ntohl,0_2_00401D1C
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_004015D0 ntohl,0_2_004015D0
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_004042F7 free,ntohl,0_2_004042F7
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00403B40 ntohl,strcpy,GetLastError,0_2_00403B40
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00403BE9 ntohl,sprintf,GetModuleHandleA,0_2_00403BE9
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00404380 ntohl,free,strlen,0_2_00404380
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00401910 fseek,ftell,ntohl,ntohl,ntohl,fseek,ntohl,malloc,ntohl,fread,ntohl,ferror,fclose,fseek,fread,fseek,fread,fseek,fread,fseek,fread,2_2_00401910
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00401610 ntohl,ntohl,fseek,ntohl,malloc,ntohl,fread,fclose,ntohl,malloc,ntohl,ntohl,free,free,2_2_00401610
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00401850 ntohl,fwrite,fclose,free,2_2_00401850
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00401CE9 ntohl,2_2_00401CE9
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00404170 PyString_FromString,free,strlen,PySys_SetObject,PyImport_ImportModule,PyModule_GetDict,PyDict_GetItemString,ntohl,PyObject_CallFunction,PyObject_CallFunction,PyImport_ExecCodeModule,PyErr_Occurred,PyErr_Print,PyErr_Clear,free,ntohl,PyObject_CallFunction,2_2_00404170
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00401D1C ntohl,2_2_00401D1C
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_004015D0 ntohl,2_2_004015D0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_004042F7 PyObject_CallFunction,PyObject_CallFunction,PyImport_ExecCodeModule,PyErr_Occurred,PyErr_Print,PyErr_Clear,free,ntohl,PyObject_CallFunction,2_2_004042F7
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00403B40 ntohl,strcpy,GetLastError,2_2_00403B40
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00403BE9 ntohl,sprintf,GetModuleHandleA,2_2_00403BE9
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00404380 ntohl,PyString_FromFormat,free,strlen,Py_DecRef,PySys_GetObject,PyList_Append,Py_DecRef,2_2_00404380
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_004064D20_2_004064D2
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_004065950_2_00406595
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_004087690_2_00408769
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_004087100_2_00408710
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_004064D22_2_004064D2
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_004065952_2_00406595
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_004087692_2_00408769
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_004087102_2_00408710
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CEDE8702_2_6CEDE870
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF88AD02_2_6CF88AD0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF7CA702_2_6CF7CA70
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF7B0502_2_6CF7B050
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF48CC02_2_6CF48CC0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF50CA02_2_6CF50CA0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFBCC9D2_2_6CFBCC9D
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF4AC702_2_6CF4AC70
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFBEC402_2_6CFBEC40
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFBEDF22_2_6CFBEDF2
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF4AD6B2_2_6CF4AD6B
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF48D4C2_2_6CF48D4C
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF5CD302_2_6CF5CD30
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFB0D172_2_6CFB0D17
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF94F602_2_6CF94F60
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF84F002_2_6CF84F00
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF948D02_2_6CF948D0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFAE8002_2_6CFAE800
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CEDE9EC2_2_6CEDE9EC
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFBA9F02_2_6CFBA9F0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFBE9802_2_6CFBE980
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFB09702_2_6CFB0970
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF529602_2_6CF52960
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF9C9602_2_6CF9C960
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF449202_2_6CF44920
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF469002_2_6CF46900
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFBEAC02_2_6CFBEAC0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF18A802_2_6CF18A80
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF48A702_2_6CF48A70
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF94A702_2_6CF94A70
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF46BE02_2_6CF46BE0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF94B6C2_2_6CF94B6C
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CEDE4202_2_6CEDE420
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF484102_2_6CF48410
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF4C5902_2_6CF4C590
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFB656C2_2_6CFB656C
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFBA5402_2_6CFBA540
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF5A5102_2_6CF5A510
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFB65002_2_6CFB6500
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFB66602_2_6CFB6660
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CED27F02_2_6CED27F0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFB67902_2_6CFB6790
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF8C7602_2_6CF8C760
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF467402_2_6CF46740
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF1E7002_2_6CF1E700
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF4A0F02_2_6CF4A0F0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CEEE0E02_2_6CEEE0E0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF4E0A02_2_6CF4E0A0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF9C0202_2_6CF9C020
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF501B02_2_6CF501B0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF2A1802_2_6CF2A180
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF481802_2_6CF48180
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFB22E02_2_6CFB22E0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF4A2D02_2_6CF4A2D0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF4E2802_2_6CF4E280
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF1E2602_2_6CF1E260
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF2A2102_2_6CF2A210
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CEE63802_2_6CEE6380
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF2A3502_2_6CF2A350
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF47C402_2_6CF47C40
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFB5DE02_2_6CFB5DE0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CEF9DF02_2_6CEF9DF0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFB7DA92_2_6CFB7DA9
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF9BD202_2_6CF9BD20
Source: C:\Users\user\Desktop\main.exeCode function: String function: 6CEDCDA0 appears 72 times
Source: C:\Users\user\Desktop\main.exeCode function: String function: 6CED0E00 appears 803 times
Source: C:\Users\user\Desktop\main.exeCode function: String function: 6CEDB1E0 appears 154 times
Source: C:\Users\user\Desktop\main.exeCode function: String function: 6CEE3870 appears 71 times
Source: C:\Users\user\Desktop\main.exeCode function: String function: 6CF29B30 appears 36 times
Source: main.exeStatic PE information: Resource name: STYLE type: Zip archive data, at least v2.0 to extract, compression method=store
Source: main.exeStatic PE information: Resource name: STYLE type: Zip archive data, at least v2.0 to extract, compression method=store
Source: main.exe, 00000000.00000003.2157220383.0000000002659000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSVCP90.DLL^ vs main.exe
Source: main.exe, 00000000.00000003.2156562438.00000000026F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSVCR90.DLL^ vs main.exe
Source: main.exe, 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWinCam.exe. vs main.exe
Source: main.exe, 00000000.00000003.2157767880.0000000002560000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSVCM90.DLL^ vs main.exe
Source: main.exe, 00000000.00000003.2157282027.0000000002551000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMSVCM90.DLL^ vs main.exe
Source: main.exe, 00000000.00000003.2158543447.00000000029B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepython27.dll. vs main.exe
Source: main.exe, 00000002.00000002.2196978143.000000006D3C4000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamepython27.dll. vs main.exe
Source: main.exe, 00000002.00000000.2161841749.0000000000568000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWinCam.exe. vs main.exe
Source: main.exeBinary or memory string: OriginalFilenameWinCam.exe. vs main.exe
Source: main.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
Source: classification engineClassification label: mal60.winEXE@3/12@1/1
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00404E70 GetLastError,FormatMessageA,0_2_00404E70
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF072A0 LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,NetStatisticsGet,NetStatisticsGet,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetVersion,GetVersion,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,GetTickCount,GetTickCount,Heap32ListFirst,Heap32First,Heap32Next,GetTickCount,Heap32ListNext,GetTickCount,GetTickCount,Process32First,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId,2_2_6CF072A0
Source: C:\Users\user\Desktop\main.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI10802Jump to behavior
Source: main.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\main.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: main.exeReversingLabs: Detection: 44%
Source: C:\Users\user\Desktop\main.exeFile read: C:\Users\user\Desktop\main.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\main.exe "C:\Users\user\Desktop\main.exe"
Source: C:\Users\user\Desktop\main.exeProcess created: C:\Users\user\Desktop\main.exe "C:\Users\user\Desktop\main.exe"
Source: C:\Users\user\Desktop\main.exeProcess created: C:\Users\user\Desktop\main.exe "C:\Users\user\Desktop\main.exe"Jump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\main.exeSection loaded: fwpuclnt.dllJump to behavior
Source: main.exeStatic file information: File size 5620920 > 1048576
Source: C:\Users\user\Desktop\main.exeFile opened: C:\Users\user\AppData\Local\Temp\_MEI10802\msvcr90.dllJump to behavior
Source: main.exeStatic PE information: section name: RT_CURSOR
Source: main.exeStatic PE information: section name: RT_BITMAP
Source: main.exeStatic PE information: section name: RT_ICON
Source: main.exeStatic PE information: section name: RT_MENU
Source: main.exeStatic PE information: section name: RT_DIALOG
Source: main.exeStatic PE information: section name: RT_STRING
Source: main.exeStatic PE information: section name: RT_ACCELERATOR
Source: main.exeStatic PE information: section name: RT_GROUP_ICON
Source: main.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x159400
Source: Binary string: C:\build27\cpython\PCBuild\select.pdb source: main.exe, 00000000.00000003.2161442847.0000000002551000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr
Source: Binary string: msvcp90.i386.pdb source: main.exe, 00000000.00000003.2157220383.0000000002659000.00000004.00000020.00020000.00000000.sdmp, msvcp90.dll.0.dr
Source: Binary string: msvcr90.i386.pdb source: main.exe, 00000000.00000003.2156562438.0000000002657000.00000004.00000020.00020000.00000000.sdmp, msvcr90.dll.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\_hashlib.pdb source: main.exe, 00000000.00000003.2161232064.00000000026E8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2196089633.000000006D0E8000.00000002.00000001.01000000.00000005.sdmp, _hashlib.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\_socket.pdb source: main.exe, 00000000.00000003.2159823373.0000000002555000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2159535838.0000000002551000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2197056073.0000000074A97000.00000002.00000001.01000000.00000006.sdmp, _socket.pyd.0.dr
Source: Binary string: msvcm90.i386.pdb source: main.exe, 00000000.00000003.2157767880.0000000002560000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2157282027.0000000002551000.00000004.00000020.00020000.00000000.sdmp, msvcm90.dll.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\bz2.pdb% source: main.exe, 00000000.00000003.2159483968.0000000002561000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2159332778.0000000002551000.00000004.00000020.00020000.00000000.sdmp, bz2.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\_socket.pdbEi source: main.exe, 00000000.00000003.2159823373.0000000002555000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2159535838.0000000002551000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2197056073.0000000074A97000.00000002.00000001.01000000.00000006.sdmp, _socket.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\unicodedata.pdb source: main.exe, 00000000.00000003.2159130410.000000000265B000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\python27.pdb source: main.exe, 00000000.00000003.2158543447.0000000002782000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2196356518.000000006D28A000.00000002.00000001.01000000.00000004.sdmp, python27.dll.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\_ssl.pdb source: main.exe, 00000000.00000003.2160566596.0000000002701000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmp, _ssl.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\_hashlib.pdb%x source: main.exe, 00000000.00000003.2161232064.00000000026E8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2196089633.000000006D0E8000.00000002.00000001.01000000.00000005.sdmp, _hashlib.pyd.0.dr
Source: Binary string: C:\build27\cpython\PCBuild\bz2.pdb source: main.exe, 00000000.00000003.2159483968.0000000002561000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2159332778.0000000002551000.00000004.00000020.00020000.00000000.sdmp, bz2.pyd.0.dr
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_004052F0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,free,0_2_004052F0
Source: unicodedata.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0xac2ee
Source: bz2.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x1cba6
Source: _ssl.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x15d97a
Source: python27.dll.0.drStatic PE information: real checksum: 0x29675c should be: 0x296813
Source: _socket.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x145cb
Source: _hashlib.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x1117e2
Source: select.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0xe180
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF6AA21 pushad ; ret 2_2_6CF6AA23
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CEE4691 push esp; ret 2_2_6CEE4693
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CEF9CA1 push esp; ret 2_2_6CEF9CA3
Source: msvcr90.dll.0.drStatic PE information: section name: .text entropy: 6.921830750319084

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\main.exeProcess created: "C:\Users\user\Desktop\main.exe"
Source: C:\Users\user\Desktop\main.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI10802\python27.dllJump to dropped file
Source: C:\Users\user\Desktop\main.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI10802\msvcp90.dllJump to dropped file
Source: C:\Users\user\Desktop\main.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI10802\select.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI10802\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI10802\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI10802\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI10802\_ssl.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI10802\msvcr90.dllJump to dropped file
Source: C:\Users\user\Desktop\main.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI10802\bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI10802\msvcm90.dllJump to dropped file
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00402ED0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00402ED0
Source: C:\Users\user\Desktop\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\main.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFA21C0 rdtsc 2_2_6CFA21C0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF072A0 LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,NetStatisticsGet,NetStatisticsGet,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetVersion,GetVersion,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,GetTickCount,GetTickCount,Heap32ListFirst,Heap32First,Heap32Next,GetTickCount,Heap32ListNext,GetTickCount,GetTickCount,Process32First,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId,2_2_6CF072A0
Source: C:\Users\user\Desktop\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI10802\python27.dllJump to dropped file
Source: C:\Users\user\Desktop\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI10802\msvcp90.dllJump to dropped file
Source: C:\Users\user\Desktop\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI10802\select.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI10802\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI10802\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI10802\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI10802\_ssl.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI10802\bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI10802\msvcr90.dllJump to dropped file
Source: C:\Users\user\Desktop\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI10802\msvcm90.dllJump to dropped file
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF99DC0 _errno,_errno,malloc,memset,malloc,free,_errno,FindFirstFileA,free,free,free,_errno,FindNextFileA,strncpy,_errno,2_2_6CF99DC0
Source: main.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
Source: main.exe, 00000002.00000002.2195316484.0000000002750000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if re.search(r'Virtual|VMware|VirtualBox|KVM|QEMU|Hyper-V', model, re.IGNORECASE):
Source: main.exe, 00000002.00000002.2195332778.0000000002851000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Virtual|VMware|VirtualBox|KVM|QEMU|Hyper-V
Source: main.exe, 00000002.00000002.2195332778.0000000002851000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6Virtual|VMware|VirtualBox|KVM|QEMU|Hyper-V
Source: main.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @VMware, Inc.
Source: main.exe, 00000002.00000002.2195316484.0000000002750000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if manufacturer in ["VMware, Inc.", "Microsoft Corporation", "Xen", "VirtualBox"]:
Source: main.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: EMU|Hyper-V'a
Source: main.exe, 00000002.00000002.2195075242.0000000000848000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\main.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFA21C0 rdtsc 2_2_6CFA21C0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFC08F0 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,2_2_6CFC08F0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF072A0 LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,NetStatisticsGet,NetStatisticsGet,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetVersion,GetVersion,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,GetTickCount,GetTickCount,Heap32ListFirst,Heap32First,Heap32Next,GetTickCount,Heap32ListNext,GetTickCount,GetTickCount,Process32First,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId,2_2_6CF072A0
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_004052F0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,free,0_2_004052F0
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00401179 Sleep,Sleep,SetUnhandledExceptionFilter,_wcmdln,malloc,malloc,memcpy,__winitenv,_cexit,_amsg_exit,_initterm,GetStartupInfoW,_initterm,exit,0_2_00401179
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00409FC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_00409FC0
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00409FBC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_00409FBC
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00401179 Sleep,Sleep,SetUnhandledExceptionFilter,_wcmdln,malloc,malloc,memcpy,__winitenv,_cexit,_amsg_exit,_initterm,GetStartupInfoW,_initterm,exit,2_2_00401179
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00409FC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,2_2_00409FC0
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_00409FBC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,2_2_00409FBC
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CFC08F0 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,2_2_6CFC08F0
Source: C:\Users\user\Desktop\main.exeProcess created: C:\Users\user\Desktop\main.exe "C:\Users\user\Desktop\main.exe"Jump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI10802\_hashlib.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI10802\_socket.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeQueries volume information: C:\Users\user\Desktop\main.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\main.exeCode function: 0_2_00409F10 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00409F10
Source: C:\Users\user\Desktop\main.exeCode function: 2_2_6CF072A0 LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,NetStatisticsGet,NetStatisticsGet,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetVersion,GetVersion,FreeLibrary,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateToolhelp32Snapshot,GetTickCount,GetTickCount,Heap32ListFirst,Heap32First,Heap32Next,GetTickCount,Heap32ListNext,GetTickCount,GetTickCount,Process32First,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,GetTickCount,CloseHandle,FreeLibrary,GlobalMemoryStatus,GetCurrentProcessId,2_2_6CF072A0
Source: C:\Users\user\Desktop\main.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
11
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media4
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)4
Obfuscated Files or Information
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Software Packing
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets14
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
main.exe45%ReversingLabsWin32.Trojan.Generic
main.exe100%AviraTR/Dldr.Agent.prntl
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\_MEI10802\_hashlib.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI10802\_socket.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI10802\_ssl.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI10802\bz2.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI10802\msvcm90.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI10802\msvcp90.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI10802\msvcr90.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI10802\python27.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI10802\select.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI10802\unicodedata.pyd0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.faqs.org/rfcs/rfc2822.html0%Avira URL Cloudsafe
http://www.faqs.org/rfcs/rfc822.html0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
github.com
20.233.83.145
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://github.com/franklenzer/0101010101/raw/main/mpc.part01.rarfalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://python.org/dev/peps/pep-0263/python27.dll.0.drfalse
        high
        https://mahler:8092/site-updates.pymain.exe, 00000002.00000002.2195332778.0000000002851000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6main.exe, 00000002.00000002.2195332778.000000000298E000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://www.faqs.org/rfcs/rfc2822.htmlmain.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2195332778.000000000298E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://tools.ietf.org/html/rfc6125#section-6.4.3main.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://www.unicode.org/reports/tr44/tr44-4.html).main.exe, 00000000.00000003.2159130410.00000000026C8000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.0.drfalse
                high
                http://www.openssl.org/support/faq.htmlC:main.exe, 00000000.00000003.2161232064.00000000026E8000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000000.00000003.2160566596.0000000002701000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2196089633.000000006D0E8000.00000002.00000001.01000000.00000005.sdmp, main.exe, 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmp, _ssl.pyd.0.dr, _hashlib.pyd.0.drfalse
                  high
                  http://www.python.org/main.exe, 00000002.00000002.2195332778.0000000002851000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://github.com/franklenzer/0101010101/raw/main/x0x.exemain.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2195316484.0000000002750000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://github.com/franklenzer/0101010101/raw/main/mpc.part01.rar:main.exe, 00000002.00000002.2195332778.000000000298E000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.faqs.org/rfcs/rfc822.htmlmain.exe, 00000002.00000002.2195332778.000000000298E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://github.com/franklenzer/0101010101/raw/main/mpc.part02.rarmain.exe, 00000002.00000002.2195201644.0000000002551000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000002.00000002.2195316484.0000000002750000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.openssl.org/support/faq.htmlmain.exe, main.exe, 00000002.00000002.2196089633.000000006D0E8000.00000002.00000001.01000000.00000005.sdmp, main.exe, 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmp, _ssl.pyd.0.dr, _hashlib.pyd.0.drfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            20.233.83.145
                            github.comUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1577508
                            Start date and time:2024-12-18 14:32:54 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 28s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:3
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:main.exe
                            Detection:MAL
                            Classification:mal60.winEXE@3/12@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 57
                            • Number of non-executed functions: 181
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Stop behavior analysis, all processes terminated
                            • Exclude process from analysis (whitelisted): dllhost.exe
                            • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net, slscr.update.microsoft.com, sls.update.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                            • VT rate limit hit for: main.exe
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            20.233.83.145Y5kEUsYDFr.exeGet hashmaliciousUnknownBrowse
                            • github.com/keygroup777-Ransomware/DOWNLOADER/raw/refs/heads/main/telefron.exe
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            github.compyld611114.exeGet hashmaliciousUnknownBrowse
                            • 20.233.83.145
                            Lu4421.exeGet hashmaliciousAsyncRAT, DcRat, StealeriumBrowse
                            • 20.233.83.145
                            x0EMKX5G1g.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                            • 140.82.113.4
                            x0EMKX5G1g.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                            • 20.233.83.145
                            ORDER-2412180Y6890PF57682456HTVC789378909759..jarGet hashmaliciousCaesium Obfuscator, STRRATBrowse
                            • 20.233.83.145
                            IAK4Rn3bfO.jarGet hashmaliciousCaesium Obfuscator, STRRATBrowse
                            • 20.233.83.145
                            ORDER-24171200967.XLS..jsGet hashmaliciousWSHRat, Caesium Obfuscator, STRRATBrowse
                            • 140.82.121.3
                            3gJQoqWpxb.batGet hashmaliciousUnknownBrowse
                            • 140.82.113.4
                            uZgbejeJkT.batGet hashmaliciousUnknownBrowse
                            • 20.233.83.145
                            ni2OwV1y9u.batGet hashmaliciousUnknownBrowse
                            • 20.233.83.145
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            MICROSOFT-CORP-MSN-AS-BLOCKUSpowerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                            • 52.151.111.14
                            loligang.ppc.elfGet hashmaliciousMiraiBrowse
                            • 20.55.13.142
                            loligang.x86.elfGet hashmaliciousMiraiBrowse
                            • 40.92.162.115
                            loligang.arm7.elfGet hashmaliciousMiraiBrowse
                            • 20.173.233.245
                            loligang.mips.elfGet hashmaliciousMiraiBrowse
                            • 20.183.227.19
                            pyld611114.exeGet hashmaliciousUnknownBrowse
                            • 20.233.83.145
                            Lu4421.exeGet hashmaliciousAsyncRAT, DcRat, StealeriumBrowse
                            • 20.233.83.145
                            http://trackmail.info/QLTRG66TP4/offer/00248/811/iuk7x/b4q/41/32Get hashmaliciousUnknownBrowse
                            • 52.170.203.157
                            EXTERNALRe.msgGet hashmaliciousUnknownBrowse
                            • 52.182.143.210
                            x0EMKX5G1g.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                            • 20.233.83.145
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            e0fe397a5edfba9a6facc7c7b341f4ebnnu_malware.exeGet hashmaliciousUnknownBrowse
                            • 20.233.83.145
                            eb436d4f.exeGet hashmaliciousUnknownBrowse
                            • 20.233.83.145
                            Ace_Stream_Media_3.1.32.exeGet hashmaliciousUnknownBrowse
                            • 20.233.83.145
                            RFQ546092227865431209PDF.exeGet hashmaliciousUnknownBrowse
                            • 20.233.83.145
                            ORDER-210309.exeGet hashmaliciousAsyncRATBrowse
                            • 20.233.83.145
                            99ytGeokLb.exeGet hashmaliciousUnknownBrowse
                            • 20.233.83.145
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Temp\_MEI10802\_hashlib.pydfile.exeGet hashmaliciousUnknownBrowse
                              file.exeGet hashmaliciousAmadeyBrowse
                                t2KTeQbdBN.exeGet hashmaliciousUnknownBrowse
                                  IuoEx4dekI.exeGet hashmaliciousUnknownBrowse
                                    VxJYz09IcUGet hashmaliciousUnknownBrowse
                                      winUpdSrv.exeGet hashmaliciousUnknownBrowse
                                        nnu_malware.exeGet hashmaliciousUnknownBrowse
                                          Lumberjack.exeGet hashmaliciousUnknownBrowse
                                            03abedd5_by_Libranalysis.exeGet hashmaliciousUnknownBrowse
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):1101824
                                              Entropy (8bit):6.872224946601528
                                              Encrypted:false
                                              SSDEEP:24576:wYeKOt9Hb/4BGjUIWbL5bEromH/1+Mb7zV+KpPoBsEeMZ1pSJx+waNJ:GQBjIwL98f7b7ZHMLpS3+waNJ
                                              MD5:55A29EC9721C509A5B20D1A037726CFA
                                              SHA1:EABA230581D7B46F316D6603EA15C1E3C9740D04
                                              SHA-256:DBDCF9E8CBA52043B5246AD0D234DA8BA4D6534B326BBBB28A6A391EDF6FA4CE
                                              SHA-512:E1A2993D4DD5F2E81F299FE158EE6D1F8EF95983113C9BEA9A087E42205FF06AC563762DE5A0B70B535EFE8CF9F980FFC14C1318AAF58DE3644277E3602E0AB3
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Joe Sandbox View:
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: t2KTeQbdBN.exe, Detection: malicious, Browse
                                              • Filename: IuoEx4dekI.exe, Detection: malicious, Browse
                                              • Filename: VxJYz09IcU, Detection: malicious, Browse
                                              • Filename: winUpdSrv.exe, Detection: malicious, Browse
                                              • Filename: nnu_malware.exe, Detection: malicious, Browse
                                              • Filename: Lumberjack.exe, Detection: malicious, Browse
                                              • Filename: 03abedd5_by_Libranalysis.exe, Detection: malicious, Browse
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......FX.Z.9...9...9...A...9...A...9...A...9...A...9...9...9...9...9...A...8...A...9...A...9..Rich.9..........PE..L......^...........!.....n...........r....................................... ............@.............................L....................................p......p...................................@...............P............................text....m.......n.................. ..`.rdata...^.......`...r..............@..@.data............T..................@....reloc......p.......&..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):46592
                                              Entropy (8bit):6.53763754638404
                                              Encrypted:false
                                              SSDEEP:768:LRZyVeIHZOETVI+KHtjEGDqFPBesNoC+M6Le+rA8X:deOETV1KH5qFPMC7gLDJ
                                              MD5:3986998B3753483F8B28C721FEF6F8E4
                                              SHA1:2EF3C0FAC94C85276721EE2980F49B1BAFEF597D
                                              SHA-256:CBC23D6C2E3E2950452C7D255DA1452338301A4C9A0B09EBA83287709D2A5000
                                              SHA-512:258E2805440B36E20702C1447597698EF18A5A7F890CFECE55BD4F797073C87E7BDE659DB3E2474E9B998213D76E2C3D5221659C6827237E06B3B6F4B3643AE6
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......AV2..7\..7\..7\..O..7\..O..7\..O..7\..7]..7\..O..7\..O..7\..O..7\..O..7\.Rich.7\.........................PE..L.....^...........!.....\...Z.......e.......p............................................@............................d...L...d...............................|...`r..............................(...@............p..@............................text....[.......\.................. ..`.rdata..4 ...p..."...`..............@..@.data...x*.......(..................@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):1422336
                                              Entropy (8bit):6.8498093470232755
                                              Encrypted:false
                                              SSDEEP:24576:6ULSpvnsen1MiGl/hW5nGwwpMFmdLdl3Bp4vuPH5HUMecjhpXu4Fq+KpPZTx63g4:QvnZopheGwXk4i0Mo4ASgHpv5RKHjQj8
                                              MD5:9BE53B53C1EC6B56663F45464EDFCDE9
                                              SHA1:F8F5DD5640D594A2B53F5BBD12893C11CF4B7D55
                                              SHA-256:B572BF14CA3D3E5158B89314B6FE2129A753EDACA1958E252784561F33F9ECDA
                                              SHA-512:A52727B54A03246B74460A2741324B371CCAA083A4F3123FD1175A3061D3B6707DDBAAA73B3E39435CFFD8D3018EE2DEE8BAD6C58A17FAA55B6D05A3B38EE78B
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................0......&......!..................6......,.:....7......4....Rich...................PE..L....^...........!......................... ............................................@..........................<..D....(............................... .......#...............................'..@............ ...............................text...7........................... ..`.rdata..$.... ......................@..@.data........@.......*..............@....reloc..|.... ......................@..B................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):71168
                                              Entropy (8bit):6.739969664926487
                                              Encrypted:false
                                              SSDEEP:1536:Ijfp8+QhToyh3Y1rr24S1uBXTZva+j+d8S+fkPPYnLr:IbLuYlq4SuXTZva+j+yZfWC
                                              MD5:813C016E2898C6A2C1825B586DE0AE61
                                              SHA1:7113EFCCCB6AB047CDFDB65BA4241980C88196F4
                                              SHA-256:693DFC5CCB8555A4183D4E196865EF0A766D7E53087C39059D096D03D6F64724
                                              SHA-512:DBB4ADD301EA127669D5DAC4226CE0F5D6E5B2E50773DB5C8083A9045A3CBA0FCF6EA253A1183A4C87752BD3C5EB84128103A6D8ADE71A7E410831B826D323AD
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.S.9.=K9.=K9.=K..K:.=K0..K:.=K0..K7.=K0..K;.=K0..K>.=K9.<KS.=K0..K1.=K0..K8.=K0..K8.=KRich9.=K................PE..L......^...........!.........P...............................................@............@.............................B...L...P............................0......................................H...@............................................text............................... ..`.rdata.."...........................@..@.data...P'.......$..................@....reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1341
                                              Entropy (8bit):5.280300736417038
                                              Encrypted:false
                                              SSDEEP:24:2dtn3ZlglN2v+zg4NnEN4X1mc0+bLg4fNRme5rcb3S:ch3jgX2+zg4i01mJ+bLg4VRmemS
                                              MD5:585BDFE3FA40F4667674269E31CB3CDB
                                              SHA1:646DF297C69AEE3E57293521346118EDEBE248E2
                                              SHA-256:DEC743E7FE1078B06B91D60B03609DE800D81756C61004B8F2F0234D15757903
                                              SHA-512:A21F6E7E24BD736279A2A49CCEDBD94D2BD366673A5D9F0966CE5A2A5A1A1E2A6BBE68F39A525A8B3083AAC82D1B0A145FED52FBFA1A3505F1A17CA432F6F20D
                                              Malicious:false
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly manifestVersion="1.0" xmlns="urn:schemas-microsoft-com:asm.v1">.. <assemblyIdentity name="data" processorArchitecture="x86" type="win32" version="1.0.0.0"/>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity name="Microsoft.VC90.CRT" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b" type="win32" version="9.0.30729.4940"/>.. <compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"/>.. </dependentAssembly>.. </dependency>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity language="*" name="Microsoft.Windows.Common-Controls" processorArchitecture="x86" publicKeyToken="6595b64144ccf1df" type="win32" version="6.0.0.0"/>.. <compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"/>.. </dependentAssembly>.. </dependency>.. <compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1">.. <application>.. <supportedOS Id="{1f676c76-80e1-42
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1050
                                              Entropy (8bit):5.382088691477628
                                              Encrypted:false
                                              SSDEEP:24:2dtn3mGv+zg4NnEN4XojC6vuVWV5rcb3S:ch35+zg4i0oKWmS
                                              MD5:FEDFDF2256720BADEFF9205E784B5DC8
                                              SHA1:014F80BBB14D6F9ED5FCF0757BF2BEF1A22B3B88
                                              SHA-256:6373FB8261AF01506DC57DEE535A0BE800F3A59B18B0CC1E276807C746329FF6
                                              SHA-512:F327A925FC067D0CBF06DE57DB791906629509CEE109CB3DBCA2349901EF4E41FD8BF33B56F5FAA647388F6266174960244E4F5CCA260F218440D9A1CC4DAA9B
                                              Malicious:false
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<assembly manifestVersion="1.0" xmlns="urn:schemas-microsoft-com:asm.v1">.. <noInheritable/>.. <assemblyIdentity name="Microsoft.VC90.CRT" processorArchitecture="x86" publicKeyToken="1fc8b3b9a1e18e3b" type="win32" version="9.0.30729.4940"/>.. <file hash="c27a4547fb05f4fb4a675713da9fe280405d4e7b" hashalg="SHA1" name="msvcr90.dll"/>.. <file hash="965ba7119c94a3e462b0480492a114411a85c396" hashalg="SHA1" name="msvcp90.dll"/>.. <file hash="216d23bdea36a638d68a9f9287c25008a88285ad" hashalg="SHA1" name="msvcm90.dll"/>.. <compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1">.. <application>.. <supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/>.. <supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/>.. <supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/>.. <supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/>.. <supportedOS Id="{8e0f7a12-bfb3-4fe8-b9a5-48fd50a15a9a}"/>..
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):225280
                                              Entropy (8bit):6.036101465527911
                                              Encrypted:false
                                              SSDEEP:3072:Yk3eocziNzMLSMOYscmnWCAXm00LRk86Goao1IJU87/amFYw8fF01OyA9LX:v6OMqcEJAXb0LRn6fa3/amiX2Oy0
                                              MD5:7200DCA324F3D1ECD11B2B1250B2D6C7
                                              SHA1:DF3219CFBC6F6EE6EF025B320563A195BE46D803
                                              SHA-256:636E12FEA8C47EA528DBA48827AC51A2E98B2EF0864854C9375B8170555C0A6E
                                              SHA-512:DAC1154FC4E55F9E78C39FCD9FA28B1ABE36D67D9C71660BD58990A1F3864ACEAD7D1C7F55E390F3875B20685B447C3C494B3634F0DC4C7EF3B1E7A17115EB4B
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;...h...h...h..ah...h1.dh...h..gh...h...h...h.-.h...h...h...h..qh...h..vh...h..`h...h..fh...h..ch...hRich...h........................PE..L...b.L...........!.....:..........Z........P....?x.........................0......|w....@......................... 3..4....&..d...............................d...P...............................H...@...............(...........p...H............text...T9.......:.................. ..`.data........P.......>..............@....rsrc................H..............@..@.reloc...#.......$...L..............@..B........................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):569680
                                              Entropy (8bit):6.52221622647759
                                              Encrypted:false
                                              SSDEEP:12288:fCFE340h3e34GVZQACkIrYhUgiW6QR7t5183Ooc8SHkC2eHgAfl:fCh0h3e3vgzrA83Ooc8SHkC2eHgAfl
                                              MD5:DB001FAEA818AE2E14A74E0ADC530FC0
                                              SHA1:7DB49C1A611B38A4F494B1DB23087C751FAA3DE1
                                              SHA-256:45CB405589C92BF74C47B7C90E299A5732A99403C51F301A5B60579CAF3116E7
                                              SHA-512:90B8B52E797A43488D21AC9FC73C693B1337ABF46801BD5957C2AECCBA2A50550C54E6842D2CB26035B7F0C706C950C2F6AC99EB4DDD6E433B156BFDB2DF62E1
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........#%..Mv..Mv..Mv.66v..Mv...v..Mv..Lv:.Mv...v..Mv...v..Mv...v..Mv...v..Mv...v..Mv...v..Mv...v..MvRich..Mv........................PE..L...\.L...........!.....4...p..............P....Hx......................................@..........................P..,....E..<.......................P.......D3...................................%..@............................................text....2.......4.................. ..`.data...t'...P.......8..............@....rsrc................R..............@..@.reloc..HC.......D...V..............@..B................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):653136
                                              Entropy (8bit):6.883567262143348
                                              Encrypted:false
                                              SSDEEP:12288:Zhr4UCe8uLQrIYE8EdPz1n0/WGipK5d7AO7QlxxdmRyy1:981FYPz8WGip0d7AhpdmRyy1
                                              MD5:B3892E6DA8E2C8CE4B0A9D3EB9A185E5
                                              SHA1:E81C5908187D359EEDB6304184E761EFB38D6634
                                              SHA-256:AE163388201EF2F119E11265586E7DA32C6E5B348E0CC32E3F72E21EBFD0843B
                                              SHA-512:22E01E25BF97A0169049755246773CFC26162AF28248B27BF4B3DAAF3E89A853738064A2B42C0FEDB9BEDCB3DDAF3AE957A960E2AAB29784CBA312ED9E1C9285
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................6.........!.R...7.....&.....0.....6.....3...Rich..........PE..L...W.L...........!.....\..........@-.......p....Rx.........................0......*.....@..............................|..0...(.......................P........3......................................@............................................text...T[.......\.................. ..`.data....g...p...D...`..............@....rsrc...............................@..@.reloc...7.......8..................@..B................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):2650112
                                              Entropy (8bit):6.72219915141047
                                              Encrypted:false
                                              SSDEEP:49152:ld0krhjbVYU9U/ElyrLKlvGBO58GBjG9nYM6JBe4PjnhMsQHNClhIdYTf2O+yX3T:QkrRyylvGB65YNCMghMtHIledkp+h
                                              MD5:9E9E57B47F4F840DDDC938DB54841D86
                                              SHA1:1ED0BE9C0DADCF602136C81097DA6FDA9E07DBBC
                                              SHA-256:608FEAFC63A0D1B38772E275C9E6D3B8A5B03EFC0A27EB397107DB0A6D079C50
                                              SHA-512:1A0DAB38EBF4D995BCDA3BDF0453C85D524CC1FFF1C1B92160794D7C2F98F53088BA15C4B00B35D06E0BE82A4BFA6D92CD4F09DEC4EC98D615A82D5FFD5CB6C2
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Bu....{...{...{..[...{..l...{..l....{..l....{..l...{...z.<.{..l..{..l...{..l...{..l...{.Rich..{.................PE..L...x..^...........!.........................................................).....\g)...@..........................g!..|...Q!.x....@(.D....................P(.P\.. ................................O!.@............................................text...z........................... ..`.rdata...D.......F..................@..@.data...pC....!..(....!.............@....rsrc...D....@(.......&.............@..@.reloc..~f...P(..h....'.............@..B................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):10240
                                              Entropy (8bit):5.843142645527012
                                              Encrypted:false
                                              SSDEEP:192:qFXJRZobEm7QNw7MPDdqPSU+QErXUnv3XDVR6yiXc1U5O:qFXJnjCAPDdFBQGXoPzV5ku1
                                              MD5:E6ECFF0D1588FED3A61EDC1A1A5EB9BB
                                              SHA1:2A3913A69DBDDA8AEFBE1F290753435979791A37
                                              SHA-256:345969D43B33717415BD5796D5A7B266592DC79A96543714828FF8FC1F249D18
                                              SHA-512:F59B356833840126F31F70DDB0E7F661DB8528D82AA9450E299B81FE5ADDA35D44F3BCEB52FB27E6843CF497211470F439A232C73245F8C606B31CB13322CD6F
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i)...z...z...z...z...z...z...z...z...z...z...z...z...z...z...z...z...z...z...zRich...z........PE..L......^...........!.........................0...............................`............@..........................8..H....3..d............................P.......1...............................1..@............0...............................text............................... ..`.rdata.......0......................@..@.data...8....@....... ..............@....reloc.......P.......&..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\main.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):687104
                                              Entropy (8bit):5.428887209456378
                                              Encrypted:false
                                              SSDEEP:12288:Qs363AxoMPBt8FpQsVdFiI5mZMPXubUxktwd:d3oxM8XQsVdXSPAxLd
                                              MD5:A46E180E03AB5C2D802B8E6214067500
                                              SHA1:5DE5EFBCE2E6E81B6B954B843090B387B7BA927E
                                              SHA-256:689E5061CEFDA6223477A6A05906A500D59BD1B2A7458730B8D43C9D3B43BDBA
                                              SHA-512:68BD7AE714FB4F117EB53A0FB968083772AAEAA6428AE8510E5C109361B140C98415A1955FCA49DB3E9E1B6AE19909E9C50110F499306476D01141C479C16335
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......{H..?).?).?).6QE.=).6QS.1).6QT.=).6QC.8).?)..).6QY.>).6QB.>).6QA.>).Rich?).................PE..L......^...........!.....(...R.......0.......@............................................@.........................pX..R...LR..P................................... A..............................@Q..@............@...............................text... &.......(.................. ..`.rdata.......@.......,..............@..@.data....+...`...*...F..............@....reloc..,............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................
                                              File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                              Entropy (8bit):7.750153765963463
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • VXD Driver (31/22) 0.00%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:main.exe
                                              File size:5'620'920 bytes
                                              MD5:935ddf8c175da8cb95fff0870e0718fc
                                              SHA1:8c026153157f0b84e29080326bbbd1ea6d1ddcb6
                                              SHA256:19ea2bfba48a832b1342fdb60e1d5686d47f3b788d3de162f6ff087a71ed96e4
                                              SHA512:bc77c2ede8a5c4f8fb8b23cc5b9299cbb0af12ee4dbd4d1519c1fbc9835b89d38acbfe0e987ea73c7944823e69e91fae5cd2e3a3d4b1ea0fc96e8ff0390fc0a3
                                              SSDEEP:98304:I/HKcBQvb4YiTZ7FnsLeSAUZqTxQefq0BSvi0WcGlt6:9caZiF7FsvA0qltC0l0W/6
                                              TLSH:AB46F190A3504149D07D987DCC6999F8D6AE3C559F205A7F209BFE0F29B218D0F81EFA
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................./...............................@..................................'V....... ............................
                                              Icon Hash:ba8acb2bcba6a6ba
                                              Entrypoint:0x4014d0
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED
                                              DLL Characteristics:
                                              Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                              TLS Callbacks:0x409620, 0x4095d0
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:d67ee6607bbc19dbb5da771971f8b90a
                                              Instruction
                                              sub esp, 0Ch
                                              mov dword ptr [0041E2D8h], 00000001h
                                              call 00007F00E0DBF463h
                                              add esp, 0Ch
                                              jmp 00007F00E0DB66CBh
                                              lea esi, dword ptr [esi+00000000h]
                                              sub esp, 0Ch
                                              mov dword ptr [0041E2D8h], 00000000h
                                              call 00007F00E0DBF443h
                                              add esp, 0Ch
                                              jmp 00007F00E0DB66ABh
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              sub esp, 1Ch
                                              mov eax, dword ptr [0041F2CCh]
                                              mov eax, dword ptr [eax]
                                              mov dword ptr [esp+04h], eax
                                              mov eax, dword ptr [0041F2B8h]
                                              mov eax, dword ptr [eax]
                                              mov dword ptr [esp], eax
                                              call 00007F00E0DBA678h
                                              mov dword ptr [esp+04h], eax
                                              mov eax, dword ptr [0041F2B8h]
                                              mov eax, dword ptr [eax]
                                              mov dword ptr [esp], eax
                                              call 00007F00E0DB7C75h
                                              add esp, 1Ch
                                              retn 0010h
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              nop
                                              push edi
                                              push esi
                                              sub edx, 58h
                                              push ebx
                                              mov ebx, eax
                                              sub esp, 10h
                                              mov dword ptr [esp+08h], 00000000h
                                              mov dword ptr [esp+04h], edx
                                              mov eax, dword ptr [eax]
                                              mov dword ptr [esp], eax
                                              call 00007F00E0DBFD44h
                                              test eax, eax
                                              jne 00007F00E0DB6A72h
                                              mov eax, dword ptr [ebx]
                                              lea esi, dword ptr [ebx+10h]
                                              mov dword ptr [esp+08h], 00000001h
                                              mov dword ptr [esp+04h], 00000058h
                                              mov dword ptr [esp], esi
                                              mov dword ptr [esp+0Ch], eax
                                              call 00007F00E0DBFD27h
                                              test eax, eax
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x1f0000xbbc.idata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x1592da.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x210040x18.tls
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x1f2200x1bc.idata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x99f00x9a00aee982858c412ceb6af96d2da3068960False0.5291193181818182data6.128830026698397IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .data0xb0000x380x200402e682b5ef4cfc4b27a3bb1da4048a4False0.095703125data0.6574341217726709IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rdata0xc0000x50080x52008bfb0ecac1fc615c56762732a6d45dd9False0.5832221798780488data6.940294876766259IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                              .bss0x120000xc6980x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .idata0x1f0000xbbc0xc0083f5ce5d9a68a49299ae90e9cd91baddFalse0.4140625data5.1321959974465745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .CRT0x200000x340x200a58f7b8492558123b26aaa6b66f63276False0.0703125Matlab v4 mat-file (little endian) \260\226@, numeric, rows 4198704, columns 00.2748254782599745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .tls0x210000x200x20088ccc80dac4bd1f9148b2513bb8c801bFalse0.056640625data0.190488766434666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x220000x1592da0x159400c712722c8663503994a379906f5cee0bFalse0.45304297157856627data6.273628377493384IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              AFX_DIALOG_LAYOUT0x27d840x2dataEnglishUnited States5.0
                                              AFX_DIALOG_LAYOUT0x27d880x2dataEnglishUnited States5.0
                                              AFX_DIALOG_LAYOUT0x27d8c0x2dataEnglishUnited States5.0
                                              AFX_DIALOG_LAYOUT0x27d900x2dataEnglishUnited States5.0
                                              AFX_DIALOG_LAYOUT0x27d940x2dataEnglishUnited States5.0
                                              AFX_DIALOG_LAYOUT0x27d980x2dataEnglishUnited States5.0
                                              AFX_DIALOG_LAYOUT0x27d9c0x2dataEnglishUnited States5.0
                                              AFX_DIALOG_LAYOUT0x27da00x2dataEnglishUnited States5.0
                                              AFX_DIALOG_LAYOUT0x27da40x2dataEnglishUnited States5.0
                                              AFX_DIALOG_LAYOUT0x27da80x2dataEnglishUnited States5.0
                                              PNG0x27dac0x59cPNG image data, 52 x 52, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0076601671309193
                                              PNG0x283480x581PNG image data, 52 x 52, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0078069552874378
                                              PNG0x288cc0x4e0PNG image data, 43 x 43, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0088141025641026
                                              PNG0x28dac0x4ccPNG image data, 43 x 43, 8-bit/color RGBA, non-interlacedEnglishUnited States1.008957654723127
                                              PNG0x292780x3b5PNG image data, 35 x 35, 8-bit/color RGBA, non-interlacedEnglishUnited States1.01159114857745
                                              PNG0x296300x399PNG image data, 35 x 35, 8-bit/color RGBA, non-interlacedEnglishUnited States1.011943539630836
                                              PNG0x299cc0x49aPNG image data, 52 x 52, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0093378607809846
                                              PNG0x29e680x485PNG image data, 52 x 52, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0095073465859983
                                              PNG0x2a2f00x401PNG image data, 43 x 43, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0107317073170732
                                              PNG0x2a6f40x3efPNG image data, 43 x 43, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0109235352532273
                                              PNG0x2aae40x31aPNG image data, 35 x 35, 8-bit/color RGBA, non-interlacedEnglishUnited States1.013853904282116
                                              PNG0x2ae000x2f4PNG image data, 35 x 35, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0145502645502646
                                              PNG0x2b0f40xdaPNG image data, 16 x 14, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9954128440366973
                                              PNG0x2b1d00xc7PNG image data, 20 x 18, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9949748743718593
                                              PNG0x2b2980xe6PNG image data, 24 x 21, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9869565217391304
                                              PNG0x2b3800xd3PNG image data, 32 x 28, 8-bit/color RGBA, non-interlacedEnglishUnited States0.981042654028436
                                              PNG0x2b4540xb24PNG image data, 5 x 3, 8-bit/color RGBA, non-interlaced1.0038569424964936
                                              PNG0x2bf780x5f8PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced1.007198952879581
                                              PNG0x2c5700x31dPNG image data, 120 x 20, 8-bit/color RGBA, non-interlacedEnglishUnited States1.013801756587202
                                              PNG0x2c8900x170PNG image data, 288 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.002717391304348
                                              PNG0x2ca000x2151PNG image data, 224 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0012897174346347
                                              PNG0x2eb540x3cedPNG image data, 336 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0007052638327885
                                              PNG0x328440x54c8PNG image data, 448 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0007371913011427
                                              PNG0x37d0c0x7453PNG image data, 560 x 40, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0005372913798314
                                              PNG0x3f1600x8594PNG image data, 672 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0001462159316878
                                              PNG0x476f40x96fPNG image data, 160 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0045548654244307
                                              PNG0x480640x11dePNG image data, 240 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0024048972452995
                                              PNG0x492440x1816PNG image data, 320 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9970807654881609
                                              PNG0x4aa5c0x21dfPNG image data, 480 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States0.994233652404567
                                              PNG0x4cc3c0x97aPNG image data, 160 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0045342126957955
                                              PNG0x4d5b80x11f8PNG image data, 240 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.002391304347826
                                              PNG0x4e7b00x17f9PNG image data, 320 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States0.997229916897507
                                              PNG0x4ffac0x21fbPNG image data, 480 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9952868145763881
                                              PNG0x521a80x8bfPNG image data, 160 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0049129075480125
                                              PNG0x52a680x1070PNG image data, 240 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0026140684410647
                                              PNG0x53ad80x15f1PNG image data, 320 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States0.997507566316539
                                              PNG0x550cc0x1f15PNG image data, 480 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9940932512253362
                                              PNG0x56fe40x20f0PNG image data, 343 x 85, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9730787476280834
                                              PNG0x590d40x2092PNG image data, 256 x 16, 8-bit/color RGBA, non-interlaced1.0013192612137203
                                              PNG0x5b1680x1313PNG image data, 160 x 16, 8-bit/color RGBA, non-interlaced1.0022527134958017
                                              PNG0x5c47c0x54dPNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced1.0081061164333087
                                              PNG0x5c9cc0xdbPNG image data, 43 x 43, 4-bit colormap, non-interlaced0.9452054794520548
                                              PNG0x5caa80x17e2PNG image data, 120 x 109, 8-bit colormap, non-interlaced1.001799149492967
                                              PNG0x5e28c0x188bPNG image data, 120 x 109, 8-bit colormap, non-interlaced1.0017507560082763
                                              PNG0x5fb180x1928PNG image data, 120 x 109, 8-bit colormap, non-interlaced1.0017080745341616
                                              PNG0x614400x156dPNG image data, 391 x 75, 8-bit colormap, non-interlaced1.0
                                              PNG0x629b00x986PNG image data, 272 x 160, 8-bit/color RGB, non-interlaced0.9905660377358491
                                              PNG0x633380x7ffPNG image data, 340 x 200, 8-bit/color RGB, non-interlaced0.9399120664386907
                                              PNG0x63b380x942PNG image data, 408 x 240, 8-bit/color RGB, non-interlaced0.9143459915611815
                                              PNG0x6447c0xb2dPNG image data, 544 x 320, 8-bit/color RGB, non-interlaced0.834673191191891
                                              PNG0x64fac0x8b7PNG image data, 272 x 160, 8-bit/color RGB, non-interlaced0.9834155087404751
                                              PNG0x658640x74ePNG image data, 340 x 200, 8-bit/color RGB, non-interlaced0.9566844919786096
                                              PNG0x65fb40x84bPNG image data, 408 x 240, 8-bit/color RGB, non-interlaced0.8657560056523788
                                              PNG0x668000xa55PNG image data, 544 x 320, 8-bit/color RGB, non-interlaced0.831758034026465
                                              PNG0x672580x10e5PNG image data, 272 x 160, 8-bit/color RGB, non-interlaced0.9176878612716763
                                              PNG0x683400xaeePNG image data, 340 x 200, 8-bit/color RGB, non-interlaced0.9560400285918513
                                              PNG0x68e300xc81PNG image data, 408 x 240, 8-bit/color RGB, non-interlaced0.9406435488909716
                                              PNG0x69ab40xeaePNG image data, 544 x 320, 8-bit/color RGB, non-interlaced0.8610963278339542
                                              PNG0x6a9640x17e8PNG image data, 161 x 122, 8-bit/color RGB, non-interlaced1.0001633986928105
                                              PNG0x6c14c0x278fPNG image data, 200 x 152, 8-bit/color RGB, non-interlaced0.9972351140515454
                                              PNG0x6e8dc0x2a8ePNG image data, 241 x 182, 8-bit/color RGB, non-interlaced0.9926565081696347
                                              PNG0x7136c0x4295PNG image data, 322 x 244, 8-bit/color RGB, non-interlaced0.9931358169551188
                                              PNG0x756040xf6ePNG image data, 48 x 16, 8-bit/color RGBA, non-interlaced1.0027848101265824
                                              PNG0x765740x4e9PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced1.0087509944311854
                                              STYLE0x76a600x63e0Zip archive data, at least v2.0 to extract, compression method=storeEnglishUnited States0.5156836670838548
                                              STYLE0x7ce400xa00aZip archive data, at least v2.0 to extract, compression method=storeEnglishUnited States0.6362216255796924
                                              TEXTFILE0x86e4c0x58d0Generic INItialization configuration [Theme]EnglishUnited States0.21257037297677692
                                              TEXTFILE0x8c71c0x5765Generic INItialization configuration [Theme]EnglishUnited States0.2125776605730121
                                              TEXTFILE0x91e840x5727Generic INItialization configuration [Theme]EnglishUnited States0.20980682174712026
                                              TEXTFILE0x975ac0x594cGeneric INItialization configuration [Theme]EnglishUnited States0.21071741032370953
                                              TEXTFILE0x9cef80x5995Generic INItialization configuration [Theme]EnglishUnited States0.20306981206122182
                                              WAVE0xa28900x2402cRIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz0.6094305084745762
                                              WAVE0xc68bc0x1f72cRIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz0.653200012421203
                                              RT_CURSOR0xe5fe80x10acAmigaOS bitmap font "(", fc_YSize 0, 3840 elements, 2nd "", 3rd ""EnglishUnited States0.07333645735707592
                                              RT_CURSOR0xe70940x8acAmigaOS bitmap font "(", fc_YSize 0, 3840 elements, 2nd "", 3rd ""EnglishUnited States0.051351351351351354
                                              RT_CURSOR0xe79400x2ecAmigaOS bitmap font "(", fc_YSize 4294963200, 3840 elements, 2nd "", 3rd ""EnglishUnited States0.15240641711229946
                                              RT_CURSOR0xe7c2c0x134AmigaOS bitmap font "(", fc_YSize 4294967292, 3840 elements, 2nd "\377\374\177\377\377\374\177\377\377\374\177\377\377\374\177\377\377\374\177\377\377\374\177\377\377\374\177\377\377\374\177\377\377\376\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.262987012987013
                                              RT_CURSOR0xe7d600x134dataEnglishUnited States0.12337662337662338
                                              RT_CURSOR0xe7e940x134dataEnglishUnited States0.512987012987013
                                              RT_CURSOR0xe7fc80x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.4512987012987013
                                              RT_CURSOR0xe80fc0x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.39285714285714285
                                              RT_CURSOR0xe82300x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                              RT_CURSOR0xe83640x134AmigaOS bitmap font "(", fc_YSize 4294966784, 3072 elements, 2nd "\376", 3rd0.4318181818181818
                                              RT_CURSOR0xe84980x134data0.5909090909090909
                                              RT_CURSOR0xe85cc0x134Targa image data 64 x 65536 x 1 +32 "\001"0.22077922077922077
                                              RT_CURSOR0xe87000x134data0.4383116883116883
                                              RT_CURSOR0xe88340x134data0.4675324675324675
                                              RT_CURSOR0xe89680x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"0.40584415584415584
                                              RT_CURSOR0xe8a9c0x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.4512987012987013
                                              RT_CURSOR0xe8bd00x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.39285714285714285
                                              RT_CURSOR0xe8d040x134Targa image data - Mono 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                              RT_CURSOR0xe8e380xcacdata0.08631319358816276
                                              RT_CURSOR0xe9ae40x134AmigaOS bitmap font "(", fc_YSize 4294967288, 3840 elements, 2nd "\377\370\037\377\377\370\037\377\377\370\037\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rd0.32142857142857145
                                              RT_CURSOR0xe9c180xb4Targa image data - RLE 32 x 65536 x 1 +16 "\001"0.49444444444444446
                                              RT_CURSOR0xe9ccc0x134AmigaOS bitmap font "(", fc_YSize 4294967288, 3840 elements, 2nd "\377\360\037\377\377\370?\377\377\374\177\377\377\376\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rd0.33766233766233766
                                              RT_CURSOR0xe9e000xb4Targa image data - RLE 32 x 65536 x 1 +16 "\001"0.5
                                              RT_CURSOR0xe9eb40x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"0.3181818181818182
                                              RT_CURSOR0xe9fe80x134data0.37012987012987014
                                              RT_CURSOR0xea11c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4805194805194805
                                              RT_CURSOR0xea2500xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"0.7
                                              RT_CURSOR0xea3040x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"0.4025974025974026
                                              RT_CURSOR0xea4380xb4data0.55
                                              RT_CURSOR0xea4ec0x134Targa image data 64 x 65536 x 1 +32 "\001"0.37662337662337664
                                              RT_CURSOR0xea6200x134AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rd0.36363636363636365
                                              RT_CURSOR0xea7540x134Targa image data 64 x 65536 x 1 +32 "\001"0.36688311688311687
                                              RT_CURSOR0xea8880x134data0.37662337662337664
                                              RT_CURSOR0xea9bc0x134AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rd0.5422077922077922
                                              RT_CURSOR0xeaaf00x134data0.37337662337662336
                                              RT_CURSOR0xeac240x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"0.38636363636363635
                                              RT_CURSOR0xead580x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"0.35714285714285715
                                              RT_CURSOR0xeae8c0x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"0.36688311688311687
                                              RT_CURSOR0xeafc00x134data0.44155844155844154
                                              RT_CURSOR0xeb0f40x134data0.4155844155844156
                                              RT_CURSOR0xeb2280x134data0.2662337662337662
                                              RT_CURSOR0xeb35c0x134data0.2824675324675325
                                              RT_CURSOR0xeb4900x134data0.3246753246753247
                                              RT_BITMAP0xeb5c40x3a0Device independent bitmap graphic, 80 x 11 x 8, image size 0, resolution 3780 x 3780 px/m, 2 important colorsEnglishUnited States0.15301724137931033
                                              RT_BITMAP0xeb9640x1090Device independent bitmap graphic, 100 x 14 x 24, image size 4200, resolution 3779 x 3779 px/mEnglishUnited States0.061556603773584906
                                              RT_BITMAP0xec9f40x16a8Device independent bitmap graphic, 120 x 16 x 24, image size 5760, resolution 3779 x 3779 px/mEnglishUnited States0.046724137931034485
                                              RT_BITMAP0xee09c0x2968Device independent bitmap graphic, 160 x 22 x 24, image size 10560, resolution 3779 x 3779 px/mEnglishUnited States0.038867924528301886
                                              RT_BITMAP0xf0a040x428Device independent bitmap graphic, 128 x 15 x 4, image size 960EnglishUnited States0.3618421052631579
                                              RT_BITMAP0xf0e2c0x368Device independent bitmap graphic, 96 x 16 x 4, image size 768, 16 important colorsEnglishUnited States0.1915137614678899
                                              RT_BITMAP0xf11940x1268Device independent bitmap graphic, 288 x 32 x 4, image size 4608, 16 important colorsEnglishUnited States0.039473684210526314
                                              RT_BITMAP0xf23fc0x1268Device independent bitmap graphic, 288 x 32 x 4, image size 4608, 16 important colorsEnglishUnited States0.039473684210526314
                                              RT_BITMAP0xf36640xba8Device independent bitmap graphic, 240 x 24 x 4, image size 2880, resolution 3779 x 3779 px/mEnglishUnited States0.10924932975871314
                                              RT_BITMAP0xf420c0xb0Device independent bitmap graphic, 64 x 16 x 1, image size 128, 2 important colors0.5284090909090909
                                              RT_BITMAP0xf42bc0x1568Device independent bitmap graphic, 672 x 16 x 4, image size 00.30620437956204377
                                              RT_BITMAP0xf58240x168Device independent bitmap graphic, 32 x 16 x 4, image size 2560.25833333333333336
                                              RT_BITMAP0xf598c0x24cDevice independent bitmap graphic, 88 x 11 x 4, image size 4840.25510204081632654
                                              RT_BITMAP0xf5bd80x158Device independent bitmap graphic, 32 x 15 x 4, image size 2400.436046511627907
                                              RT_BITMAP0xf5d300x24aDevice independent bitmap graphic, 64 x 15 x 4, image size 482, resolution 2834 x 2834 px/m0.30716723549488056
                                              RT_BITMAP0xf5f7c0x1b8Device independent bitmap graphic, 56 x 12 x 4, image size 3360.43863636363636366
                                              RT_BITMAP0xf61340x158Device independent bitmap graphic, 36 x 12 x 4, image size 2400.33430232558139533
                                              RT_BITMAP0xf628c0x158Device independent bitmap graphic, 36 x 12 x 4, image size 2400.36046511627906974
                                              RT_BITMAP0xf63e40x2c0Device independent bitmap graphic, 80 x 15 x 4, image size 6000.2741477272727273
                                              RT_BITMAP0xf66a40x158Device independent bitmap graphic, 32 x 15 x 4, image size 2400.3488372093023256
                                              RT_BITMAP0xf67fc0x2c0Device independent bitmap graphic, 80 x 15 x 4, image size 6000.4005681818181818
                                              RT_BITMAP0xf6abc0x668Device independent bitmap graphic, 20 x 20 x 32, image size 00.3603658536585366
                                              RT_BITMAP0xf71240x668Device independent bitmap graphic, 20 x 20 x 32, image size 00.3567073170731707
                                              RT_BITMAP0xf778c0xc8Device independent bitmap graphic, 10 x 12 x 4, image size 96, resolution 3780 x 3780 px/m0.51
                                              RT_BITMAP0xf78540xecDevice independent bitmap graphic, 22 x 11 x 4, image size 132, resolution 3779 x 3779 px/m0.3898305084745763
                                              RT_BITMAP0xf79400xb8Device independent bitmap graphic, 12 x 10 x 4, image size 800.44565217391304346
                                              RT_BITMAP0xf79f80x144Device independent bitmap graphic, 33 x 11 x 4, image size 2200.37962962962962965
                                              RT_ICON0xf7b3c0x138cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9456434852118305
                                              RT_ICON0xf8ec80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.06349816633147995
                                              RT_ICON0x1096f00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.2491701244813278
                                              RT_ICON0x10bc980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2682926829268293
                                              RT_ICON0x10cd400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.42418032786885246
                                              RT_ICON0x10d6c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4601063829787234
                                              RT_ICON0x10db300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.2950207468879668
                                              RT_ICON0x1100d80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3562382739212008
                                              RT_ICON0x1111800x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.5016393442622951
                                              RT_ICON0x111b080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.574468085106383
                                              RT_ICON0x111f700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.03848547717842324
                                              RT_ICON0x1145180x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720EnglishUnited States0.046005917159763314
                                              RT_ICON0x115f800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.058395872420262666
                                              RT_ICON0x1170280x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.08278688524590164
                                              RT_ICON0x1179b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.1276595744680851
                                              RT_ICON0x117e180xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.27665245202558636
                                              RT_ICON0x118cc00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.2901624548736462
                                              RT_ICON0x1195680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.271889400921659
                                              RT_ICON0x119c300x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.20014450867052022
                                              RT_ICON0x11a1980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.15487551867219918
                                              RT_ICON0x11c7400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2523452157598499
                                              RT_ICON0x11d7e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.3651639344262295
                                              RT_ICON0x11e1700x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5115248226950354
                                              RT_ICON0x11e5d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5631663113006397
                                              RT_ICON0x11f4800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6805054151624549
                                              RT_ICON0x11fd280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.5702764976958525
                                              RT_ICON0x1203f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3258670520231214
                                              RT_ICON0x1209580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.15829875518672198
                                              RT_ICON0x122f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2579737335834897
                                              RT_ICON0x123fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.3790983606557377
                                              RT_ICON0x1249300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5132978723404256
                                              RT_ICON0x124d980x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.0953757225433526
                                              RT_ICON0x1253000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.24097510373443984
                                              RT_ICON0x1278a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.37030956848030017
                                              RT_ICON0x1289500x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.46557377049180326
                                              RT_ICON0x1292d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6338652482269503
                                              RT_ICON0x1297400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.4118663594470046
                                              RT_ICON0x129e080x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.06937883797827114
                                              RT_ICON0x12e0300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.10560165975103734
                                              RT_ICON0x1305d80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 67200.12337278106508875
                                              RT_ICON0x1320400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.1343808630393996
                                              RT_ICON0x1330e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.2647540983606557
                                              RT_ICON0x133a700x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 16800.2633720930232558
                                              RT_ICON0x1341280x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.2801418439716312
                                              RT_ICON0x1345900x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.0776452527161077
                                              RT_ICON0x1387b80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.10612033195020747
                                              RT_ICON0x13ad600x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 67200.16272189349112426
                                              RT_ICON0x13c7c80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.18691369606003752
                                              RT_ICON0x13d8700x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.29221311475409834
                                              RT_ICON0x13e1f80x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 16800.3436046511627907
                                              RT_ICON0x13e8b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.30851063829787234
                                              RT_ICON0x13ed180x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.059931506849315065
                                              RT_ICON0x142f400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.09647302904564316
                                              RT_ICON0x1454e80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 67200.11079881656804734
                                              RT_ICON0x146f500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.12288930581613508
                                              RT_ICON0x147ff80x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.21762295081967212
                                              RT_ICON0x1489800x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 16800.24302325581395348
                                              RT_ICON0x1490380x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.2526595744680851
                                              RT_ICON0x1494a00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.09169815777042985
                                              RT_ICON0x14d6c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.11991701244813278
                                              RT_ICON0x14fc700x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 67200.1853550295857988
                                              RT_ICON0x1516d80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.21974671669793622
                                              RT_ICON0x1527800x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.32008196721311477
                                              RT_ICON0x1531080x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 16800.37790697674418605
                                              RT_ICON0x1537c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.39184397163120566
                                              RT_ICON0x153c280x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.0886868209730751
                                              RT_ICON0x157e500x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.13309128630705394
                                              RT_ICON0x15a3f80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 67200.14852071005917158
                                              RT_ICON0x15be600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.175422138836773
                                              RT_ICON0x15cf080x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.28852459016393445
                                              RT_ICON0x15d8900x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 16800.3377906976744186
                                              RT_ICON0x15df480x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.35638297872340424
                                              RT_ICON0x15e3b00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.02202409069437884
                                              RT_ICON0x1625d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.028526970954356846
                                              RT_ICON0x164b800x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 67200.033579881656804735
                                              RT_ICON0x1665e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.04221388367729831
                                              RT_ICON0x1676900x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.05450819672131148
                                              RT_ICON0x1680180x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 16800.06511627906976744
                                              RT_ICON0x1686d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.07446808510638298
                                              RT_MENU0x168b380x832dataEnglishUnited States0.42087702573879887
                                              RT_MENU0x16936c0xacdataEnglishUnited States0.6569767441860465
                                              RT_MENU0x1694180x690dataEnglishUnited States0.3142857142857143
                                              RT_MENU0x169aa80xb0Matlab v4 mat-file (little endian) &, numeric, rows 5505168, columns 6357106, imaginaryEnglishUnited States0.6534090909090909
                                              RT_MENU0x169b580x1ccdataEnglishUnited States0.45869565217391306
                                              RT_MENU0x169d240x1d0dataEnglishUnited States0.49353448275862066
                                              RT_MENU0x169ef40x144dataEnglishUnited States0.49074074074074076
                                              RT_MENU0x16a0380x1e2dataEnglishUnited States0.34854771784232363
                                              RT_MENU0x16a21c0x9adataEnglishUnited States0.5909090909090909
                                              RT_MENU0x16a2b80x222dataEnglishUnited States0.4175824175824176
                                              RT_DIALOG0x16a4dc0x122dataEnglishUnited States0.6275862068965518
                                              RT_DIALOG0x16a6000x4eadataEnglishUnited States0.42845786963434024
                                              RT_DIALOG0x16aaec0x3b0dataEnglishUnited States0.4099576271186441
                                              RT_DIALOG0x16ae9c0x20adataEnglishUnited States0.5019157088122606
                                              RT_DIALOG0x16b0a80x128dataEnglishUnited States0.6114864864864865
                                              RT_DIALOG0x16b1d00x294dataEnglishUnited States0.4318181818181818
                                              RT_DIALOG0x16b4640x2a4dataEnglishUnited States0.4334319526627219
                                              RT_DIALOG0x16b7080x428dataEnglishUnited States0.36466165413533835
                                              RT_DIALOG0x16bb300x36cdataEnglishUnited States0.4691780821917808
                                              RT_DIALOG0x16be9c0x23cdataEnglishUnited States0.48776223776223776
                                              RT_DIALOG0x16c0d80x20edataEnglishUnited States0.5038022813688213
                                              RT_DIALOG0x16c2e80x212dataEnglishUnited States0.569811320754717
                                              RT_DIALOG0x16c4fc0xa0dataEnglishUnited States0.58125
                                              RT_DIALOG0x16c59c0x690dataEnglishUnited States0.3535714285714286
                                              RT_DIALOG0x16cc2c0x276dataEnglishUnited States0.44126984126984126
                                              RT_DIALOG0x16cea40x2c4dataEnglishUnited States0.4505649717514124
                                              RT_DIALOG0x16d1680x2bcdataEnglishUnited States0.48142857142857143
                                              RT_DIALOG0x16d4240x16edataEnglishUnited States0.5109289617486339
                                              RT_DIALOG0x16d5940x350dataEnglishUnited States0.44221698113207547
                                              RT_DIALOG0x16d8e40x1f4dataEnglishUnited States0.486
                                              RT_DIALOG0x16dad80x104dataEnglishUnited States0.6
                                              RT_DIALOG0x16dbdc0x52data0.8048780487804879
                                              RT_DIALOG0x16dc300x128dataEnglishUnited States0.5844594594594594
                                              RT_DIALOG0x16dd580x436dataEnglishUnited States0.32189239332096475
                                              RT_DIALOG0x16e1900xa0dataEnglishUnited States0.7
                                              RT_DIALOG0x16e2300x26adataEnglishUnited States0.4563106796116505
                                              RT_DIALOG0x16e49c0x20adataEnglishUnited States0.524904214559387
                                              RT_DIALOG0x16e6a80x3ccdataEnglishUnited States0.40843621399176955
                                              RT_DIALOG0x16ea740x286dataEnglishUnited States0.47523219814241485
                                              RT_DIALOG0x16ecfc0xf8dataEnglishUnited States0.6209677419354839
                                              RT_DIALOG0x16edf40x140dataEnglishUnited States0.55625
                                              RT_DIALOG0x16ef340xd8dataEnglishUnited States0.6064814814814815
                                              RT_DIALOG0x16f00c0x15adataEnglishUnited States0.5115606936416185
                                              RT_DIALOG0x16f1680xe8data0.6336206896551724
                                              RT_DIALOG0x16f2500x1a2data0.4688995215311005
                                              RT_DIALOG0x16f3f40x15adata0.5086705202312138
                                              RT_DIALOG0x16f5500x34data0.9038461538461539
                                              RT_DIALOG0x16f5840x29adata0.35735735735735735
                                              RT_DIALOG0x16f8200x23adata0.543859649122807
                                              RT_DIALOG0x16fa5c0x126data0.6122448979591837
                                              RT_STRING0x16fb840x24dataEnglishUnited States0.4444444444444444
                                              RT_STRING0x16fba80x4edataEnglishUnited States0.6794871794871795
                                              RT_STRING0x16fbf80xd8dataEnglishUnited States0.4722222222222222
                                              RT_STRING0x16fcd00xccdataEnglishUnited States0.6421568627450981
                                              RT_STRING0x16fd9c0x7cMatlab v4 mat-file (little endian) l, numeric, rows 0, columns 0EnglishUnited States0.6532258064516129
                                              RT_STRING0x16fe180x3cdataEnglishUnited States0.6333333333333333
                                              RT_STRING0x16fe540x94dataEnglishUnited States0.6554054054054054
                                              RT_STRING0x16fee80x42Matlab v4 mat-file (little endian) e, numeric, rows 0, columns 0EnglishUnited States0.7121212121212122
                                              RT_STRING0x16ff2c0x5cdataEnglishUnited States0.6739130434782609
                                              RT_STRING0x16ff880x42dataEnglishUnited States0.7121212121212122
                                              RT_STRING0x16ffcc0x104dataEnglishUnited States0.43846153846153846
                                              RT_STRING0x1700d00x7adataEnglishUnited States0.7131147540983607
                                              RT_STRING0x17014c0x126dataEnglishUnited States0.5816326530612245
                                              RT_STRING0x1702740x2a2AmigaOS bitmap font "R", fc_YSize 8192, 2560 elements, 2nd "a", 3rd "m"EnglishUnited States0.4421364985163205
                                              RT_STRING0x1705180x82edataEnglishUnited States0.3237822349570201
                                              RT_STRING0x170d480x260dataEnglishUnited States0.4342105263157895
                                              RT_STRING0x170fa80xcadataEnglishUnited States0.49504950495049505
                                              RT_STRING0x1710740x12eMatlab v4 mat-file (little endian) e, numeric, rows 0, columns 0EnglishUnited States0.47019867549668876
                                              RT_STRING0x1711a40x24edataEnglishUnited States0.4576271186440678
                                              RT_STRING0x1713f40x260dataEnglishUnited States0.4555921052631579
                                              RT_STRING0x1716540x4dcdataEnglishUnited States0.3520900321543408
                                              RT_STRING0x171b300xb8AmigaOS bitmap font "t", 21248 elements, 2nd, 3rdEnglishUnited States0.6684782608695652
                                              RT_STRING0x171be80x10edataEnglishUnited States0.5037037037037037
                                              RT_STRING0x171cf80x5edataEnglishUnited States0.6382978723404256
                                              RT_STRING0x171d580xa0Matlab v4 mat-file (little endian) A, numeric, rows 0, columns 0EnglishUnited States0.6875
                                              RT_STRING0x171df80x11edataEnglishUnited States0.48951048951048953
                                              RT_STRING0x171f180x10adataEnglishUnited States0.575187969924812
                                              RT_STRING0x1720240x80Matlab v4 mat-file (little endian) c, numeric, rows 0, columns 0EnglishUnited States0.5625
                                              RT_STRING0x1720a40x5edataEnglishUnited States0.6595744680851063
                                              RT_STRING0x1721040x106dataEnglishUnited States0.5458015267175572
                                              RT_STRING0x17220c0x102StarOffice Gallery theme q, 1795190272 objects, 1st oEnglishUnited States0.5852713178294574
                                              RT_STRING0x1723100x12eAmigaOS bitmap font "i", fc_YSize 28416, 19456 elements, 2nd "o", 3rdEnglishUnited States0.5761589403973509
                                              RT_STRING0x1724400x66dataEnglishUnited States0.5588235294117647
                                              RT_STRING0x1724a80x62dataEnglishUnited States0.4897959183673469
                                              RT_STRING0x17250c0x38dataEnglishUnited States0.625
                                              RT_STRING0x1725440xaadataEnglishUnited States0.6705882352941176
                                              RT_STRING0x1725f00x74dataEnglishUnited States0.31896551724137934
                                              RT_STRING0x1726640x66dataEnglishUnited States0.6078431372549019
                                              RT_STRING0x1726cc0x5adataEnglishUnited States0.5111111111111111
                                              RT_STRING0x1727280xa0dataEnglishUnited States0.60625
                                              RT_STRING0x1727c80x13edataEnglishUnited States0.5566037735849056
                                              RT_STRING0x1729080x13eMatlab v4 mat-file (little endian) o, numeric, rows 0, columns 0EnglishUnited States0.5220125786163522
                                              RT_STRING0x172a480x5adataEnglishUnited States0.6111111111111112
                                              RT_STRING0x172aa40x9cdataEnglishUnited States0.6858974358974359
                                              RT_STRING0x172b400xa6Matlab v4 mat-file (little endian) C, numeric, rows 0, columns 0EnglishUnited States0.5602409638554217
                                              RT_STRING0x172be80x232dataEnglishUnited States0.4234875444839858
                                              RT_STRING0x172e1c0x594dataEnglishUnited States0.3382352941176471
                                              RT_STRING0x1733b00x1a8dataEnglishUnited States0.5660377358490566
                                              RT_STRING0x1735580x70Matlab v4 mat-file (little endian) b, numeric, rows 0, columns 0EnglishUnited States0.6607142857142857
                                              RT_STRING0x1735c80x1fedataEnglishUnited States0.5117647058823529
                                              RT_STRING0x1737c80xecdataEnglishUnited States0.5805084745762712
                                              RT_STRING0x1738b40x52dataEnglishUnited States0.7073170731707317
                                              RT_STRING0x1739080x3edata0.5806451612903226
                                              RT_STRING0x1739480x36dataEnglishUnited States0.6296296296296297
                                              RT_STRING0x1739800x2f8data0.3355263157894737
                                              RT_STRING0x173c780x260data0.0805921052631579
                                              RT_STRING0x173ed80x40adata0.3152804642166344
                                              RT_STRING0x1742e40x27cdata0.33176100628930816
                                              RT_STRING0x1745600x2a2data0.4258160237388724
                                              RT_STRING0x1748040xdadata0.43119266055045874
                                              RT_STRING0x1748e00x6cdata0.5
                                              RT_STRING0x17494c0x162data0.4293785310734463
                                              RT_STRING0x174ab00x460data0.06160714285714286
                                              RT_STRING0x174f100x4edata0.717948717948718
                                              RT_STRING0x174f600x4cdataEnglishUnited States0.6842105263157895
                                              RT_STRING0x174fac0xc6data0.41919191919191917
                                              RT_STRING0x1750740x12edata0.3543046357615894
                                              RT_STRING0x1751a40x1f8data0.36706349206349204
                                              RT_STRING0x17539c0xaedata0.5689655172413793
                                              RT_STRING0x17544c0x4cdata0.6447368421052632
                                              RT_STRING0x1754980xa4data0.6097560975609756
                                              RT_STRING0x17553c0x6cdataEnglishUnited States0.7129629629629629
                                              RT_STRING0x1755a80x184data0.48711340206185566
                                              RT_STRING0x17572c0x124data0.4897260273972603
                                              RT_STRING0x1758500x130Matlab v4 mat-file (little endian) &, numeric, rows 0, columns 00.5361842105263158
                                              RT_STRING0x1759800x142AmigaOS bitmap font "i", fc_YSize 24832, 16896 elements, 2nd "t", 3rd0.4906832298136646
                                              RT_STRING0x175ac40x4eedata0.375594294770206
                                              RT_STRING0x175fb40x264data0.3333333333333333
                                              RT_STRING0x1762180x2dadata0.3698630136986301
                                              RT_STRING0x1764f40x8adata0.6594202898550725
                                              RT_STRING0x1765800x54adata0.3552437223042836
                                              RT_STRING0x176acc0xdedata0.536036036036036
                                              RT_STRING0x176bac0x4a8data0.3221476510067114
                                              RT_STRING0x1770540x228data0.4003623188405797
                                              RT_STRING0x17727c0x2cdata0.5227272727272727
                                              RT_STRING0x1772a80x5f4Targa image data - Color 101 x 100 x 32 +105 +1080.3589238845144357
                                              RT_STRING0x17789c0x440data0.3713235294117647
                                              RT_STRING0x177cdc0x250data0.47466216216216217
                                              RT_STRING0x177f2c0x53edata0.2965722801788376
                                              RT_STRING0x17846c0x198data0.41911764705882354
                                              RT_STRING0x1786040x162data0.5112994350282486
                                              RT_STRING0x1787680x284AmigaOS bitmap font "P", fc_YSize 29184, 10240 elements, 2nd "|", 3rd "r"0.40062111801242234
                                              RT_STRING0x1789ec0x6eAmigaOS bitmap font "r", 16896 elements, 2nd, 3rd0.6818181818181818
                                              RT_STRING0x178a5c0x46data0.6285714285714286
                                              RT_STRING0x178aa40x268data0.30844155844155846
                                              RT_STRING0x178d0c0x21adata0.4368029739776952
                                              RT_STRING0x178f280x328data0.37995049504950495
                                              RT_STRING0x1792500x190data0.485
                                              RT_FONTDIR0x1793e00xa1dataEnglishUnited States0.968944099378882
                                              RT_FONT0x1794840x1148TrueType Font data, 13 tables, 1st "FFTM", 14 names, Macintosh0.5915461121157324
                                              RT_ACCELERATOR0x17a5cc0x98dataEnglishUnited States0.7368421052631579
                                              RT_ACCELERATOR0x17a6640xc0dataEnglishUnited States0.5572916666666666
                                              RT_ACCELERATOR0x17a7240x18data1.2083333333333333
                                              RT_GROUP_CURSOR0x17a73c0x3eLotus unknown worksheet or configuration, revision 0x4EnglishUnited States0.8225806451612904
                                              RT_GROUP_CURSOR0x17a77c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x17a7900x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                              RT_GROUP_CURSOR0x17a7a40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a7b80x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a7cc0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a7e00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a7f40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a8080x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a81c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a8300x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a8440x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a8580x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a86c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a8800x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a8940x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a8a80x22Lotus unknown worksheet or configuration, revision 0x21.0294117647058822
                                              RT_GROUP_CURSOR0x17a8cc0x22Lotus unknown worksheet or configuration, revision 0x21.0294117647058822
                                              RT_GROUP_CURSOR0x17a8f00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a9040x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a9180x22Lotus unknown worksheet or configuration, revision 0x21.0294117647058822
                                              RT_GROUP_CURSOR0x17a93c0x22Lotus unknown worksheet or configuration, revision 0x21.0294117647058822
                                              RT_GROUP_CURSOR0x17a9600x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a9740x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a9880x14Lotus unknown worksheet or configuration, revision 0x11.25
                                              RT_GROUP_CURSOR0x17a99c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a9b00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a9c40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a9d80x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17a9ec0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17aa000x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17aa140x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17aa280x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17aa3c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17aa500x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x17aa640x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_ICON0x17aa780x5adataEnglishUnited States0.7777777777777778
                                              RT_GROUP_ICON0x17aad40x3edataEnglishUnited States0.8870967741935484
                                              RT_GROUP_ICON0x17ab140x4cdataEnglishUnited States0.8421052631578947
                                              RT_GROUP_ICON0x17ab600x76dataEnglishUnited States0.6694915254237288
                                              RT_GROUP_ICON0x17abd80x76dataEnglishUnited States0.6694915254237288
                                              RT_GROUP_ICON0x17ac500x14dataEnglishUnited States1.25
                                              RT_GROUP_ICON0x17ac640x3edataEnglishUnited States0.8709677419354839
                                              RT_GROUP_ICON0x17aca40x14data1.25
                                              RT_GROUP_ICON0x17acb80x68data0.7884615384615384
                                              RT_GROUP_ICON0x17ad200x68data0.7884615384615384
                                              RT_GROUP_ICON0x17ad880x68data0.7980769230769231
                                              RT_GROUP_ICON0x17adf00x68data0.7788461538461539
                                              RT_GROUP_ICON0x17ae580x68data0.7980769230769231
                                              RT_GROUP_ICON0x17aec00x68data0.7980769230769231
                                              RT_VERSION0x17af280x2b4dataEnglishUnited States0.4667630057803468
                                              None0x17b1dc0x16data1.3181818181818181
                                              None0x17b1f40x1cdataEnglishUnited States1.25
                                              None0x17b2100x14Targa image data 32798 x 32799 x 32 +32796 +32797 - four way interleave "!\200"EnglishUnited States1.3
                                              None0x17b2240x1adataEnglishUnited States1.2692307692307692
                                              None0x17b2400x1adataEnglishUnited States1.2692307692307692
                                              None0x17b25c0x22dataEnglishUnited States1.088235294117647
                                              None0x17b2800x22data1.1470588235294117
                                              None0x17b2a40x14data1.4
                                              None0x17b2b80xcdata1.6666666666666667
                                              None0x17b2c40x16data1.3181818181818181
                                              DLLImport
                                              KERNEL32.dllCreateProcessW, DeleteCriticalSection, EnterCriticalSection, ExpandEnvironmentStringsW, FormatMessageA, GetCommandLineW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentVariableW, GetExitCodeProcess, GetLastError, GetModuleFileNameW, GetModuleHandleA, GetProcAddress, GetShortPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, GetTempPathW, GetTickCount, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryA, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, SetDllDirectoryW, SetEnvironmentVariableW, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualProtect, VirtualQuery, WaitForSingleObject, WideCharToMultiByte
                                              msvcrt.dll__argc, __dllonexit, __lconv_init, __set_app_type, __setusermatherr, __wargv, __wgetmainargs, __winitenv, _amsg_exit, _cexit, _findclose, _findfirst, _fileno, _findnext, _fmode, _fullpath, _get_osfhandle, _initterm, _iob, _lock, _getpid, _mkdir, _onexit, _rmdir, _setmode, _stat, _strdup, _tempnam, _unlock, _vsnprintf, _wcmdln, _wfopen, abort, calloc, clearerr, exit, fclose, feof, ferror, fflush, fprintf, fread, free, fseek, ftell, fwrite, getenv, malloc, mbstowcs, memcpy, memset, remove, setbuf, setlocale, signal, sprintf, strcat, strchr, strcmp, strcpy, strlen, strncat, strncmp, strncpy, strrchr, strtok, vfprintf, wcslen
                                              USER32.dllMessageBoxA
                                              WS2_32.dllntohl
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 18, 2024 14:33:50.994556904 CET49708443192.168.2.620.233.83.145
                                              Dec 18, 2024 14:33:50.994604111 CET4434970820.233.83.145192.168.2.6
                                              Dec 18, 2024 14:33:50.994712114 CET49708443192.168.2.620.233.83.145
                                              Dec 18, 2024 14:33:50.995337963 CET49708443192.168.2.620.233.83.145
                                              Dec 18, 2024 14:33:50.995352030 CET4434970820.233.83.145192.168.2.6
                                              Dec 18, 2024 14:33:52.591790915 CET4434970820.233.83.145192.168.2.6
                                              Dec 18, 2024 14:33:52.591871023 CET49708443192.168.2.620.233.83.145
                                              Dec 18, 2024 14:33:52.595398903 CET49708443192.168.2.620.233.83.145
                                              Dec 18, 2024 14:33:52.595411062 CET4434970820.233.83.145192.168.2.6
                                              Dec 18, 2024 14:33:52.595685005 CET4434970820.233.83.145192.168.2.6
                                              Dec 18, 2024 14:33:52.595882893 CET49708443192.168.2.620.233.83.145
                                              Dec 18, 2024 14:33:52.639354944 CET4434970820.233.83.145192.168.2.6
                                              Dec 18, 2024 14:33:53.535603046 CET4434970820.233.83.145192.168.2.6
                                              Dec 18, 2024 14:33:53.535686016 CET4434970820.233.83.145192.168.2.6
                                              Dec 18, 2024 14:33:53.535764933 CET4434970820.233.83.145192.168.2.6
                                              Dec 18, 2024 14:33:53.535816908 CET4434970820.233.83.145192.168.2.6
                                              Dec 18, 2024 14:33:53.535854101 CET49708443192.168.2.620.233.83.145
                                              Dec 18, 2024 14:33:53.535882950 CET4434970820.233.83.145192.168.2.6
                                              Dec 18, 2024 14:33:53.535921097 CET49708443192.168.2.620.233.83.145
                                              Dec 18, 2024 14:33:53.535921097 CET49708443192.168.2.620.233.83.145
                                              Dec 18, 2024 14:33:53.536413908 CET49708443192.168.2.620.233.83.145
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 18, 2024 14:33:50.849088907 CET5546853192.168.2.61.1.1.1
                                              Dec 18, 2024 14:33:50.987406969 CET53554681.1.1.1192.168.2.6
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Dec 18, 2024 14:33:50.849088907 CET192.168.2.61.1.1.10xdf55Standard query (0)github.comA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Dec 18, 2024 14:33:50.987406969 CET1.1.1.1192.168.2.60xdf55No error (0)github.com20.233.83.145A (IP address)IN (0x0001)false
                                              • github.com
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.64970820.233.83.1454434368C:\Users\user\Desktop\main.exe
                                              TimestampBytes transferredDirectionData
                                              2024-12-18 13:33:52 UTC159OUTGET /franklenzer/0101010101/raw/main/mpc.part01.rar HTTP/1.1
                                              Accept-Encoding: identity
                                              Host: github.com
                                              Connection: close
                                              User-Agent: Python-urllib/2.7
                                              2024-12-18 13:33:53 UTC473INHTTP/1.1 404 Not Found
                                              Server: GitHub.com
                                              Date: Wed, 18 Dec 2024 13:33:53 GMT
                                              Content-Type: text/html; charset=utf-8
                                              Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
                                              Cache-Control: no-cache
                                              Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
                                              X-Frame-Options: deny
                                              X-Content-Type-Options: nosniff
                                              X-XSS-Protection: 0
                                              Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
                                              2024-12-18 13:33:53 UTC3389INData Raw: 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 3a 20 64 65 66 61 75 6c 74 2d 73 72 63 20 27 6e 6f 6e 65 27 3b 20 62 61 73 65 2d 75 72 69 20 27 73 65 6c 66 27 3b 20 63 68 69 6c 64 2d 73 72 63 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 20 67 69 74 68 75 62 2e 63 6f 6d 2f 77 65 62 70 61 63 6b 2f 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 20 67 69 73 74 2e 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 3b 20 63 6f 6e 6e 65 63 74 2d 73 72 63 20 27 73 65 6c 66 27 20 75 70 6c 6f 61 64 73 2e 67 69 74 68 75 62 2e 63 6f 6d 20 77 77 77 2e 67 69 74 68 75 62 73 74 61 74 75 73 2e 63 6f 6d 20 63 6f 6c 6c 65 63 74 6f 72 2e 67 69 74 68 75 62 2e 63 6f
                                              Data Ascii: Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ github.com/webpack/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.co
                                              2024-12-18 13:33:53 UTC248INData Raw: 38 30 30 30 0d 0a 0a 0a 0a 0a 0a 0a 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 0a 20 20 6c 61 6e 67 3d 22 65 6e 22 0a 20 20 0a 20 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 6d 6f 64 65 3d 22 61 75 74 6f 22 20 64 61 74 61 2d 6c 69 67 68 74 2d 74 68 65 6d 65 3d 22 6c 69 67 68 74 22 20 64 61 74 61 2d 64 61 72 6b 2d 74 68 65 6d 65 3d 22 64 61 72 6b 22 0a 20 20 64 61 74 61 2d 61 31 31 79 2d 61 6e 69 6d 61 74 65 64 2d 69 6d 61 67 65 73 3d 22 73 79 73 74 65 6d 22 20 64 61 74 61 2d 61 31 31 79 2d 6c 69 6e 6b 2d 75 6e 64 65 72 6c 69 6e 65 73 3d 22 74 72 75 65 22 0a 20 20 0a 20 20 3e 0a 0a 0a 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72
                                              Data Ascii: 8000<!DOCTYPE html><html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system" data-a11y-link-underlines="true" > <head> <meta charset="utf-8"> <link r
                                              2024-12-18 13:33:53 UTC1370INData Raw: 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 61 76 61 74 61 72 73 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2d 63 6c 6f 75 64 2e 73 33 2e 61 6d 61 7a 6f 6e 61 77 73 2e 63 6f 6d 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 75 73 65 72 2d 69 6d 61 67 65
                                              Data Ascii: el="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch" href="https://github-cloud.s3.amazonaws.com"> <link rel="dns-prefetch" href="https://user-image
                                              2024-12-18 13:33:53 UTC1370INData Raw: 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 64 61 74 61 2d 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 64 61 72 6b 5f 63 6f 6c 6f 72 62 6c 69 6e 64 2d 37 30 30 39 37 66 37 35 61 65 63 31 2e 63 73 73 22 20 2f 3e 3c 6c 69 6e 6b 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 74 68 65 6d 65 3d 22 6c 69 67 68 74 5f 63 6f 6c 6f 72 62 6c 69 6e 64 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 64 61 74 61 2d 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75
                                              Data Ascii: ssorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_colorblind-70097f75aec1.css" /><link data-color-theme="light_colorblind" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://githu


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:08:33:48
                                              Start date:18/12/2024
                                              Path:C:\Users\user\Desktop\main.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\main.exe"
                                              Imagebase:0x400000
                                              File size:5'620'920 bytes
                                              MD5 hash:935DDF8C175DA8CB95FFF0870E0718FC
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:2
                                              Start time:08:33:48
                                              Start date:18/12/2024
                                              Path:C:\Users\user\Desktop\main.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\main.exe"
                                              Imagebase:0x400000
                                              File size:5'620'920 bytes
                                              MD5 hash:935DDF8C175DA8CB95FFF0870E0718FC
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:5.5%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:29.1%
                                                Total number of Nodes:1226
                                                Total number of Limit Nodes:30
                                                execution_graph 6225 402440 6226 40244e 6225->6226 6227 402474 6226->6227 6228 401610 21 API calls 6226->6228 6229 4015d0 2 API calls 6226->6229 6231 402570 6226->6231 6232 40253f free 6226->6232 6230 4024a9 strcpy 6228->6230 6229->6226 6230->6226 6233 401e10 MessageBoxA 6231->6233 6232->6226 6234 40258c 6233->6234 6235 404249 6242 404250 6235->6242 6236 4015d0 2 API calls 6236->6242 6237 404341 6238 401610 21 API calls 6238->6242 6239 404300 ntohl 6239->6242 6240 401e10 MessageBoxA 6240->6242 6241 4042ea free 6241->6242 6242->6236 6242->6237 6242->6238 6242->6239 6242->6240 6242->6241 6561 403d4c 6562 403d50 setlocale free 6561->6562 5317 401850 5332 401610 5317->5332 5324 4018a6 fwrite 5326 4018c3 5324->5326 5327 4018c7 fclose free 5324->5327 5325 4018f8 5328 401e10 MessageBoxA 5325->5328 5326->5327 5329 4018e1 5326->5329 5330 4018d9 5327->5330 5328->5330 5382 401e10 5329->5382 5333 401790 5332->5333 5334 40162f ntohl fseek ntohl malloc 5332->5334 5385 402e70 5333->5385 5335 4017ce 5334->5335 5336 401678 ntohl fread 5334->5336 5341 401e70 MessageBoxA 5335->5341 5338 4017c0 5336->5338 5339 4016ad 5336->5339 5344 401e70 MessageBoxA 5338->5344 5342 4016b3 5339->5342 5349 4016d6 ntohl malloc 5339->5349 5340 4017a3 5340->5334 5343 4017ad 5340->5343 5345 4017e1 5341->5345 5346 4016c7 5342->5346 5347 4016b9 fclose 5342->5347 5390 401e70 5343->5390 5344->5335 5350 401e70 MessageBoxA 5345->5350 5362 4047a0 5346->5362 5347->5346 5351 4016f5 ntohl ntohl 5349->5351 5352 40183a 5349->5352 5353 4017fe free 5350->5353 5354 401753 5351->5354 5355 401e70 MessageBoxA 5352->5355 5356 401e70 MessageBoxA 5353->5356 5354->5345 5358 40175b 5354->5358 5357 40181b 5355->5357 5356->5357 5357->5353 5359 401e70 MessageBoxA 5357->5359 5358->5357 5360 401773 5358->5360 5359->5357 5361 40177b free 5360->5361 5361->5342 5363 401875 5362->5363 5364 4047b4 5362->5364 5363->5330 5368 4049d0 5363->5368 5408 4046d0 5364->5408 5366 4047c2 5366->5363 5367 401e10 MessageBoxA 5366->5367 5367->5363 5369 40a5e0 5368->5369 5370 4049dd strcpy strcpy strtok 5369->5370 5371 404ab0 5370->5371 5374 404a2e 5370->5374 5434 40a620 5371->5434 5374->5374 5376 404a49 strcpy strtok 5374->5376 5380 40a620 6 API calls 5374->5380 5381 404aa2 _mkdir 5374->5381 5375 404ac0 5378 402e70 7 API calls 5375->5378 5376->5371 5376->5374 5377 401e70 MessageBoxA 5377->5375 5379 40188f ntohl 5378->5379 5379->5324 5379->5325 5380->5374 5381->5371 5381->5374 5383 40a610 5382->5383 5384 401e41 MessageBoxA 5383->5384 5384->5330 5393 405210 5385->5393 5388 405210 6 API calls 5389 402eb6 _wfopen 5388->5389 5389->5340 5391 40a610 5390->5391 5392 401ea1 MessageBoxA 5391->5392 5392->5346 5394 405260 MultiByteToWideChar 5393->5394 5395 405226 MultiByteToWideChar 5393->5395 5398 4052d0 5394->5398 5399 40529a malloc 5394->5399 5396 4052b0 5395->5396 5397 402e9b 5395->5397 5406 404e70 GetLastError FormatMessageA 5396->5406 5397->5388 5407 404e70 GetLastError FormatMessageA 5398->5407 5399->5395 5402 4052b5 5404 401e10 MessageBoxA 5402->5404 5403 4052d5 5405 401e10 MessageBoxA 5403->5405 5404->5397 5405->5397 5406->5402 5407->5403 5417 40a5e0 5408->5417 5413 404735 _tempnam _mkdir 5414 404770 strcpy free 5413->5414 5415 404750 free 5413->5415 5414->5366 5415->5413 5416 40475d 5415->5416 5416->5366 5418 4046de GetTempPathW 5417->5418 5419 405070 5418->5419 5420 4050d0 WideCharToMultiByte 5419->5420 5421 405086 WideCharToMultiByte 5419->5421 5424 405150 5420->5424 5425 40511a malloc 5420->5425 5422 405130 5421->5422 5423 40471c _getpid sprintf 5421->5423 5432 404e70 GetLastError FormatMessageA 5422->5432 5423->5413 5433 404e70 GetLastError FormatMessageA 5424->5433 5425->5421 5428 405135 5430 401e10 MessageBoxA 5428->5430 5429 405155 5431 401e10 MessageBoxA 5429->5431 5430->5423 5431->5423 5432->5428 5433->5429 5435 40a633 5434->5435 5436 40a63a _stat 5434->5436 5435->5436 5437 40a6a0 strlen 5435->5437 5438 404abc 5436->5438 5437->5436 5441 40a6b3 5437->5441 5438->5375 5438->5377 5439 40a78c 5439->5436 5440 40a6ea malloc memcpy _stat 5440->5438 5442 40a726 free 5440->5442 5441->5436 5441->5439 5441->5440 5442->5438 6243 406e55 6245 406150 6243->6245 6246 4064bc 6245->6246 6247 405850 6245->6247 6248 40589c 6247->6248 6249 405869 6247->6249 6248->6245 6250 405874 memcpy 6249->6250 6251 4058dd memcpy 6249->6251 6250->6248 6252 405922 memcpy 6250->6252 6251->6245 6252->6245 6570 40a159 6571 40a160 6570->6571 6572 40a180 EnterCriticalSection 6571->6572 6573 40a173 6571->6573 6574 40a1b1 LeaveCriticalSection 6572->6574 6575 40a19a 6572->6575 6577 40a1c1 6574->6577 6575->6574 6576 40a1a0 free LeaveCriticalSection 6575->6576 6576->6577 6579 402959 6580 402960 strcpy strcpy 6579->6580 6581 4028b7 6580->6581 6582 4026a0 23 API calls 6581->6582 6583 4028bf 6582->6583 6584 402700 129 API calls 6583->6584 6585 4028c7 6584->6585 6253 407c5c 6254 407c72 6253->6254 6256 407c94 6253->6256 6255 405850 3 API calls 6254->6255 6254->6256 6255->6256 6257 409e5c 6258 409e60 6257->6258 6259 4097a0 4 API calls 6258->6259 6260 409e8e 6259->6260 6590 406b5c 6592 406375 6590->6592 6593 4064bc 6590->6593 6591 405850 3 API calls 6591->6592 6592->6591 6592->6593 6594 40a160 6595 40a180 EnterCriticalSection 6594->6595 6596 40a173 6594->6596 6597 40a1b1 LeaveCriticalSection 6595->6597 6598 40a19a 6595->6598 6600 40a1c1 6597->6600 6598->6597 6599 40a1a0 free LeaveCriticalSection 6598->6599 6599->6600 6602 405d60 6604 405d65 6602->6604 6603 405850 3 API calls 6603->6604 6604->6603 6605 4064bc 6604->6605 6261 404069 6262 404070 6261->6262 6263 4053e0 9 API calls 6262->6263 6264 404075 6263->6264 6265 40412d 6264->6265 6266 40407f 6264->6266 6267 401e10 MessageBoxA 6265->6267 6268 403da0 free 6266->6268 6270 40410d 6267->6270 6269 4040a2 6268->6269 6271 401e10 MessageBoxA 6270->6271 6272 403f4a 6271->6272 6188 40a76c 6190 40a6d9 6188->6190 6189 40a63a _stat 6193 40a64c 6189->6193 6190->6189 6191 40a78c 6190->6191 6192 40a6ea malloc memcpy _stat 6190->6192 6191->6189 6192->6193 6194 40a726 free 6192->6194 6194->6193 6277 402c72 _fullpath 5445 401179 5446 40119e 5445->5446 5447 401487 GetStartupInfoW 5446->5447 5448 4011ef 5446->5448 5450 401498 _initterm 5447->5450 5449 401224 5448->5449 5451 40120a Sleep 5448->5451 5452 401234 5449->5452 5453 40143c _amsg_exit 5449->5453 5456 4014bb 5450->5456 5451->5448 5452->5450 5455 401241 5452->5455 5454 401456 _initterm 5453->5454 5459 401259 5453->5459 5454->5459 5455->5454 5455->5459 5457 4014c2 exit 5456->5457 5483 409b80 5459->5483 5460 40128b SetUnhandledExceptionFilter 5461 4012ac 5460->5461 5462 40132b malloc 5461->5462 5464 4012c6 5461->5464 5462->5456 5463 401358 5462->5463 5465 40136d 5463->5465 5464->5461 5464->5462 5466 401380 malloc memcpy 5465->5466 5466->5463 5467 4013a9 5466->5467 5475 409eb0 5467->5475 5469 4013c4 5480 409ed0 5469->5480 5472 401403 5473 401417 5472->5473 5474 40140d _cexit 5472->5474 5474->5473 5476 409eb9 5475->5476 5478 409e60 5475->5478 5476->5469 5494 4097a0 5478->5494 5505 401510 5480->5505 5484 409b89 5483->5484 5485 409b90 5483->5485 5484->5460 5487 409c88 5485->5487 5488 409c1b 5485->5488 5490 409c70 5485->5490 5489 409cc3 5487->5489 5487->5490 6142 409a40 5487->6142 5488->5489 5488->5490 5491 409a40 VirtualQuery VirtualQuery VirtualProtect 5488->5491 5489->5490 5492 409cf2 VirtualQuery 5489->5492 5490->5460 5491->5488 5492->5490 5493 409d18 VirtualProtect 5492->5493 5493->5489 5497 4096e0 5494->5497 5496 4097af 5496->5469 5498 4096f1 5497->5498 5499 409780 _onexit 5498->5499 5500 4096fe _lock 5498->5500 5499->5496 5501 409717 5500->5501 5502 409728 __dllonexit 5501->5502 5503 409756 5502->5503 5504 409767 _unlock 5503->5504 5504->5496 5560 405170 malloc 5505->5560 5507 40152d 5510 402780 5507->5510 5509 4013f0 5509->5457 5509->5472 5511 40a5e0 5510->5511 5512 40278e calloc 5511->5512 5513 402a77 5512->5513 5514 4027ae 5512->5514 5516 401e10 MessageBoxA 5513->5516 5612 402d90 5514->5612 5518 402a83 5516->5518 5517 4027ce 5567 402e40 strcpy strlen 5517->5567 5520 4027e1 5568 404560 5520->5568 5522 4027f9 5577 404680 5522->5577 5524 402807 5580 401c90 5524->5580 5527 4028e0 5533 401c90 34 API calls 5527->5533 5528 402853 5529 402993 5528->5529 5530 402875 5528->5530 5587 402300 5529->5587 5531 405210 6 API calls 5530->5531 5534 40288d SetDllDirectoryW free strcmp 5531->5534 5536 40292b 5533->5536 5537 402960 strcpy strcpy 5534->5537 5538 4028b7 5534->5538 5536->5528 5542 402933 5536->5542 5537->5538 5626 4026a0 5538->5626 5541 405210 6 API calls 5544 402a48 SetDllDirectoryW free 5541->5544 5545 401e10 MessageBoxA 5542->5545 5544->5509 5548 40294e 5545->5548 5548->5537 5550 4028c7 5548->5550 5550->5509 5551 4029d3 5553 404560 12 API calls 5551->5553 5552 402a0f 5555 402a1a 5552->5555 5648 404800 5552->5648 5558 4029df 5553->5558 5642 401d40 5555->5642 5557 402a22 5557->5541 5558->5552 5604 404c80 5558->5604 5561 4051a0 5560->5561 5562 40519a 5560->5562 5561->5562 5563 405070 6 API calls 5561->5563 5564 4051c9 5561->5564 5562->5507 5563->5561 5565 4051e2 free 5564->5565 5566 4051d0 free 5564->5566 5565->5507 5566->5565 5566->5566 5567->5520 5569 40456b 5568->5569 5570 405210 6 API calls 5569->5570 5571 404590 GetEnvironmentVariableW 5570->5571 5572 4045c0 ExpandEnvironmentStringsW 5571->5572 5573 4045ac 5571->5573 5574 405070 6 API calls 5572->5574 5573->5522 5575 4045f7 5574->5575 5575->5573 5576 404600 _strdup 5575->5576 5576->5522 5578 405210 6 API calls 5577->5578 5579 4046a1 SetEnvironmentVariableW free 5578->5579 5579->5524 5661 401c20 strcpy strcat strcpy strcpy 5580->5661 5582 401cb0 5583 401cd4 5582->5583 5662 401910 5582->5662 5583->5527 5583->5528 5585 401cbc 5585->5583 5586 401cc6 fclose 5585->5586 5586->5583 5588 402326 5587->5588 5590 402312 5587->5590 5588->5557 5591 402380 5588->5591 5590->5588 5692 4015d0 ntohl 5590->5692 5592 4023a9 5591->5592 5596 4023b0 5591->5596 5592->5552 5599 404610 5592->5599 5595 4015d0 2 API calls 5595->5596 5596->5595 5597 4023ea 5596->5597 5696 401850 5596->5696 5711 401f40 5596->5711 5597->5592 5598 401d40 2 API calls 5597->5598 5598->5597 5600 405210 6 API calls 5599->5600 5601 404632 5600->5601 5602 405210 6 API calls 5601->5602 5603 404650 SetEnvironmentVariableW free free 5602->5603 5603->5551 5605 404c8d 5604->5605 5606 405210 6 API calls 5605->5606 5607 404cbd 13 API calls 5606->5607 5608 404e30 WaitForSingleObject GetExitCodeProcess 5607->5608 5609 404e0e 5607->5609 5608->5552 5610 401e10 MessageBoxA 5609->5610 5611 404e1a 5610->5611 5611->5552 5611->5608 5613 40a5e0 5612->5613 5614 402d9b GetModuleFileNameW 5613->5614 5615 402df0 5614->5615 5616 402dc1 5614->5616 5781 404e70 GetLastError FormatMessageA 5615->5781 5618 405070 6 API calls 5616->5618 5620 402ddc 5618->5620 5619 402df5 5621 401e10 MessageBoxA 5619->5621 5623 402de0 5620->5623 5782 404e70 GetLastError FormatMessageA 5620->5782 5621->5623 5623->5517 5624 402e11 5625 401e10 MessageBoxA 5624->5625 5625->5623 5783 401d90 strlen 5626->5783 5629 4026e0 5633 402700 5629->5633 5631 4026d6 5798 4052f0 5631->5798 5808 403b40 5633->5808 5637 402726 5641 40273e 5637->5641 5871 404170 5637->5871 5641->5550 5643 401d4c 5642->5643 5647 401d69 5642->5647 5644 401d53 free 5643->5644 5645 401d5b 5643->5645 5644->5645 5646 401d61 fclose 5645->5646 5645->5647 5646->5647 5647->5557 5649 40a5e0 5648->5649 5650 40480e strcpy strlen 5649->5650 5651 404851 _findfirst 5650->5651 5652 404848 5650->5652 5654 4048e1 _rmdir 5651->5654 5655 40487b 5651->5655 5652->5651 5653 404900 strlen 5652->5653 5653->5651 5654->5555 6131 404930 5655->6131 5657 404894 5658 4048b9 _findnext 5657->5658 5660 404930 4 API calls 5657->5660 5658->5657 5659 4048d1 _findclose 5658->5659 5659->5654 5660->5658 5661->5582 5663 401ba0 5662->5663 5664 401924 fseek ftell 5662->5664 5666 402e70 7 API calls 5663->5666 5689 401550 fseek 5664->5689 5668 401bb3 5666->5668 5668->5664 5671 401b88 5668->5671 5669 401a30 fseek fread 5669->5671 5674 401a7f 5669->5674 5670 401959 ntohl ntohl fseek ntohl malloc 5672 401c00 5670->5672 5673 4019ba ntohl fread 5670->5673 5671->5585 5675 401e10 MessageBoxA 5672->5675 5676 401bc0 5673->5676 5677 4019ea ntohl ferror 5673->5677 5674->5671 5678 401a8a fseek fread fseek fread 5674->5678 5679 401a25 5675->5679 5682 401e10 MessageBoxA 5676->5682 5680 401be0 5677->5680 5681 401a11 5677->5681 5678->5679 5683 401b11 5678->5683 5679->5585 5684 401e10 MessageBoxA 5680->5684 5681->5679 5685 401a17 fclose 5681->5685 5682->5679 5683->5671 5686 401b27 fseek fread 5683->5686 5684->5679 5685->5679 5686->5671 5688 401b68 5686->5688 5687 401550 2 API calls 5687->5688 5688->5670 5688->5671 5688->5687 5690 40159a 5689->5690 5691 401575 fread 5689->5691 5690->5669 5690->5670 5691->5690 5693 4015f2 5692->5693 5695 4015fe 5692->5695 5694 401e10 MessageBoxA 5693->5694 5694->5695 5695->5590 5697 401610 21 API calls 5696->5697 5698 40186b 5697->5698 5699 4047a0 14 API calls 5698->5699 5700 401875 5699->5700 5701 4049d0 20 API calls 5700->5701 5709 4018d9 5700->5709 5702 40188f ntohl 5701->5702 5703 4018a6 fwrite 5702->5703 5704 4018f8 5702->5704 5705 4018c3 5703->5705 5706 4018c7 fclose free 5703->5706 5707 401e10 MessageBoxA 5704->5707 5705->5706 5708 4018e1 5705->5708 5706->5709 5707->5709 5710 401e10 MessageBoxA 5708->5710 5709->5596 5710->5709 5712 40a5e0 5711->5712 5713 401f4f strcpy strtok strcpy strtok strcpy 5712->5713 5714 40220a 5713->5714 5715 401fbf 5713->5715 5714->5596 5715->5714 5758 402a90 strlen strncpy strlen 5715->5758 5720 40201a 5722 4047a0 14 API calls 5720->5722 5721 401f00 6 API calls 5723 4020a7 5721->5723 5724 402022 5722->5724 5723->5720 5725 4020af 5723->5725 5726 402048 5724->5726 5766 404b00 5724->5766 5727 401f00 6 API calls 5725->5727 5728 401e10 MessageBoxA 5726->5728 5741 402051 5726->5741 5730 4020da 5727->5730 5753 40229b 5728->5753 5731 401f00 6 API calls 5730->5731 5742 4020e2 5730->5742 5734 4021a4 5731->5734 5732 4047a0 14 API calls 5740 4020f0 5732->5740 5733 401e10 MessageBoxA 5735 4022da free 5733->5735 5737 401f00 6 API calls 5734->5737 5734->5742 5751 4021d8 5735->5751 5736 401e10 MessageBoxA 5736->5741 5737->5742 5738 402121 strcmp 5738->5740 5747 402134 5738->5747 5739 40210c 5743 402220 malloc 5739->5743 5740->5738 5740->5739 5740->5743 5740->5751 5741->5596 5742->5732 5742->5751 5745 4022e7 5743->5745 5746 40223e strcpy strcpy strcpy 5743->5746 5744 402140 strcmp 5744->5747 5748 401e10 MessageBoxA 5745->5748 5749 401910 29 API calls 5746->5749 5747->5741 5747->5744 5750 401850 48 API calls 5747->5750 5752 4015d0 2 API calls 5747->5752 5755 4021f2 5747->5755 5748->5751 5749->5753 5750->5747 5751->5736 5752->5747 5753->5733 5754 4022a3 5753->5754 5754->5596 5756 401e10 MessageBoxA 5755->5756 5757 402202 free 5756->5757 5757->5714 5759 402ae4 5758->5759 5760 402ac7 strrchr 5758->5760 5759->5760 5761 401fd9 5759->5761 5760->5761 5762 401f00 5761->5762 5763 401f28 5762->5763 5764 40a620 6 API calls 5763->5764 5765 401f38 5764->5765 5765->5720 5765->5721 5767 404b0d 5766->5767 5768 402e70 7 API calls 5767->5768 5769 404b26 5768->5769 5770 4049d0 20 API calls 5769->5770 5771 404b42 5770->5771 5772 404bd8 5771->5772 5773 404b60 feof 5771->5773 5772->5726 5774 404b70 fread 5773->5774 5775 404c01 5773->5775 5777 404b91 fwrite ferror 5774->5777 5778 404be2 ferror 5774->5778 5776 404bc6 fclose fclose 5775->5776 5776->5772 5777->5773 5780 404bb9 clearerr 5777->5780 5778->5773 5779 404bf2 clearerr 5778->5779 5779->5776 5780->5776 5781->5619 5782->5624 5785 401de1 5783->5785 5787 401db1 5783->5787 5784 401db7 strncmp 5784->5785 5784->5787 5785->5629 5788 402b60 5785->5788 5786 4015d0 2 API calls 5786->5787 5787->5784 5787->5785 5787->5786 5789 402c20 strlen strlen malloc 5788->5789 5790 402b7b 5788->5790 5792 402c44 memset 5789->5792 5793 402bef 5789->5793 5791 402ba2 strlen strncpy strlen 5790->5791 5794 402bd2 strlen 5791->5794 5795 402bc9 5791->5795 5792->5791 5793->5631 5796 402c00 strncat 5794->5796 5797 402be1 strcat 5794->5797 5795->5794 5796->5631 5797->5793 5799 405210 6 API calls 5798->5799 5800 405313 LoadLibraryA GetProcAddress GetProcAddress 5799->5800 5801 405357 5800->5801 5805 4053c2 5800->5805 5802 405388 free 5801->5802 5801->5805 5803 40539f 5802->5803 5806 4053d0 5803->5806 5807 404e70 GetLastError FormatMessageA 5803->5807 5805->5629 5806->5629 5807->5805 5809 40a5e0 5808->5809 5810 403b4d ntohl strcpy 5809->5810 5811 402b60 10 API calls 5810->5811 5812 403ba5 5811->5812 5895 404c10 5812->5895 5814 403bad 5815 403bb1 5814->5815 5816 403bc7 GetLastError 5814->5816 5898 402ed0 GetProcAddress 5815->5898 5817 401e10 MessageBoxA 5816->5817 5819 402710 5817->5819 5819->5641 5820 403de0 5819->5820 5821 403e01 5820->5821 5822 403e23 5820->5822 6050 405610 5821->6050 5823 405210 6 API calls 5822->5823 5826 403e0d 5823->5826 5825 4040ce 5827 401e10 MessageBoxA 5825->5827 5826->5825 5829 403f50 strlen strncpy 5826->5829 5830 403e5a strlen strncpy 5826->5830 5828 4040e4 5827->5828 5833 401e10 MessageBoxA 5828->5833 5831 403f6e 5829->5831 5832 403e73 5830->5832 5831->5831 5834 403f84 strlen strncat 5831->5834 5835 405610 18 API calls 5832->5835 5836 4040fc 5833->5836 5837 405210 6 API calls 5834->5837 5838 403e8b 5835->5838 5845 401e10 MessageBoxA 5836->5845 5839 404015 5837->5839 5840 403e93 5838->5840 5841 40413b 5838->5841 5839->5832 5843 404147 5839->5843 5850 404037 5839->5850 5848 40410d 5840->5848 5856 404070 5840->5856 6053 403930 5840->6053 5842 401e10 MessageBoxA 5841->5842 5842->5843 5844 401e10 MessageBoxA 5843->5844 5847 40415d 5844->5847 5845->5848 5852 401e10 MessageBoxA 5848->5852 5851 405210 6 API calls 5850->5851 5851->5840 5854 403f4a 5852->5854 5853 4040b0 5853->5637 5854->5637 5855 405610 18 API calls 5859 403ed6 5855->5859 6065 4053e0 malloc 5856->6065 5858 404075 5860 40412d 5858->5860 5861 40407f 5858->5861 5859->5828 5859->5856 5862 403f0b 5859->5862 5864 401e10 MessageBoxA 5860->5864 6072 403da0 5861->6072 6062 4056f0 5862->6062 5864->5848 5865 403f10 5865->5836 5868 403f34 free 5865->5868 5869 403f42 5868->5869 5869->5854 5870 401e10 MessageBoxA 5869->5870 5870->5825 5872 4041c2 strlen 5871->5872 5873 404185 5871->5873 5875 4041ed 5872->5875 5874 405610 18 API calls 5873->5874 5876 4041a3 5874->5876 5879 40435e 5875->5879 5888 4041f7 5875->5888 5877 40434b 5876->5877 5878 4041ad free 5876->5878 5880 401e10 MessageBoxA 5877->5880 5878->5875 5883 401e10 MessageBoxA 5879->5883 5881 402732 5880->5881 5881->5641 5890 4044c0 5881->5890 5883->5881 5884 4015d0 2 API calls 5884->5888 5885 401610 21 API calls 5885->5888 5886 404300 ntohl 5886->5888 5887 401e10 MessageBoxA 5887->5888 5888->5881 5888->5884 5888->5885 5888->5886 5888->5887 5889 4042ea free 5888->5889 5889->5888 5891 4044d1 5890->5891 5892 4044d3 5890->5892 5891->5641 5892->5891 5893 4015d0 2 API calls 5892->5893 6117 404380 ntohl 5892->6117 5893->5892 5896 405210 6 API calls 5895->5896 5897 404c31 LoadLibraryExW free 5896->5897 5897->5814 5899 403501 5898->5899 5900 402f01 GetProcAddress 5898->5900 5903 401e10 MessageBoxA 5899->5903 5901 40350d 5900->5901 5902 402f1e GetProcAddress 5900->5902 5904 401e10 MessageBoxA 5901->5904 5905 402f3b GetProcAddress 5902->5905 5906 403523 5902->5906 5903->5901 5904->5906 5908 403539 5905->5908 5909 402f58 GetProcAddress 5905->5909 5907 401e10 MessageBoxA 5906->5907 5907->5908 5910 401e10 MessageBoxA 5908->5910 5911 402f75 GetProcAddress 5909->5911 5912 40354f 5909->5912 5910->5912 5914 402f92 GetProcAddress 5911->5914 5915 403565 5911->5915 5913 401e10 MessageBoxA 5912->5913 5913->5915 5916 40357b 5914->5916 5917 402faf GetProcAddress 5914->5917 5918 401e10 MessageBoxA 5915->5918 5921 401e10 MessageBoxA 5916->5921 5919 403591 5917->5919 5920 402fcc GetProcAddress 5917->5920 5918->5916 5924 401e10 MessageBoxA 5919->5924 5922 4035a7 5920->5922 5923 402fe9 GetProcAddress 5920->5923 5921->5919 5927 401e10 MessageBoxA 5922->5927 5925 403006 GetProcAddress 5923->5925 5926 4035bd 5923->5926 5924->5922 5929 403023 GetProcAddress 5925->5929 5930 4035d3 5925->5930 5928 401e10 MessageBoxA 5926->5928 5927->5926 5928->5930 5931 403040 GetProcAddress 5929->5931 5932 4035e9 5929->5932 5933 401e10 MessageBoxA 5930->5933 5934 4035ff 5931->5934 5935 40305d GetProcAddress 5931->5935 5936 401e10 MessageBoxA 5932->5936 5933->5932 5939 401e10 MessageBoxA 5934->5939 5937 40362b 5935->5937 5938 40307a GetProcAddress 5935->5938 5936->5934 5940 401e10 MessageBoxA 5937->5940 5941 40383b 5938->5941 5942 403097 5938->5942 5943 403615 5939->5943 5945 403641 5940->5945 5944 401e10 MessageBoxA 5941->5944 5946 403390 GetProcAddress 5942->5946 5947 4030a0 GetProcAddress 5942->5947 5951 401e10 MessageBoxA 5943->5951 5948 403851 5944->5948 5956 401e10 MessageBoxA 5945->5956 5946->5947 5949 4033ad 5946->5949 5947->5943 5950 4030bd GetProcAddress 5947->5950 5959 401e10 MessageBoxA 5948->5959 5952 401e10 MessageBoxA 5949->5952 5953 403657 5950->5953 5954 4030da GetProcAddress 5950->5954 5951->5937 5955 403387 5952->5955 5958 401e10 MessageBoxA 5953->5958 5954->5945 5957 4030f7 GetProcAddress 5954->5957 5955->5819 5956->5953 5960 403114 GetProcAddress 5957->5960 5961 403683 5957->5961 5962 40366d 5958->5962 5964 403867 5959->5964 5960->5962 5965 403131 GetProcAddress 5960->5965 5963 401e10 MessageBoxA 5961->5963 5966 401e10 MessageBoxA 5962->5966 5967 403699 5963->5967 5975 401e10 MessageBoxA 5964->5975 5968 4036af 5965->5968 5969 40314e GetProcAddress 5965->5969 5966->5961 5974 401e10 MessageBoxA 5967->5974 5971 401e10 MessageBoxA 5968->5971 5969->5967 5970 40316b GetProcAddress 5969->5970 5972 4036db 5970->5972 5973 403188 GetProcAddress 5970->5973 5976 4036c5 5971->5976 5978 401e10 MessageBoxA 5972->5978 5973->5976 5977 4031a5 GetProcAddress 5973->5977 5974->5968 5979 40387d 5975->5979 5980 401e10 MessageBoxA 5976->5980 5981 4031c2 GetProcAddress 5977->5981 5982 40371d 5977->5982 5983 4036f1 5978->5983 5987 401e10 MessageBoxA 5979->5987 5980->5972 5985 403707 5981->5985 5986 4031df GetProcAddress 5981->5986 5984 401e10 MessageBoxA 5982->5984 5993 401e10 MessageBoxA 5983->5993 5988 403733 5984->5988 5990 401e10 MessageBoxA 5985->5990 5986->5983 5989 4031fc GetProcAddress 5986->5989 5991 403893 5987->5991 5994 401e10 MessageBoxA 5988->5994 5989->5988 5992 403219 GetProcAddress 5989->5992 5990->5982 6000 401e10 MessageBoxA 5991->6000 5995 403749 5992->5995 5996 403236 GetProcAddress 5992->5996 5993->5985 5994->5995 5999 401e10 MessageBoxA 5995->5999 5997 403253 GetProcAddress 5996->5997 5998 40375f 5996->5998 6001 403270 GetProcAddress 5997->6001 6002 403775 5997->6002 6003 401e10 MessageBoxA 5998->6003 5999->5998 6005 4038a9 6000->6005 6006 40378b 6001->6006 6007 40328d GetProcAddress 6001->6007 6004 401e10 MessageBoxA 6002->6004 6003->6002 6004->6006 6013 401e10 MessageBoxA 6005->6013 6008 401e10 MessageBoxA 6006->6008 6009 4032aa GetProcAddress 6007->6009 6010 4037a1 6007->6010 6008->6010 6009->5948 6012 4032c7 6009->6012 6011 401e10 MessageBoxA 6010->6011 6014 4037b7 6011->6014 6015 4033c0 GetProcAddress 6012->6015 6016 4032d0 GetProcAddress 6012->6016 6017 4038bd 6013->6017 6023 401e10 MessageBoxA 6014->6023 6018 4033dd GetProcAddress 6015->6018 6019 403825 6015->6019 6016->6014 6020 4032ed GetProcAddress 6016->6020 6033 401e10 MessageBoxA 6017->6033 6018->6016 6022 4033fa 6018->6022 6021 401e10 MessageBoxA 6019->6021 6024 4037cd 6020->6024 6025 40330a GetProcAddress 6020->6025 6021->5941 6029 401e10 MessageBoxA 6022->6029 6023->6024 6028 401e10 MessageBoxA 6024->6028 6026 403327 GetProcAddress 6025->6026 6027 4037e3 6025->6027 6030 4037f9 6026->6030 6031 403344 GetProcAddress 6026->6031 6032 401e10 MessageBoxA 6027->6032 6028->6027 6029->5955 6036 401e10 MessageBoxA 6030->6036 6034 403361 GetProcAddress 6031->6034 6035 40380f 6031->6035 6032->6030 6033->5955 6034->5964 6037 40337e 6034->6037 6038 401e10 MessageBoxA 6035->6038 6036->6035 6037->5955 6039 403410 GetProcAddress 6037->6039 6038->6019 6039->5991 6040 40342d 6039->6040 6041 4034d0 GetProcAddress 6040->6041 6042 403436 GetProcAddress 6040->6042 6043 403453 GetProcAddress 6041->6043 6044 4034ed 6041->6044 6042->6017 6042->6043 6043->5979 6045 403470 GetProcAddress 6043->6045 6046 401e10 MessageBoxA 6044->6046 6045->6005 6047 40348d 6045->6047 6046->5955 6047->5955 6047->6041 6048 403496 GetProcAddress 6047->6048 6049 401e10 MessageBoxA 6047->6049 6048->5955 6048->6047 6049->6047 6075 405480 6050->6075 6058 40393f 6053->6058 6054 403998 6054->5853 6054->5855 6055 4015d0 2 API calls 6055->6058 6056 403af0 mbstowcs 6056->6058 6059 403b22 6056->6059 6057 403a30 6057->6054 6060 403a3c 9 API calls 6057->6060 6058->6054 6058->6055 6058->6056 6058->6057 6061 401e10 MessageBoxA 6059->6061 6060->6054 6061->6054 6110 405640 malloc 6062->6110 6064 40570f 6064->5865 6066 40540a 6065->6066 6067 405464 6066->6067 6068 405210 6 API calls 6066->6068 6069 405439 6066->6069 6067->5858 6068->6066 6070 405452 free 6069->6070 6071 405440 free 6069->6071 6070->5858 6071->6070 6071->6071 6073 403db1 free 6072->6073 6074 403dc2 6072->6074 6073->6073 6073->6074 6076 405210 6 API calls 6075->6076 6078 4054a6 6076->6078 6077 4054ec 6077->5826 6078->6077 6079 4054f5 6078->6079 6080 4054b7 6078->6080 6099 404fc0 GetShortPathNameW 6079->6099 6087 404ed0 WideCharToMultiByte 6080->6087 6083 4054bc free 6083->6077 6085 4054ca 6083->6085 6085->6077 6086 4054ce strncpy free 6085->6086 6086->6077 6088 404f82 6087->6088 6089 404f27 wcslen malloc WideCharToMultiByte 6087->6089 6107 404e70 GetLastError FormatMessageA 6088->6107 6091 404fa3 6089->6091 6092 404f78 6089->6092 6108 404e70 GetLastError FormatMessageA 6091->6108 6092->6083 6093 404f87 6095 401e10 MessageBoxA 6093->6095 6097 404f99 6095->6097 6096 404fa8 6098 401e10 MessageBoxA 6096->6098 6097->6083 6098->6092 6100 405010 malloc GetShortPathNameW 6099->6100 6101 404ff1 6099->6101 6100->6101 6103 405032 free 6100->6103 6101->6100 6104 404ed0 7 API calls 6101->6104 6109 404e70 GetLastError FormatMessageA 6101->6109 6103->6101 6105 405048 free 6104->6105 6105->6101 6106 40505c 6105->6106 6106->6083 6107->6093 6108->6096 6109->6101 6111 405672 6110->6111 6112 405674 6110->6112 6111->6064 6112->6111 6113 405480 18 API calls 6112->6113 6114 4056a4 6112->6114 6113->6112 6115 4056c2 free 6114->6115 6116 4056b0 free 6114->6116 6115->6064 6116->6115 6116->6116 6118 4043f5 strlen 6117->6118 6119 4043ae 6117->6119 6127 40441a 6118->6127 6120 405610 18 API calls 6119->6120 6121 4043c6 6120->6121 6122 404485 6121->6122 6124 4043d0 6121->6124 6123 401e10 MessageBoxA 6122->6123 6128 40444d 6123->6128 6125 4043eb free 6124->6125 6124->6127 6125->6127 6126 401e10 MessageBoxA 6129 40447c 6126->6129 6127->6128 6130 401e10 MessageBoxA 6127->6130 6128->5892 6128->6126 6129->5892 6130->6128 6132 404959 6131->6132 6139 404969 6131->6139 6133 404971 strcat 6132->6133 6132->6139 6134 4049a0 6133->6134 6135 40498c remove 6133->6135 6137 404800 9 API calls 6134->6137 6136 404995 6135->6136 6135->6139 6141 404530 Sleep remove 6136->6141 6137->6139 6139->5657 6140 40499c 6140->6139 6141->6140 6143 409a58 6142->6143 6144 409ad7 6143->6144 6145 409a8d 6143->6145 6148 409b6a 6143->6148 6144->5487 6146 409aa9 VirtualQuery 6145->6146 6146->6144 6147 409b89 6147->5487 6148->6147 6149 409cf2 VirtualQuery 6148->6149 6149->6147 6150 409d18 VirtualProtect 6149->6150 6150->6148 6278 402479 6283 402480 6278->6283 6279 4015d0 2 API calls 6279->6283 6280 402560 6281 401610 21 API calls 6282 4024a9 strcpy 6281->6282 6282->6283 6283->6279 6283->6280 6283->6281 6284 402570 6283->6284 6285 40253f free 6283->6285 6286 401e10 MessageBoxA 6284->6286 6285->6283 6287 40258c 6286->6287 6288 40987c 6289 40982d 6288->6289 6290 409843 signal 6289->6290 6292 409864 6289->6292 6290->6289 6291 4098e6 signal 6290->6291 6291->6292 6618 406300 6622 406310 6618->6622 6619 405850 3 API calls 6621 406150 6619->6621 6620 406946 memcpy 6620->6622 6621->6619 6623 4064bc 6621->6623 6622->6620 6622->6621 6293 401002 6294 401048 6293->6294 6295 4010a0 __set_app_type 6294->6295 6296 401056 __set_app_type 6294->6296 6297 401062 6295->6297 6296->6297 6298 401093 6297->6298 6301 409970 6297->6301 6302 40a9b8 __setusermatherr 6301->6302 6307 402409 6308 402410 6307->6308 6309 402432 6308->6309 6310 401d40 2 API calls 6308->6310 6310->6308 6311 405009 6312 405010 malloc GetShortPathNameW 6311->6312 6313 405040 6312->6313 6314 405032 free 6312->6314 6316 404ed0 7 API calls 6313->6316 6315 404ff1 6314->6315 6315->6311 6320 404e70 GetLastError FormatMessageA 6315->6320 6318 405048 free 6316->6318 6318->6315 6319 40505c 6318->6319 6320->6315 6321 40540c 6322 405410 6321->6322 6323 405464 6322->6323 6324 405210 6 API calls 6322->6324 6325 405439 6322->6325 6324->6322 6326 405452 free 6325->6326 6327 405440 free 6325->6327 6327->6326 6327->6327 6624 405510 6625 40551e 6624->6625 6626 405480 18 API calls 6625->6626 6627 405547 6626->6627 6628 4055c4 6627->6628 6629 405480 18 API calls 6627->6629 6630 40556d 6629->6630 6631 4055d1 free 6630->6631 6632 405573 6630->6632 6631->6628 6639 402b00 strrchr 6632->6639 6640 402b40 strrchr 6639->6640 6641 402b21 6639->6641 6640->6641 6641->6640 6328 409619 6330 409631 6328->6330 6329 409645 6330->6329 6332 40a200 6330->6332 6333 40a254 6332->6333 6334 40a20e 6332->6334 6337 40a270 InitializeCriticalSection 6333->6337 6338 40a25d 6333->6338 6335 40a210 6334->6335 6336 40a225 6334->6336 6339 40a21e 6335->6339 6344 40a050 EnterCriticalSection 6335->6344 6340 40a22e 6336->6340 6341 40a050 4 API calls 6336->6341 6337->6338 6338->6329 6339->6329 6340->6339 6342 40a238 DeleteCriticalSection 6340->6342 6341->6340 6342->6339 6345 40a0a9 LeaveCriticalSection 6344->6345 6347 40a079 6344->6347 6345->6339 6346 40a080 TlsGetValue GetLastError 6346->6347 6347->6345 6347->6346 6650 405719 6651 405640 21 API calls 6650->6651 6652 40573f 6651->6652 6348 40801c 6349 407fc9 6348->6349 6350 407fe3 memcpy 6349->6350 6351 408008 6349->6351 6350->6351 6662 40a320 strlen 6663 40a345 6662->6663 6665 40a33a 6662->6665 6664 40a38a strncmp 6664->6665 6666 40a3a2 6664->6666 6665->6663 6665->6664 5443 404e29 5444 404e30 WaitForSingleObject GetExitCodeProcess 5443->5444 6358 402a29 6359 402a30 6358->6359 6360 405210 6 API calls 6359->6360 6361 402a48 SetDllDirectoryW free 6360->6361 6671 402329 6672 402330 6671->6672 6673 4015d0 2 API calls 6672->6673 6674 402364 6672->6674 6673->6672 6362 403a2c 6363 403a30 6362->6363 6364 403a3c 9 API calls 6363->6364 6365 403ade 6363->6365 6364->6365 6675 40512c 6676 405130 6675->6676 6681 404e70 GetLastError FormatMessageA 6676->6681 6678 405135 6679 401e10 MessageBoxA 6678->6679 6680 4050c6 6679->6680 6681->6678 6682 401130 __wgetmainargs 6683 406530 6684 4070f0 6683->6684 6685 406549 6683->6685 6686 40655f memcpy 6685->6686 6688 406150 6685->6688 6686->6684 6687 405850 3 API calls 6687->6688 6688->6687 6689 4064bc 6688->6689 6694 402b39 6695 402b40 strrchr 6694->6695 6696 402b21 6695->6696 6696->6695 6370 40503c 6373 404ff1 6370->6373 6371 404ed0 7 API calls 6372 405048 free 6371->6372 6372->6373 6374 40505c 6372->6374 6373->6371 6376 405010 malloc GetShortPathNameW 6373->6376 6378 404e70 GetLastError FormatMessageA 6373->6378 6376->6373 6377 405032 free 6376->6377 6377->6373 6378->6373 6697 4097c0 6698 4097d6 6697->6698 6699 409818 6697->6699 6698->6699 6700 4097ec signal 6698->6700 6704 409809 6698->6704 6701 40988e signal 6699->6701 6699->6704 6703 4098b6 signal 6700->6703 6700->6704 6701->6704 6705 4098d0 signal 6701->6705 6702 409843 signal 6702->6704 6706 4098e6 signal 6702->6706 6703->6705 6707 40980d 6703->6707 6704->6702 6704->6707 6705->6707 6706->6707 6708 409fc0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 6386 4034c7 6387 4034d0 GetProcAddress 6386->6387 6388 403453 GetProcAddress 6387->6388 6389 4034ed 6387->6389 6390 403470 GetProcAddress 6388->6390 6391 403887 6388->6391 6392 401e10 MessageBoxA 6389->6392 6397 40348d 6390->6397 6402 4038a9 6390->6402 6393 401e10 MessageBoxA 6391->6393 6396 403387 6392->6396 6399 403893 6393->6399 6394 403496 GetProcAddress 6394->6396 6394->6397 6395 401e10 MessageBoxA 6398 4038bd 6395->6398 6397->6387 6397->6394 6397->6396 6400 401e10 MessageBoxA 6397->6400 6403 401e10 MessageBoxA 6398->6403 6401 401e10 MessageBoxA 6399->6401 6400->6397 6401->6402 6402->6395 6403->6396 6411 406ec9 6412 406edc 6411->6412 6414 406150 6411->6414 6413 405850 3 API calls 6413->6414 6414->6413 6415 4064bc 6414->6415 6416 4098cc 6417 4098d0 signal 6416->6417 6418 40986d 6417->6418 6419 401ed0 vfprintf 6420 4014d0 6423 409f10 6420->6423 6422 4014e2 6424 409f42 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 6423->6424 6425 409f33 6423->6425 6426 409f98 6424->6426 6425->6422 6426->6422 6427 40a0d0 6428 40a0f0 calloc 6427->6428 6429 40a0e3 6427->6429 6428->6429 6430 40a10a EnterCriticalSection LeaveCriticalSection 6428->6430 6709 4095d0 6710 4095db 6709->6710 6711 4095e0 6710->6711 6712 40a200 6 API calls 6710->6712 6713 409608 6712->6713 6435 4064d2 6440 406315 6435->6440 6436 405850 3 API calls 6438 406150 6436->6438 6437 406946 memcpy 6437->6440 6438->6436 6441 4064bc 6438->6441 6439 4074ac 6440->6437 6440->6438 6440->6439 6714 407bd7 6715 407bf6 6714->6715 6716 407c3b 6714->6716 6715->6716 6717 407c08 memcpy memcpy 6715->6717 6717->6716 6718 401bd9 6719 401be0 6718->6719 6720 401e10 MessageBoxA 6719->6720 6721 401a25 6720->6721 6449 402cdc 6450 402ce0 strncpy 6449->6450 6451 402b60 10 API calls 6450->6451 6452 402d28 strchr 6451->6452 6452->6450 6453 402d3e strncpy 6452->6453 6454 402b60 10 API calls 6453->6454 6455 402d70 6454->6455 6726 4055e0 6727 405480 18 API calls 6726->6727 6728 405607 6727->6728 6733 4069e7 6735 406150 6733->6735 6737 40635d 6733->6737 6734 405850 3 API calls 6734->6735 6735->6734 6736 4064bc 6735->6736 6737->6735 6738 406946 memcpy 6737->6738 6738->6737 6456 401ce9 ntohl 6739 403be9 6740 40a5e0 6739->6740 6741 403bfd ntohl sprintf GetModuleHandleA 6740->6741 6742 403c62 6741->6742 6743 403c3f 6741->6743 6745 403b40 70 API calls 6742->6745 6744 402ed0 50 API calls 6743->6744 6746 403c4b 6744->6746 6747 403c77 6745->6747 6457 40a0ec 6458 40a0f0 calloc 6457->6458 6459 40a10a EnterCriticalSection LeaveCriticalSection 6458->6459 6460 40a0e3 6458->6460 6465 403aec 6466 403af0 mbstowcs 6465->6466 6467 403b22 6466->6467 6473 4039a0 6466->6473 6468 401e10 MessageBoxA 6467->6468 6472 403ade 6468->6472 6469 4015d0 2 API calls 6469->6473 6470 403a30 6471 403a3c 9 API calls 6470->6471 6470->6472 6471->6472 6473->6466 6473->6469 6473->6470 6748 4095ec 6749 4095f0 6748->6749 6750 40a200 6 API calls 6749->6750 6751 409608 6750->6751 6474 4014f0 6475 409f10 5 API calls 6474->6475 6476 401502 6475->6476 6477 4042f7 6478 404300 ntohl 6477->6478 6481 404250 6478->6481 6479 401e10 MessageBoxA 6479->6481 6480 4042ea free 6480->6481 6481->6478 6481->6479 6481->6480 6482 4015d0 2 API calls 6481->6482 6483 404341 6481->6483 6484 401610 21 API calls 6481->6484 6482->6481 6484->6481 6752 402bf7 6753 402c00 strncat 6752->6753 6754 4039f9 6759 4039a0 6754->6759 6755 4015d0 2 API calls 6755->6759 6756 403a30 6757 403a3c 9 API calls 6756->6757 6758 403ade 6756->6758 6757->6758 6759->6755 6759->6756 6760 403af0 mbstowcs 6759->6760 6760->6759 6761 403b22 6760->6761 6762 401e10 MessageBoxA 6761->6762 6762->6758 6178 4048fc 6179 404900 strlen 6178->6179 6180 404851 _findfirst 6179->6180 6181 4048e1 _rmdir 6180->6181 6182 40487b 6180->6182 6183 404930 11 API calls 6182->6183 6184 404894 6183->6184 6185 4048b9 _findnext 6184->6185 6187 404930 11 API calls 6184->6187 6185->6184 6186 4048d1 _findclose 6185->6186 6186->6181 6187->6185 6771 409980 6772 409996 6771->6772 6773 40999d fprintf 6771->6773 6772->6773 6491 403c81 6492 403c90 setlocale _strdup 6491->6492 6493 403d82 6492->6493 6494 403cc7 malloc 6492->6494 6495 401e10 MessageBoxA 6493->6495 6494->6493 6496 403ce4 setlocale 6494->6496 6498 403d41 6495->6498 6497 403cfe 6496->6497 6500 403d00 6496->6500 6499 403d50 setlocale free 6497->6499 6500->6499 6501 403d22 free 6500->6501 6502 401e10 MessageBoxA 6501->6502 6502->6498 6503 40a289 6504 40a290 6503->6504 6505 40a050 4 API calls 6504->6505 6506 40a22e 6505->6506 6507 40a238 DeleteCriticalSection 6506->6507 6508 40a21e 6506->6508 6507->6508 6195 40178c 6196 401790 6195->6196 6197 402e70 7 API calls 6196->6197 6198 4017a3 6197->6198 6199 4017ad 6198->6199 6200 40162f ntohl fseek ntohl malloc 6198->6200 6203 401e70 MessageBoxA 6199->6203 6201 4017ce 6200->6201 6202 401678 ntohl fread 6200->6202 6207 401e70 MessageBoxA 6201->6207 6204 4017c0 6202->6204 6205 4016ad 6202->6205 6206 4016c7 6203->6206 6209 401e70 MessageBoxA 6204->6209 6208 4016b3 6205->6208 6212 4016d6 ntohl malloc 6205->6212 6210 4017e1 6207->6210 6208->6206 6211 4016b9 fclose 6208->6211 6209->6201 6213 401e70 MessageBoxA 6210->6213 6211->6206 6214 4016f5 ntohl ntohl 6212->6214 6215 40183a 6212->6215 6216 4017fe free 6213->6216 6217 401753 6214->6217 6218 401e70 MessageBoxA 6215->6218 6219 401e70 MessageBoxA 6216->6219 6217->6210 6221 40175b 6217->6221 6220 40181b 6218->6220 6219->6220 6220->6216 6222 401e70 MessageBoxA 6220->6222 6221->6220 6223 401773 6221->6223 6222->6220 6224 40177b free 6223->6224 6224->6208 6151 401b99 6152 401ba0 6151->6152 6153 402e70 7 API calls 6152->6153 6154 401bb3 6153->6154 6155 401924 fseek ftell 6154->6155 6156 401b88 6154->6156 6157 401550 2 API calls 6155->6157 6158 401951 6157->6158 6159 401a30 fseek fread 6158->6159 6160 401959 ntohl ntohl fseek ntohl malloc 6158->6160 6159->6156 6163 401a7f 6159->6163 6161 401c00 6160->6161 6162 4019ba ntohl fread 6160->6162 6164 401e10 MessageBoxA 6161->6164 6165 401bc0 6162->6165 6166 4019ea ntohl ferror 6162->6166 6163->6156 6167 401a8a fseek fread fseek fread 6163->6167 6168 401a25 6164->6168 6171 401e10 MessageBoxA 6165->6171 6169 401be0 6166->6169 6170 401a11 6166->6170 6167->6168 6175 401b11 6167->6175 6172 401e10 MessageBoxA 6169->6172 6170->6168 6173 401a17 fclose 6170->6173 6171->6168 6172->6168 6173->6168 6174 401b27 fseek fread 6174->6156 6177 401b68 6174->6177 6175->6156 6175->6174 6176 401550 2 API calls 6176->6177 6177->6156 6177->6160 6177->6176 6509 404899 6510 4048a0 6509->6510 6511 404930 11 API calls 6510->6511 6512 4048b9 _findnext 6511->6512 6512->6510 6513 4048d1 _findclose 6512->6513 6514 4048e1 _rmdir 6513->6514 6515 401099 6516 4010a0 __set_app_type 6515->6516 6517 401062 6516->6517 6518 401093 6517->6518 6519 409970 __setusermatherr 6517->6519 6520 40110c 6519->6520 6521 407e99 6522 407eb7 6521->6522 6523 408008 6521->6523 6522->6523 6524 407fe3 memcpy 6522->6524 6524->6523 6782 40519c 6783 4051a0 6782->6783 6784 4051f4 6783->6784 6785 405070 6 API calls 6783->6785 6786 4051c9 6783->6786 6785->6783 6787 4051e2 free 6786->6787 6788 4051d0 free 6786->6788 6788->6787 6788->6788 6525 407ca9 6526 407c85 6525->6526 6527 405850 3 API calls 6526->6527 6528 407c94 6526->6528 6527->6528 6529 402cac 6530 40a5e0 6529->6530 6531 402cbe getenv 6530->6531 6532 402cd6 6531->6532 6535 402d70 6531->6535 6533 402ce0 strncpy 6532->6533 6534 402d28 strchr 6532->6534 6536 402b60 10 API calls 6533->6536 6534->6533 6537 402d3e strncpy 6534->6537 6536->6534 6538 402b60 10 API calls 6537->6538 6538->6535 6539 404aac 6540 404ab0 6539->6540 6541 40a620 6 API calls 6540->6541 6542 404abc 6541->6542 6543 401e70 MessageBoxA 6542->6543 6545 404ac0 6542->6545 6543->6545 6544 402e70 7 API calls 6546 404ad0 6544->6546 6545->6544 6793 4045b9 6794 4045c0 ExpandEnvironmentStringsW 6793->6794 6795 405070 6 API calls 6794->6795 6796 4045f7 6795->6796 6797 4045ac 6796->6797 6798 404600 _strdup 6796->6798 6799 409fbc 6800 409fc0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 6799->6800

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: fseek$fread$ntohl$fcloseferrorftellmalloc
                                                • String ID: <$M$Z
                                                • API String ID: 1210635778-2411191596
                                                • Opcode ID: 4a1bf72df02ce091b41d225c7df38ada368d76f986c534d94f33ad46a64377fe
                                                • Instruction ID: 63e9dff835d06efa9c253b72d6fa9fbe9e8e210f0df08c9395a141b2f83197ea
                                                • Opcode Fuzzy Hash: 4a1bf72df02ce091b41d225c7df38ada368d76f986c534d94f33ad46a64377fe
                                                • Instruction Fuzzy Hash: A781F8B19087108FDB00AF29C48531ABBF0AF45354F05896EE994AB3D5E778D889CF87

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ntohl$malloc$fclosefreadfreefseek
                                                • String ID: 8
                                                • API String ID: 3563950672-4194326291
                                                • Opcode ID: 27d071a7e7ed52b285afe04f28aa3bca27c4a3b08c13d708f22c650bb261ef32
                                                • Instruction ID: 41aeb47febc30618cac309c64aa81c6421efd7c50b9d6fbac4d1b3f2b222a95d
                                                • Opcode Fuzzy Hash: 27d071a7e7ed52b285afe04f28aa3bca27c4a3b08c13d708f22c650bb261ef32
                                                • Instruction Fuzzy Hash: 1D51D2B4908700CFD700BF65C58561ABBE0AF45344F05893EE8C8A7391E779E845CB8B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 89 401179-4011e9 call 40a5e0 92 401487-401490 GetStartupInfoW 89->92 93 4011ef-401200 89->93 97 401498-4014b1 _initterm 92->97 94 401216-401222 93->94 95 401202-401204 94->95 96 401224-40122e 94->96 98 401429-401436 95->98 99 40120a-401213 Sleep 95->99 100 401234-40123b 96->100 101 40143c-401450 _amsg_exit 96->101 105 4014bb 97->105 98->100 98->101 99->94 100->97 104 401241-401253 100->104 102 401456-401476 _initterm 101->102 103 401259-40125b 101->103 106 401261-401268 102->106 107 40147c-401482 102->107 103->106 103->107 104->102 104->103 110 4014c2-4014ca exit 105->110 108 401286 106->108 109 40126a-401283 106->109 107->106 111 401286 call 409b80 108->111 109->108 113 40128b-4012c4 SetUnhandledExceptionFilter call 40a840 call 409e20 111->113 118 4012c6-4012c8 113->118 119 40130c-401314 113->119 122 4012e1-4012e8 118->122 120 401316-401326 119->120 121 40132b-401352 malloc 119->121 120->121 121->105 125 401358-40135c 121->125 123 4012d0-4012d3 122->123 124 4012ea-4012f6 122->124 128 4012d5-4012d7 123->128 129 401307 123->129 126 4012de 124->126 127 401360-401367 125->127 126->122 130 40136d 127->130 131 40141f-401424 127->131 132 4012f8-401305 128->132 133 4012d9 128->133 129->119 135 401372-40137b 130->135 134 401380-4013a7 malloc memcpy 131->134 132->129 132->132 133->126 134->127 137 4013a9-4013eb call 409eb0 call 409ed0 134->137 135->135 136 40137d 135->136 136->134 141 4013f0-4013fd 137->141 141->110 142 401403-40140b 141->142 143 401417-40141e 142->143 144 40140d-401412 _cexit 142->144 144->143
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpy
                                                • String ID:
                                                • API String ID: 772431862-0
                                                • Opcode ID: dd6dcba165866b8adce3520a465e3e7c68692c583378782ddd6ef9cfcf506481
                                                • Instruction ID: c8aecaf62c9696b9110834f88a24b20446e6a75ea57b9a4d6652262331ab5fd4
                                                • Opcode Fuzzy Hash: dd6dcba165866b8adce3520a465e3e7c68692c583378782ddd6ef9cfcf506481
                                                • Instruction Fuzzy Hash: AE817CB1A043018FD710EF6AD980B9ABBF1FB54304F41853ED944AB3B1D7789846CB8A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 222 401850-401878 call 401610 call 4047a0 227 4018d9-4018e0 222->227 228 40187a-4018a4 call 4049d0 ntohl 222->228 231 4018a6-4018c1 fwrite 228->231 232 4018f8-40190d call 401e10 228->232 233 4018c3-4018c5 231->233 234 4018c7-4018d7 fclose free 231->234 232->227 233->234 236 4018e1-4018f6 call 401e10 233->236 234->227 236->227
                                                APIs
                                                  • Part of subcall function 00401610: ntohl.WS2_32 ref: 0040163E
                                                  • Part of subcall function 00401610: fseek.MSVCRT ref: 00401656
                                                  • Part of subcall function 00401610: ntohl.WS2_32 ref: 00401661
                                                  • Part of subcall function 00401610: malloc.MSVCRT ref: 00401669
                                                  • Part of subcall function 00401610: ntohl.WS2_32 ref: 00401684
                                                  • Part of subcall function 00401610: fread.MSVCRT ref: 004016A0
                                                  • Part of subcall function 00401610: fclose.MSVCRT ref: 004016BC
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 004049FC
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 00404A0F
                                                  • Part of subcall function 004049D0: strtok.MSVCRT(?,?,00000000), ref: 00404A1F
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000), ref: 00404A73
                                                  • Part of subcall function 004049D0: strtok.MSVCRT(?,?,00000000), ref: 00404A87
                                                  • Part of subcall function 004049D0: _mkdir.MSVCRT ref: 00404AA5
                                                • ntohl.WS2_32(?,?,?,?,?,?,004023E6), ref: 00401897
                                                • fwrite.MSVCRT ref: 004018B9
                                                • fclose.MSVCRT ref: 004018CA
                                                • free.MSVCRT ref: 004018D2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ntohl$strcpy$fclosestrtok$_mkdirfreadfreefseekfwritemalloc
                                                • String ID:
                                                • API String ID: 1532958511-0
                                                • Opcode ID: 0ba678467c42b7276a9b9f58baee698a193ff6bd679b52bd55292dfe46ec37f8
                                                • Instruction ID: 8df8dfa69511768c1765381bdb0415dcaef8feb7ccc1299cfd62f9c5395cf5e0
                                                • Opcode Fuzzy Hash: 0ba678467c42b7276a9b9f58baee698a193ff6bd679b52bd55292dfe46ec37f8
                                                • Instruction Fuzzy Hash: 0A114CB18087009BC3107F3A848401EBBE0AF81368F458A3EF8D8A73D1C73898559B4B

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: signal$_fileno_get_osfhandle$Process$ByteCharCodeCommandCreateExitInfoLineMessageMultiObjectSingleStartupWaitWide
                                                • String ID:
                                                • API String ID: 2917712702-0
                                                • Opcode ID: 04f97da4b6471231529615fe277737a2d960c5eeca71b3878ce8ae2f7f18ba33
                                                • Instruction ID: c039b241e3be979fe19aad14a7bb84f350d9c54bc61ae4a3153f7adda5648e3d
                                                • Opcode Fuzzy Hash: 04f97da4b6471231529615fe277737a2d960c5eeca71b3878ce8ae2f7f18ba33
                                                • Instruction Fuzzy Hash: D04183B45093409FD710AF69D54939EBBF0BF84308F418D2EE8D897391D7BA94898B87

                                                Control-flow Graph

                                                APIs
                                                • GetTempPathW.KERNEL32(?,00000000,00000000,?,004047C2), ref: 004046F6
                                                  • Part of subcall function 00405070: WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,004051C2), ref: 004050B9
                                                • _getpid.MSVCRT ref: 0040471C
                                                • sprintf.MSVCRT ref: 00404730
                                                • _tempnam.MSVCRT ref: 0040473C
                                                • _mkdir.MSVCRT ref: 00404747
                                                • free.MSVCRT ref: 00404753
                                                • strcpy.MSVCRT ref: 00404777
                                                • free.MSVCRT ref: 0040477F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: free$ByteCharMultiPathTempWide_getpid_mkdir_tempnamsprintfstrcpy
                                                • String ID:
                                                • API String ID: 4026032204-0
                                                • Opcode ID: 972a40e05b08f5920e33b11fd4b1195e8e184c6f1d9bc4e4429b7fe5e68ec7e8
                                                • Instruction ID: 8af45b2eb4d8999d0f30d607f7cb0d6f007660f1bfc7651df242240114390b61
                                                • Opcode Fuzzy Hash: 972a40e05b08f5920e33b11fd4b1195e8e184c6f1d9bc4e4429b7fe5e68ec7e8
                                                • Instruction Fuzzy Hash: 07113AB25083009BD311BF65D58925EBBE4EF84354F01883FF9C8A3282D7798459CB97

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 154 404800-404846 call 40a5e0 strcpy strlen 157 404851-404879 _findfirst 154->157 158 404848-40484b 154->158 160 4048e1-4048fa _rmdir 157->160 161 40487b-404894 call 404930 157->161 158->157 159 404900-40491c strlen 158->159 159->157 164 4048b9-4048cf _findnext 161->164 165 4048a0-4048b4 call 404930 164->165 166 4048d1-4048db _findclose 164->166 165->164 166->160
                                                APIs
                                                • strcpy.MSVCRT(00000000,00000000,?,00000000,00402A75), ref: 00404825
                                                • strlen.MSVCRT ref: 0040482D
                                                • _findfirst.MSVCRT(00000000,00000000,?,00000000,00402A75), ref: 00404869
                                                • _findnext.MSVCRT ref: 004048C7
                                                • _findclose.MSVCRT ref: 004048DB
                                                • _rmdir.MSVCRT ref: 004048EB
                                                • strlen.MSVCRT ref: 00404917
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strlen$_findclose_findfirst_findnext_rmdirstrcpy
                                                • String ID:
                                                • API String ID: 3562715594-0
                                                • Opcode ID: 2dbbbe8cf3e2b3a7e0de0e1cce5bdd052717f65bdb620466f24c1fb4e7b5b20e
                                                • Instruction ID: a9f9e793eeeb33f534e218ca316462fb85fcee30f47b237a2dfaca896a0b628e
                                                • Opcode Fuzzy Hash: 2dbbbe8cf3e2b3a7e0de0e1cce5bdd052717f65bdb620466f24c1fb4e7b5b20e
                                                • Instruction Fuzzy Hash: D5216BB56087448BC720BF3AD48469FB7E5FF85310F50893EE588D3381DA3998558B8B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 168 40a620-40a631 169 40a633-40a638 168->169 170 40a63a-40a64a _stat 168->170 169->170 171 40a6a0-40a6b1 strlen 169->171 172 40a64c-40a64f 170->172 171->170 175 40a6b3-40a6bd 171->175 173 40a7c0-40a7cb 172->173 174 40a655-40a69c 172->174 176 40a80c-40a814 173->176 177 40a7cd-40a7d3 173->177 178 40a6c3-40a6c6 175->178 179 40a795-40a799 175->179 176->177 180 40a7d5-40a7e1 177->180 181 40a7fe-40a80a 177->181 182 40a6c8-40a6cb 178->182 183 40a6cd-40a6d3 178->183 179->178 184 40a79f-40a7a0 179->184 185 40a7e3-40a7e8 180->185 186 40a7ec-40a7ef 180->186 181->180 182->183 187 40a6d9-40a6e0 182->187 188 40a733-40a73d 183->188 189 40a6d5-40a6d7 183->189 184->170 185->186 190 40a7f1 186->190 191 40a7f4 186->191 192 40a6e2-40a6e4 187->192 193 40a6ea-40a720 malloc memcpy _stat 187->193 194 40a751-40a753 188->194 195 40a73f 188->195 189->187 189->188 190->191 191->181 192->170 192->193 193->172 198 40a726-40a72e free 193->198 196 40a741-40a744 194->196 197 40a755-40a757 194->197 195->197 199 40a7a5-40a7a8 196->199 200 40a746-40a74f 196->200 197->199 201 40a759-40a760 197->201 198->172 199->201 200->194 200->197 201->170 202 40a766-40a768 201->202 203 40a76a 202->203 204 40a77e-40a780 202->204 205 40a782-40a786 203->205 204->205 206 40a770-40a778 204->206 205->187 209 40a78c-40a790 205->209 207 40a7b0-40a7b2 206->207 208 40a77a-40a77c 206->208 207->170 210 40a7b8 207->210 208->204 208->207 209->170 210->205
                                                APIs
                                                • _stat.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,00404ABC,?), ref: 0040A645
                                                • strlen.MSVCRT ref: 0040A6A7
                                                • malloc.MSVCRT ref: 0040A6ED
                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,00404ABC,?), ref: 0040A702
                                                • _stat.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,00404ABC,?), ref: 0040A717
                                                • free.MSVCRT ref: 0040A729
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: _stat$freemallocmemcpystrlen
                                                • String ID:
                                                • API String ID: 2821670080-0
                                                • Opcode ID: 90f5734936ac426298cd35e1001e69113a45d7aed77e4f3ef29410a2590a8f47
                                                • Instruction ID: 2a6783eb98c8a97f91c7dab9c1c018cf784cb8e0381fd108a659056ea1bb8cf7
                                                • Opcode Fuzzy Hash: 90f5734936ac426298cd35e1001e69113a45d7aed77e4f3ef29410a2590a8f47
                                                • Instruction Fuzzy Hash: 95516D715083458FD720DE288081767BBF1AB55354F58893BE8D8A73C1D33ED8A69B4B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 211 4048fc-40491c _findfirst strlen 214 4048e1-4048fa _rmdir 211->214 215 40487b-404894 call 404930 211->215 218 4048b9-4048cf _findnext 215->218 219 4048a0-4048b4 call 404930 218->219 220 4048d1-4048db _findclose 218->220 219->218 220->214
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: _findclose_findfirst_findnext_rmdirstrlen
                                                • String ID:
                                                • API String ID: 4076562980-0
                                                • Opcode ID: 5db3324efa8d5a59e1ac116cce6dfcb7576e815c89ee10725f153e3bacf499f5
                                                • Instruction ID: 2720cdc07daff6db77de306d3cf3bc652a8836d630f878814009698f8ee34e24
                                                • Opcode Fuzzy Hash: 5db3324efa8d5a59e1ac116cce6dfcb7576e815c89ee10725f153e3bacf499f5
                                                • Instruction Fuzzy Hash: B4115BB96087408BC720AF39D48819EB7E1FF84310F108D3EE588D3381DA3998558B4A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 240 401550-401573 fseek 241 4015b5-4015c0 240->241 242 401575-401598 fread 240->242 242->241 243 40159a-4015b4 242->243
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: freadfseek
                                                • String ID: X
                                                • API String ID: 612888758-3081909835
                                                • Opcode ID: 18d448d26b348c4c421f6481d275da3b867e41667ed67bb33ab50c020d7620e3
                                                • Instruction ID: 63b23579973b0fc2a8c848cc11070a24b4d4b75e095fd3bb4bfadd2259f2d151
                                                • Opcode Fuzzy Hash: 18d448d26b348c4c421f6481d275da3b867e41667ed67bb33ab50c020d7620e3
                                                • Instruction Fuzzy Hash: 53F0C2716043119BDB006F6DD88425B7BE4EF80364F40CA6EE894DB3C5E639C4448B82

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 244 404899 245 4048a0-4048b4 call 404930 244->245 247 4048b9-4048cf _findnext 245->247 247->245 248 4048d1-4048db _findclose 247->248 249 4048e1-4048fa _rmdir 248->249
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: _findclose_findnext_rmdir
                                                • String ID:
                                                • API String ID: 3230100040-0
                                                • Opcode ID: b1e7f838138ec92de27dd9e376b12120053d0fba011f4529915d580854f68d29
                                                • Instruction ID: a666bf544f04f59834d01d7671ffd54f1655e2cb5a606e467f6e0f9155e4d243
                                                • Opcode Fuzzy Hash: b1e7f838138ec92de27dd9e376b12120053d0fba011f4529915d580854f68d29
                                                • Instruction Fuzzy Hash: D2F012B57047008BC720AF75E48429FB7E1BFC9310F51483DE588D3340D63998658A86

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 250 404930-404957 251 404969-404970 250->251 252 404959-404967 250->252 252->251 253 404971-40498a strcat 252->253 254 4049a0-4049a5 call 404800 253->254 255 40498c-404993 remove 253->255 254->251 255->251 256 404995-40499c call 404530 255->256 256->251
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: removestrcat
                                                • String ID:
                                                • API String ID: 2811761235-0
                                                • Opcode ID: 17891d87391b937335652f71d208cf03c7e94b2e2630af4a6de93be5c06651c0
                                                • Instruction ID: c1634100a14a06ff154aef6d3f48bf18f800374bae873a542931504996a5b4e7
                                                • Opcode Fuzzy Hash: 17891d87391b937335652f71d208cf03c7e94b2e2630af4a6de93be5c06651c0
                                                • Instruction Fuzzy Hash: B6F0C8F2A0820857D3203E76658136BB6946BC1318F99457FAF49773C2D33D4C0543AB

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 261 404e29-404e6d WaitForSingleObject GetExitCodeProcess
                                                APIs
                                                • WaitForSingleObject.KERNEL32 ref: 00404E3F
                                                • GetExitCodeProcess.KERNELBASE ref: 00404E57
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: CodeExitObjectProcessSingleWait
                                                • String ID:
                                                • API String ID: 1680577353-0
                                                • Opcode ID: a5f30db53a6ebf0e1f1dba67a9f2935eafc66dd49288b968f977358a6abb89f5
                                                • Instruction ID: 5b9c685faab18bc8a349c6b0566d76161fa5a1757068f5bb72ade2368f94402b
                                                • Opcode Fuzzy Hash: a5f30db53a6ebf0e1f1dba67a9f2935eafc66dd49288b968f977358a6abb89f5
                                                • Instruction Fuzzy Hash: 04E0E5355197008FC710EF6CE84824DFBF0EB84311F408A3EF8A4C3250D2319449CB46

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 263 40a76c 264 40a770-40a778 263->264 265 40a7b0-40a7b2 264->265 266 40a77a-40a77c 264->266 268 40a7b8 265->268 269 40a63a-40a64a _stat 265->269 266->265 267 40a77e-40a780 266->267 267->264 270 40a782-40a786 267->270 268->270 271 40a64c-40a64f 269->271 274 40a6d9-40a6e0 270->274 275 40a78c-40a790 270->275 272 40a7c0-40a7cb 271->272 273 40a655-40a69c 271->273 276 40a80c-40a814 272->276 277 40a7cd-40a7d3 272->277 278 40a6e2-40a6e4 274->278 279 40a6ea-40a720 malloc memcpy _stat 274->279 275->269 276->277 280 40a7d5-40a7e1 277->280 281 40a7fe-40a80a 277->281 278->269 278->279 279->271 282 40a726-40a72e free 279->282 283 40a7e3-40a7e8 280->283 284 40a7ec-40a7ef 280->284 281->280 282->271 283->284 285 40a7f1 284->285 286 40a7f4 284->286 285->286 286->281
                                                APIs
                                                • _stat.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,00404ABC,?), ref: 0040A645
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: _stat
                                                • String ID:
                                                • API String ID: 2107477818-0
                                                • Opcode ID: ab5b2011f0a72c431d9ae8a0e2ad9cabacf84a19eec302708ed945d48b774fb4
                                                • Instruction ID: 423eb16645b140ea1387a62674fe805d0ca2e753bba939399faaedd52ee62fd0
                                                • Opcode Fuzzy Hash: ab5b2011f0a72c431d9ae8a0e2ad9cabacf84a19eec302708ed945d48b774fb4
                                                • Instruction Fuzzy Hash: 9711BAB5A057159FC750CF2DC080656FBF0BB48314F448A2AE8D8E3740D335E9A69F86

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 287 402e70-402ecb call 405210 * 2 _wfopen
                                                APIs
                                                  • Part of subcall function 00405210: MultiByteToWideChar.KERNEL32 ref: 00405249
                                                • _wfopen.MSVCRT ref: 00402EBD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide_wfopen
                                                • String ID:
                                                • API String ID: 372205238-0
                                                • Opcode ID: e52c21d214796629a240c51fb7b60e75d21fb52d549f7b961c803426c5818c4c
                                                • Instruction ID: 74126713ab80da84faf4757f36691f79a295a803dc0f7ed3549fcb3a874f13b0
                                                • Opcode Fuzzy Hash: e52c21d214796629a240c51fb7b60e75d21fb52d549f7b961c803426c5818c4c
                                                • Instruction Fuzzy Hash: 0CF0F2B04093019BC710BF64E58828BBBE0EF84744F008C6EE4C893240C2389589CF86
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: AddressProc
                                                • String ID:
                                                • API String ID: 190572456-0
                                                • Opcode ID: 6229fbc5233439c47c8b67c81c86e0bf8ca63511389802b2367917b425b38900
                                                • Instruction ID: 9e7fcc73262e20b42b639f672265d991016f4d6e573a491f5b49d059b41d6497
                                                • Opcode Fuzzy Hash: 6229fbc5233439c47c8b67c81c86e0bf8ca63511389802b2367917b425b38900
                                                • Instruction Fuzzy Hash: C12219B0408600CAC7107F799A8122E7EE4AA44766F118B3FE8E4A72D0DB7C9555DB9F
                                                APIs
                                                  • Part of subcall function 00405210: MultiByteToWideChar.KERNEL32 ref: 00405249
                                                • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00002068,00000000,00000000,004026E0), ref: 0040531C
                                                • GetProcAddress.KERNEL32 ref: 00405338
                                                • GetProcAddress.KERNEL32 ref: 0040534A
                                                • free.MSVCRT ref: 00405395
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: AddressProc$ByteCharLibraryLoadMultiWidefree
                                                • String ID:
                                                • API String ID: 2285496191-3916222277
                                                • Opcode ID: 2ac8f77ed49929fa662af1c337a87eee209ea6daacdb08c566386e2e1e4db84b
                                                • Instruction ID: f7fa3d31de41ebfc25f04b6bfa2f7641fe892b4ca97745c4cd34cacb2e0a35f9
                                                • Opcode Fuzzy Hash: 2ac8f77ed49929fa662af1c337a87eee209ea6daacdb08c566386e2e1e4db84b
                                                • Instruction Fuzzy Hash: 422162B15147004BD710BFB9E94824FBBE0EB80358F014E3EE99497390E7B994498B8A
                                                APIs
                                                • GetSystemTimeAsFileTime.KERNEL32 ref: 00409F48
                                                • GetCurrentProcessId.KERNEL32 ref: 00409F59
                                                • GetCurrentThreadId.KERNEL32 ref: 00409F61
                                                • GetTickCount.KERNEL32 ref: 00409F6A
                                                • QueryPerformanceCounter.KERNEL32 ref: 00409F79
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                • String ID:
                                                • API String ID: 1445889803-0
                                                • Opcode ID: bf07b027104416ae5e153ab52a2392b0606540b33cc6aaa1f377dc49a5b247e6
                                                • Instruction ID: 753706d0f2432ae2e52699c1b63fcbad426ce9513c65138fb8e1d97fcb4c84e2
                                                • Opcode Fuzzy Hash: bf07b027104416ae5e153ab52a2392b0606540b33cc6aaa1f377dc49a5b247e6
                                                • Instruction Fuzzy Hash: 5B11167AD012188BCF10AFA8E9482CEFBB4FB0C664F454176E915F7210DB3569198BD9
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 0040A00F
                                                • UnhandledExceptionFilter.KERNEL32 ref: 0040A01F
                                                • GetCurrentProcess.KERNEL32 ref: 0040A028
                                                • TerminateProcess.KERNEL32 ref: 0040A039
                                                • abort.MSVCRT ref: 0040A042
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                • String ID:
                                                • API String ID: 520269711-0
                                                • Opcode ID: 32597a08885f00a5d96f52d968800da127951a2effd2a68d820def550ef04dbf
                                                • Instruction ID: 908e5fe2e4d4b4f9fd135d1aae07c580cbffd01a49a55d17d848d4be7f730e2e
                                                • Opcode Fuzzy Hash: 32597a08885f00a5d96f52d968800da127951a2effd2a68d820def550ef04dbf
                                                • Instruction Fuzzy Hash: 6F0196B8905308DFD700EFAAE948299BBF4BB04304F018539E95997220E77594458F4A
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 0040A00F
                                                • UnhandledExceptionFilter.KERNEL32 ref: 0040A01F
                                                • GetCurrentProcess.KERNEL32 ref: 0040A028
                                                • TerminateProcess.KERNEL32 ref: 0040A039
                                                • abort.MSVCRT ref: 0040A042
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                • String ID:
                                                • API String ID: 520269711-0
                                                • Opcode ID: cfe80107bd9ea8fc3025abd89124e695585fe244c5293105b08e45eba9f73a9a
                                                • Instruction ID: b20f870d5eea2d1b28bc474f0d21cf6229e8d97dce3512df4533b4e671bbbf1c
                                                • Opcode Fuzzy Hash: cfe80107bd9ea8fc3025abd89124e695585fe244c5293105b08e45eba9f73a9a
                                                • Instruction Fuzzy Hash: 1E01A4B8905308DFD700EFAAEA48289BBF4BB04304F01853AE95997320E77994498F4A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: freestrlen
                                                • String ID:
                                                • API String ID: 322734593-0
                                                • Opcode ID: 8f7503a9e546433cb4419c4cb9a77774b34f1f97c41043beffb785841530b2c9
                                                • Instruction ID: 13ef81bd32d2d37f53a87a5a2f43fe793e1eca721c993885f661f54c21999dda
                                                • Opcode Fuzzy Hash: 8f7503a9e546433cb4419c4cb9a77774b34f1f97c41043beffb785841530b2c9
                                                • Instruction Fuzzy Hash: A35116B59087018BC700AF75D54825EBBE0EF88350F01CA3EE999E7390DB78D995CB5A
                                                APIs
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00405155), ref: 00404E73
                                                • FormatMessageA.KERNEL32 ref: 00404EB4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ErrorFormatLastMessage
                                                • String ID: FormatMessage failed.
                                                • API String ID: 3479602957-2374551320
                                                • Opcode ID: e3e88c1ca8d9d908ac7fb40ebe42d6c5ba71c6a0b71db535dbf4255836295caf
                                                • Instruction ID: 95bcd40d16130ee153334ec2c51760062741ad72a3ca2a6fd624054d12426a6e
                                                • Opcode Fuzzy Hash: e3e88c1ca8d9d908ac7fb40ebe42d6c5ba71c6a0b71db535dbf4255836295caf
                                                • Instruction Fuzzy Hash: 69F045B45083018FD300EF69C55934BBBE0BF88349F40C96DE8989B254D3B9864A8F97
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: freentohlstrlen
                                                • String ID:
                                                • API String ID: 2640735475-0
                                                • Opcode ID: 984e9ade652589232d31f43c82da606c20372c5aa59593a5c6ba2251645aef03
                                                • Instruction ID: bd494f12bd0fd589b41595198eaed635d65b3c603cc781ed69caae3811d7099d
                                                • Opcode Fuzzy Hash: 984e9ade652589232d31f43c82da606c20372c5aa59593a5c6ba2251645aef03
                                                • Instruction Fuzzy Hash: 8F3108B59083009BC300AFA9D98825EBFE0EF88354F558A7EE588E7391D778C4548B5B
                                                APIs
                                                • ntohl.WS2_32(?,00002068,00000000,00402710), ref: 00403B5C
                                                • strcpy.MSVCRT ref: 00403B8C
                                                  • Part of subcall function 00402B60: strlen.MSVCRT ref: 00402BA5
                                                  • Part of subcall function 00402B60: strncpy.MSVCRT ref: 00402BB5
                                                  • Part of subcall function 00402B60: strlen.MSVCRT ref: 00402BBD
                                                  • Part of subcall function 00402B60: strlen.MSVCRT ref: 00402BD5
                                                  • Part of subcall function 00402B60: strcat.MSVCRT(?,?,?,00002068,00000000,00000000,004026D6), ref: 00402BE8
                                                  • Part of subcall function 00404C10: LoadLibraryExW.KERNEL32 ref: 00404C46
                                                  • Part of subcall function 00404C10: free.MSVCRT ref: 00404C54
                                                • GetLastError.KERNEL32 ref: 00403BC7
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402EEF
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F0C
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F29
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F46
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F63
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F80
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F9D
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402FBA
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402FD7
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402FF4
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00403011
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 0040302E
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 0040304B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: AddressProc$strlen$ErrorLastLibraryLoadfreentohlstrcatstrcpystrncpy
                                                • String ID:
                                                • API String ID: 3735295752-0
                                                • Opcode ID: a30c35a5edf63183ab236df58a91212f74bb6424d3fe14319b4dfa0906cd0897
                                                • Instruction ID: 57b9e7d5ebf3f48e0d16ea0a8e11f40bd3117facce84cc2d1a1fa162a79011ac
                                                • Opcode Fuzzy Hash: a30c35a5edf63183ab236df58a91212f74bb6424d3fe14319b4dfa0906cd0897
                                                • Instruction Fuzzy Hash: 7F1118B18093009FC310AF29D58519EBBE4EF84754F41893EF895D3292E6789588CB96
                                                APIs
                                                • ntohl.WS2_32 ref: 00403C0C
                                                • sprintf.MSVCRT ref: 00403C2A
                                                • GetModuleHandleA.KERNEL32 ref: 00403C32
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402EEF
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F0C
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F29
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F46
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F63
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F80
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402F9D
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402FBA
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402FD7
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00402FF4
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 00403011
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 0040302E
                                                  • Part of subcall function 00402ED0: GetProcAddress.KERNEL32 ref: 0040304B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: AddressProc$HandleModulentohlsprintf
                                                • String ID:
                                                • API String ID: 485294236-0
                                                • Opcode ID: da0ca28235d9975a42174c135f958a5bfb2cd23306347b21fa1a4d0000fd98ea
                                                • Instruction ID: a48ebef88de88412cc269be28994e2eeeddfe05877bd30aac89bcfcaf0afdd3b
                                                • Opcode Fuzzy Hash: da0ca28235d9975a42174c135f958a5bfb2cd23306347b21fa1a4d0000fd98ea
                                                • Instruction Fuzzy Hash: 570152B25093408FD320BF38E98429EBBF4FB84344F01493EE8C497345D77894848B86
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: Messagefreentohl
                                                • String ID:
                                                • API String ID: 4271883244-0
                                                • Opcode ID: 05a5d8637a678731937d9435b33a18cd99650de25d466b888777b7839d4be945
                                                • Instruction ID: fec6499228cd980bc1a5bd415eb7bde3f067a76568abea53337277d3fabf13d9
                                                • Opcode Fuzzy Hash: 05a5d8637a678731937d9435b33a18cd99650de25d466b888777b7839d4be945
                                                • Instruction Fuzzy Hash: 372126B19087058FC710AF76D94429FBBE0AF84350F01CA3EE999E7290DB38D845CB5A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID:
                                                • API String ID: 3510742995-0
                                                • Opcode ID: 8599f5733cdf4118adf48b927d8b0d50b415f89ccb17bc7ecaac003ed1edccb4
                                                • Instruction ID: 41342daca16726e54e0c13df0eb99482f4fd97d254f91c000b7e421b5de1af0f
                                                • Opcode Fuzzy Hash: 8599f5733cdf4118adf48b927d8b0d50b415f89ccb17bc7ecaac003ed1edccb4
                                                • Instruction Fuzzy Hash: C4D13E71A083118FC714CF19C58061BB7E1BF88704F168A6EE999AB392D739ED51CF86
                                                APIs
                                                • ntohl.WS2_32(?,?,00000000,?,0040235F), ref: 004015E2
                                                  • Part of subcall function 00401E10: MessageBoxA.USER32 ref: 00401E5C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: Messagentohl
                                                • String ID:
                                                • API String ID: 1113028865-0
                                                • Opcode ID: 5df4d1036d3baa0035b21599ecfa5809bfa3fa36da580a73d4d0fe4b2b6eab6c
                                                • Instruction ID: 18c8b82ecdf5668f8979df22beb8225e375ab4ca3fbc107856349d94857a2061
                                                • Opcode Fuzzy Hash: 5df4d1036d3baa0035b21599ecfa5809bfa3fa36da580a73d4d0fe4b2b6eab6c
                                                • Instruction Fuzzy Hash: 19E046B14042108FCB00BB28E9C584BBBE0BB04318F064A7DE88AA7315D234F898CB96
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ntohl
                                                • String ID:
                                                • API String ID: 2933279035-0
                                                • Opcode ID: bc879bc03d858c4d7b65980463d4abb7f901037eee2ac8277e74bc6cb836b6d3
                                                • Instruction ID: e07d720f56c77245dbdbaf1b73df6dcd8410e71af28e3b67d1106041cb90f460
                                                • Opcode Fuzzy Hash: bc879bc03d858c4d7b65980463d4abb7f901037eee2ac8277e74bc6cb836b6d3
                                                • Instruction Fuzzy Hash: A6E012766041048FC700EF68C9C574AB7F1BB48200F954668ED8997305D234E9558B82
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ntohl
                                                • String ID:
                                                • API String ID: 2933279035-0
                                                • Opcode ID: cd8d9ea744651efaafd7bcc0cfbc5bc49d461f17787117c5a25c736b0ec4b300
                                                • Instruction ID: cf9c9d715a8f012fde126e83e9f9d89cf767587d5d9a9d3cf59019e7f3215ee8
                                                • Opcode Fuzzy Hash: cd8d9ea744651efaafd7bcc0cfbc5bc49d461f17787117c5a25c736b0ec4b300
                                                • Instruction Fuzzy Hash: 72C012B68006008FC700FF7CC64941A7BF0BB08200F820AACEC8993311E634E6188F83
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5260375c8d0483fd7771c9a0b86c142595593206cf1c75b8b376e18bb4858f2c
                                                • Instruction ID: 056b8a74b8deec84d76fcfe71442ec8fc86901b0a6ed04b709976002280c5927
                                                • Opcode Fuzzy Hash: 5260375c8d0483fd7771c9a0b86c142595593206cf1c75b8b376e18bb4858f2c
                                                • Instruction Fuzzy Hash: FB126875A083108FC314CF29C58062ABBF1BB89704F15897EE8999B391E779ED45CF86
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 00afe832e94b3227e72132b73478f51711c63fee430121d58c3df34d01806d39
                                                • Instruction ID: f263875ed641db833459d2d31a96348c8e74d65fbe7152a36a6fe40729ff5df7
                                                • Opcode Fuzzy Hash: 00afe832e94b3227e72132b73478f51711c63fee430121d58c3df34d01806d39
                                                • Instruction Fuzzy Hash: 1C71D235124121CFD310DF6BED8453673E2B7C9300B498E3AD680A73A9D634F826DBA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 580bc4f04b9f05c7fb5bb8fc7dfca4deea774db62f23c7425ee650edbd58eca4
                                                • Instruction ID: 5b482d0d85de398615bf0be6c1f1b94ce347ec6920f5dfcbc48908df107c0240
                                                • Opcode Fuzzy Hash: 580bc4f04b9f05c7fb5bb8fc7dfca4deea774db62f23c7425ee650edbd58eca4
                                                • Instruction Fuzzy Hash: 5D619E35524125CFD310DF6BED8453673E3B7C9301B4A8E2AD680A736AD235B826DBA4
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strlen$strncpy$freestrncat
                                                • String ID: .zip$_lib$base$rary
                                                • API String ID: 536656556-23906921
                                                • Opcode ID: f2e278f87ce012b6d9b4be3befbb68824989871af049ce91ad2e29cbc1d6b51a
                                                • Instruction ID: 14274933dd56787fdb82c6a91d81d47f866d2d9f51aee60e5476c2917c75af4e
                                                • Opcode Fuzzy Hash: f2e278f87ce012b6d9b4be3befbb68824989871af049ce91ad2e29cbc1d6b51a
                                                • Instruction Fuzzy Hash: FE7148B05083019AD700BF65C54526ABAE4AF84345F04CA7EE9D8AB3D1DB7C8885CB9F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: pyi-
                                                • API String ID: 0-3770392772
                                                • Opcode ID: 3991ea21385366fad50a3174c8101d38cc614240c90f5204e2e8c51596cf13b5
                                                • Instruction ID: de32975ff2c34a0d384c2c2b91ec4d8f43b36af93b0298a640d216871d4c163f
                                                • Opcode Fuzzy Hash: 3991ea21385366fad50a3174c8101d38cc614240c90f5204e2e8c51596cf13b5
                                                • Instruction Fuzzy Hash: 1B513CF46083048FD710DF29D98475ABBE4BB48305F01897AE8859B3E2D3B8D995CF5A
                                                APIs
                                                • strcpy.MSVCRT(?,?,?,?,?,004023FF), ref: 00401F73
                                                • strtok.MSVCRT(?,?,?,?,?), ref: 00401F83
                                                • strcpy.MSVCRT(?,?,?,?,?), ref: 00401F8F
                                                • strtok.MSVCRT(?,?,?,?,?), ref: 00401FA3
                                                • strcpy.MSVCRT(?,?,?,?,?), ref: 00401FAF
                                                  • Part of subcall function 00402A90: strlen.MSVCRT ref: 00402AA0
                                                  • Part of subcall function 00402A90: strncpy.MSVCRT ref: 00402AB3
                                                  • Part of subcall function 00402A90: strlen.MSVCRT ref: 00402ABB
                                                  • Part of subcall function 00402A90: strrchr.MSVCRT ref: 00402AD2
                                                • malloc.MSVCRT ref: 0040222B
                                                • strcpy.MSVCRT ref: 0040224C
                                                • strcpy.MSVCRT ref: 0040226A
                                                • strcpy.MSVCRT ref: 00402282
                                                  • Part of subcall function 00404B00: feof.MSVCRT ref: 00404B63
                                                  • Part of subcall function 00404B00: fread.MSVCRT ref: 00404B87
                                                  • Part of subcall function 00404B00: fwrite.MSVCRT ref: 00404BA8
                                                  • Part of subcall function 00404B00: ferror.MSVCRT ref: 00404BB0
                                                  • Part of subcall function 00404B00: clearerr.MSVCRT(?,?,?,00402048), ref: 00404BC1
                                                  • Part of subcall function 00404B00: fclose.MSVCRT ref: 00404BC9
                                                  • Part of subcall function 00404B00: fclose.MSVCRT ref: 00404BD1
                                                • free.MSVCRT ref: 004022DD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strcpy$fclosestrlenstrtok$clearerrfeofferrorfreadfreefwritemallocstrncpystrrchr
                                                • String ID:
                                                • API String ID: 3828028293-0
                                                • Opcode ID: a77b4d8c847c3ce1b0c902bc234ff4f196e9ef69af6165add1aca0c96433bb30
                                                • Instruction ID: a4d73d656237814dcd04340808e77ce35a8a995e884b39acc9a19a7b3963f51e
                                                • Opcode Fuzzy Hash: a77b4d8c847c3ce1b0c902bc234ff4f196e9ef69af6165add1aca0c96433bb30
                                                • Instruction Fuzzy Hash: 1FA114B1408701DAC710AF25C58815EFBE4BF84354F018A2FF598AB391E7B89599DF8B
                                                APIs
                                                • calloc.MSVCRT ref: 0040279F
                                                  • Part of subcall function 00402D90: GetModuleFileNameW.KERNEL32(00000000,004027CE), ref: 00402DB4
                                                  • Part of subcall function 00402E40: strcpy.MSVCRT(004027E1), ref: 00402E53
                                                  • Part of subcall function 00402E40: strlen.MSVCRT ref: 00402E5B
                                                  • Part of subcall function 00404560: GetEnvironmentVariableW.KERNEL32(00000000,004027F9), ref: 0040459F
                                                  • Part of subcall function 00404680: SetEnvironmentVariableW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00409EFD), ref: 004046AE
                                                  • Part of subcall function 00404680: free.MSVCRT ref: 004046BC
                                                • SetDllDirectoryW.KERNEL32 ref: 00402892
                                                • free.MSVCRT ref: 0040289E
                                                • strcmp.MSVCRT ref: 004028AA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: EnvironmentVariablefree$DirectoryFileModuleNamecallocstrcmpstrcpystrlen
                                                • String ID: x@
                                                • API String ID: 3249012681-3504578705
                                                • Opcode ID: 93a21116db041d76872c1f2ea1ac2c97b3888d0437c3630c2af1652b54957dad
                                                • Instruction ID: e104b7bf5c1657f9fcfcb026d7b3760e70e9bc9fefb3156e1469a83aead3bb76
                                                • Opcode Fuzzy Hash: 93a21116db041d76872c1f2ea1ac2c97b3888d0437c3630c2af1652b54957dad
                                                • Instruction Fuzzy Hash: AF714FB19097008BD710BF65C58925EBBE4EF80744F05897EE8C4A72D1DBBC9585CB4B
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strlen$mallocmemsetstrcatstrncpy
                                                • String ID:
                                                • API String ID: 2372556553-0
                                                • Opcode ID: b1f1849f05ce0ff8bacceced4ea5584e092206f6b527d9f258b2ddc6be8f817e
                                                • Instruction ID: 4e5b45eb7927c94f1d22b83f789647f1df1ceb98ced22de3d3d6df2cb3644ce9
                                                • Opcode Fuzzy Hash: b1f1849f05ce0ff8bacceced4ea5584e092206f6b527d9f258b2ddc6be8f817e
                                                • Instruction Fuzzy Hash: AB2171B16187409FD710BF29C58932EBBE0EF84344F058C7EE889573C2C67994558B57
                                                APIs
                                                  • Part of subcall function 00402E70: _wfopen.MSVCRT ref: 00402EBD
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 004049FC
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 00404A0F
                                                  • Part of subcall function 004049D0: strtok.MSVCRT(?,?,00000000), ref: 00404A1F
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000), ref: 00404A73
                                                  • Part of subcall function 004049D0: strtok.MSVCRT(?,?,00000000), ref: 00404A87
                                                  • Part of subcall function 004049D0: _mkdir.MSVCRT ref: 00404AA5
                                                • feof.MSVCRT ref: 00404B63
                                                • fread.MSVCRT ref: 00404B87
                                                • fwrite.MSVCRT ref: 00404BA8
                                                • ferror.MSVCRT ref: 00404BB0
                                                • clearerr.MSVCRT(?,?,?,00402048), ref: 00404BC1
                                                • fclose.MSVCRT ref: 00404BC9
                                                • fclose.MSVCRT ref: 00404BD1
                                                • ferror.MSVCRT ref: 00404BE5
                                                • clearerr.MSVCRT(?,?,?,00402048), ref: 00404BFA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strcpy$clearerrfcloseferrorstrtok$_mkdir_wfopenfeoffreadfwrite
                                                • String ID:
                                                • API String ID: 1950404359-0
                                                • Opcode ID: 93bd33223e85fb11a146f5b896dace3b7b8c76cb97467dca7c93416fcf14d850
                                                • Instruction ID: 26d6a4cf61ebdb6355e6ceb81002ce2c87545b0f6dcfc6701eb30fc9d8599a57
                                                • Opcode Fuzzy Hash: 93bd33223e85fb11a146f5b896dace3b7b8c76cb97467dca7c93416fcf14d850
                                                • Instruction Fuzzy Hash: FD21FFB15087409BD310BF36848525FB7E4AF84364F068A3EE9D4A73C1D77C98958B4B
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: setbuf$_fileno_setmodefflush
                                                • String ID:
                                                • API String ID: 1650367497-0
                                                • Opcode ID: 89f21892b56f0ebe04f8f4ab3193396831d21f4360e53e8cf01e6c508885f887
                                                • Instruction ID: cc43520b513ba5077f312cde79b293d2698d7df8d1e11f86a6c566b79f11c99e
                                                • Opcode Fuzzy Hash: 89f21892b56f0ebe04f8f4ab3193396831d21f4360e53e8cf01e6c508885f887
                                                • Instruction Fuzzy Hash: EB1166F66047048BD710AF75E88565AB7E0BB44309F428C3EF8D89B352D638D8598B4A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: setlocale$free$_strdupmalloc
                                                • String ID:
                                                • API String ID: 622151147-0
                                                • Opcode ID: 2216b20451d62f20745c34c0079e0d5653cb042771b455d446aaf0d876c1dfda
                                                • Instruction ID: 68c60b90b3b600dc1113df833d63427205b546dfef12d4db0e67074f200f9145
                                                • Opcode Fuzzy Hash: 2216b20451d62f20745c34c0079e0d5653cb042771b455d446aaf0d876c1dfda
                                                • Instruction Fuzzy Hash: 8021F6B19083018FD700BF65D54532EBFE4AF84359F058C3EE9C8A7291E37D99558B8A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: signal
                                                • String ID:
                                                • API String ID: 1946981877-0
                                                • Opcode ID: 532ee5b54350ce70bdd1106a76f6d06ddd669e1cbb891edb7e2e0f643126e5aa
                                                • Instruction ID: 9d308533a8223dfef7a89781035b754c20cf20f4fabe4e2d4f00fdb0abfba49e
                                                • Opcode Fuzzy Hash: 532ee5b54350ce70bdd1106a76f6d06ddd669e1cbb891edb7e2e0f643126e5aa
                                                • Instruction Fuzzy Hash: A82153B25142009AE710BFA5C5403AF7694AB46354F12CC2BD594AB3C3C77D8C84879B
                                                APIs
                                                • strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 004049FC
                                                • strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 00404A0F
                                                • strtok.MSVCRT(?,?,00000000), ref: 00404A1F
                                                • strcpy.MSVCRT(?,?,00000000), ref: 00404A73
                                                • strtok.MSVCRT(?,?,00000000), ref: 00404A87
                                                • _mkdir.MSVCRT ref: 00404AA5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strcpy$strtok$_mkdir
                                                • String ID:
                                                • API String ID: 282790443-0
                                                • Opcode ID: 7974ecabf02546f031a8d0c50aa10801c90b2676b543c811c044bd71695961ef
                                                • Instruction ID: bc7f6ab74147c8da80bf5d81ea8fc10b92e5ddafd3e107eff54335975dc46d33
                                                • Opcode Fuzzy Hash: 7974ecabf02546f031a8d0c50aa10801c90b2676b543c811c044bd71695961ef
                                                • Instruction Fuzzy Hash: 482150B16497018BD700AF6AC58526EF7E4EF84304F45883FE6C4A7285E77C944A9B8B
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strncpy$getenvstrchr
                                                • String ID: ;
                                                • API String ID: 3873711002-1661535913
                                                • Opcode ID: ce95854b577eb0fc7b5acb80eaf0a36448d1a3075479a920298e83c55b719eb2
                                                • Instruction ID: 87c5bb83796384b620ac70d2af4799a21704787c12b47bdc202f2420c99d8292
                                                • Opcode Fuzzy Hash: ce95854b577eb0fc7b5acb80eaf0a36448d1a3075479a920298e83c55b719eb2
                                                • Instruction Fuzzy Hash: B411FEB15083419BD310AF39C58829EBBE4EF84784F11882EF5C8E7281D3BD99819B47
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strlen$strncpystrrchr
                                                • String ID: \
                                                • API String ID: 4057206489-2967466578
                                                • Opcode ID: 3821e1f33afa086847be12ccc8347bff2b393beb44a30b85bb316eb0e4ebce14
                                                • Instruction ID: 0e2399b5ff7e40ea0bbb02d0b353f885c60a2e8f14f7b0118b964a3f0aa896c3
                                                • Opcode Fuzzy Hash: 3821e1f33afa086847be12ccc8347bff2b393beb44a30b85bb316eb0e4ebce14
                                                • Instruction Fuzzy Hash: 40F031F25087908EDB117F29998530ABFD0AF55308F0A48AEE4851B383D6B98441DB67
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: NamePathShort$freemalloc
                                                • String ID:
                                                • API String ID: 859375759-0
                                                • Opcode ID: b5d1cb79c11bea7cdbeeebb9fa79e8f7d26d2ea5a9617e2b28465e8aa5917cd8
                                                • Instruction ID: 3beaf80c49d4d74242e0349f6237524424644aeea3499a333aa3f78d0f17a321
                                                • Opcode Fuzzy Hash: b5d1cb79c11bea7cdbeeebb9fa79e8f7d26d2ea5a9617e2b28465e8aa5917cd8
                                                • Instruction Fuzzy Hash: 56011BB15087058FC700BF76D48925FBBE4EF84358F05883EEA8897241E73998558BDB
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$mallocwcslen
                                                • String ID:
                                                • API String ID: 173459892-0
                                                • Opcode ID: 40e82204155d44d6ccb6382534266779ee53d7cab2275232043852edb5f21bc9
                                                • Instruction ID: 9744097a12f8b822ab610269ec99efc9aea7c821b864e54a547139bda5badfde
                                                • Opcode Fuzzy Hash: 40e82204155d44d6ccb6382534266779ee53d7cab2275232043852edb5f21bc9
                                                • Instruction Fuzzy Hash: 2321F7B15083019FD300EF66D48431BBBE4AB84368F01893EE9985B2C1D7B985498BD7
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: __dllonexit_lock_onexit_unlock
                                                • String ID:
                                                • API String ID: 209411981-0
                                                • Opcode ID: e72dbf5e36769850f66dedf14dbdfcd0cf83797c3aff72795d0b5d1688932a61
                                                • Instruction ID: 94322562d448f61ab5e389db5415b64235926ac514306a4d16e9030116057e7b
                                                • Opcode Fuzzy Hash: e72dbf5e36769850f66dedf14dbdfcd0cf83797c3aff72795d0b5d1688932a61
                                                • Instruction Fuzzy Hash: C91183F49197018FC700EF76D48555EBBE0AB98314F818D3EF8D497392E63998948B86
                                                APIs
                                                • strncpy.MSVCRT ref: 00402D00
                                                  • Part of subcall function 00402B60: strlen.MSVCRT ref: 00402BA5
                                                  • Part of subcall function 00402B60: strncpy.MSVCRT ref: 00402BB5
                                                  • Part of subcall function 00402B60: strlen.MSVCRT ref: 00402BBD
                                                  • Part of subcall function 00402B60: strlen.MSVCRT ref: 00402BD5
                                                  • Part of subcall function 00402B60: strcat.MSVCRT(?,?,?,00002068,00000000,00000000,004026D6), ref: 00402BE8
                                                • strchr.MSVCRT ref: 00402D33
                                                • strncpy.MSVCRT ref: 00402D4D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strlenstrncpy$strcatstrchr
                                                • String ID: ;
                                                • API String ID: 1837988602-1661535913
                                                • Opcode ID: 8fc9b7576c0a419203d23bf9b58d9aab0d32351923dc3836b5ccfaade7827991
                                                • Instruction ID: cafbc012400062e9836ad638cb34517f3ac44faff61307575af338ded75cce7e
                                                • Opcode Fuzzy Hash: 8fc9b7576c0a419203d23bf9b58d9aab0d32351923dc3836b5ccfaade7827991
                                                • Instruction Fuzzy Hash: EB11DEB16083419FD710AF69C1C429EBBE0EF84784F008C2EF5C8D7341D3B999818B46
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strrchr
                                                • String ID: /
                                                • API String ID: 3418686817-2043925204
                                                • Opcode ID: 0cfd4f32b849586b70a7353986d77b0206b4deb400bbcf53468c15147e581287
                                                • Instruction ID: d17ca4ae87394f5675dde1efdaccee299bc168ef5c4884823c421eedceabe6da
                                                • Opcode Fuzzy Hash: 0cfd4f32b849586b70a7353986d77b0206b4deb400bbcf53468c15147e581287
                                                • Instruction Fuzzy Hash: C8E039B04083008BD300AF158A8855BFBF4BF48348F45497EA98927382D379D908CB6B
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: CriticalSection$EnterLeavefree
                                                • String ID:
                                                • API String ID: 4020351045-0
                                                • Opcode ID: 27de6c540a5b32b140bfe52988ff2264b0743fa1c65192d6c79474fe29240fe2
                                                • Instruction ID: 205ad730fa9d849b6dcd85aca9a8edb478e236a23f6659a9e29df5da5504daa6
                                                • Opcode Fuzzy Hash: 27de6c540a5b32b140bfe52988ff2264b0743fa1c65192d6c79474fe29240fe2
                                                • Instruction Fuzzy Hash: 79015B747002028FD700EF79D98545ABBE0BB64304B988A7AE845DB351E738EC95CB4B
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                • String ID:
                                                • API String ID: 682475483-0
                                                • Opcode ID: deaaa24b9fa4b4d1e7b522dcaef3998b3bbfd73c4541e91bdd6be517b23479c5
                                                • Instruction ID: 1d3ce6b71eab003d7cf42bd7384e75d6cbe8db24f84eea3f059a5883f4db0426
                                                • Opcode Fuzzy Hash: deaaa24b9fa4b4d1e7b522dcaef3998b3bbfd73c4541e91bdd6be517b23479c5
                                                • Instruction Fuzzy Hash: 08F0DC7A5007048BCB00BFBAE94828ABBF4FB94310F454539DC9893310D739A829CACB
                                                APIs
                                                • strcpy.MSVCRT(?,?,?,00401CB0,0040284B), ref: 00401C38
                                                • strcat.MSVCRT(?,?,?,00401CB0,0040284B), ref: 00401C54
                                                • strcpy.MSVCRT(?,?,?,00401CB0,0040284B), ref: 00401C60
                                                • strcpy.MSVCRT ref: 00401C76
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2197352833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.2197333160.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197377968.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197398164.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2197417997.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strcpy$strcat
                                                • String ID:
                                                • API String ID: 3927648046-0
                                                • Opcode ID: 6c814ddd8a824b4bd2636785863bacbba6574ce59f97f3a803a5a9257da0b1bd
                                                • Instruction ID: 9c2cac98e7d877e8ae7db83d823dbc52851c1e70b87a1bb4017c5684ab7af4db
                                                • Opcode Fuzzy Hash: 6c814ddd8a824b4bd2636785863bacbba6574ce59f97f3a803a5a9257da0b1bd
                                                • Instruction Fuzzy Hash: 7FF01DB28193109BD700BF29D98114EBBE8EF84758F41896EF8C867346C3749556CB97

                                                Execution Graph

                                                Execution Coverage:2.2%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:9%
                                                Total number of Nodes:1106
                                                Total number of Limit Nodes:117
                                                execution_graph 66238 403b40 66250 40a5e0 66238->66250 66242 403ba5 66252 404c10 66242->66252 66244 403bad 66245 403bb1 66244->66245 66246 403bc7 GetLastError 66244->66246 66256 402ed0 50 API calls 66245->66256 66257 401e10 MessageBoxA 66246->66257 66249 403bbd 66251 403b4d ntohl strcpy 66250->66251 66255 402b60 10 API calls 66251->66255 66258 405210 66252->66258 66255->66242 66256->66249 66257->66249 66259 405260 MultiByteToWideChar 66258->66259 66260 405226 MultiByteToWideChar 66258->66260 66263 4052d0 66259->66263 66264 40529a malloc 66259->66264 66261 4052b0 66260->66261 66262 404c31 LoadLibraryExW free 66260->66262 66271 404e70 GetLastError FormatMessageA 66261->66271 66262->66244 66273 404e70 GetLastError FormatMessageA 66263->66273 66264->66260 66267 4052b5 66272 401e10 MessageBoxA 66267->66272 66268 4052d5 66274 401e10 MessageBoxA 66268->66274 66271->66267 66272->66262 66273->66268 66274->66262 66275 405480 66276 405210 6 API calls 66275->66276 66277 4054a6 66276->66277 66278 4054ec 66277->66278 66279 4054f5 66277->66279 66280 4054b7 66277->66280 66287 404fc0 GetShortPathNameW 66279->66287 66295 404ed0 WideCharToMultiByte 66280->66295 66283 4054bc free 66283->66278 66285 4054ca 66283->66285 66285->66278 66286 4054ce strncpy free 66285->66286 66286->66278 66288 405010 malloc GetShortPathNameW 66287->66288 66290 404ff1 66287->66290 66288->66290 66291 405032 free 66288->66291 66290->66288 66292 404ed0 7 API calls 66290->66292 66307 404e70 GetLastError FormatMessageA 66290->66307 66291->66290 66293 405048 free 66292->66293 66293->66290 66294 40505c 66293->66294 66294->66283 66296 404f82 66295->66296 66297 404f27 wcslen malloc WideCharToMultiByte 66295->66297 66308 404e70 GetLastError FormatMessageA 66296->66308 66298 404fa3 66297->66298 66306 404f78 66297->66306 66310 404e70 GetLastError FormatMessageA 66298->66310 66301 404f87 66309 401e10 MessageBoxA 66301->66309 66303 404fa8 66311 401e10 MessageBoxA 66303->66311 66304 404f99 66304->66283 66306->66283 66307->66290 66308->66301 66309->66304 66310->66303 66311->66306 66312 4026a0 66320 401d90 ntohl strlen strncmp MessageBoxA 66312->66320 66314 4026b8 66315 4026f0 66314->66315 66330 402b60 10 API calls 66314->66330 66317 4026d6 66321 4052f0 66317->66321 66319 4026e0 66319->66315 66320->66314 66322 405210 6 API calls 66321->66322 66323 405313 LoadLibraryA GetProcAddress GetProcAddress 66322->66323 66324 4053c2 66323->66324 66325 405357 66323->66325 66324->66319 66325->66324 66326 40536b CreateActCtxWWorker free 66325->66326 66327 40539f 66326->66327 66329 4053d0 66327->66329 66331 404e70 GetLastError FormatMessageA 66327->66331 66329->66319 66330->66317 66331->66324 66332 405bc9 66333 405b47 malloc 66332->66333 66335 405b6d 66333->66335 66336 40254c 66337 402550 66336->66337 66338 402508 PyObject_SetAttrString Py_DecRef PyRun_SimpleString 66337->66338 66339 402570 66338->66339 66340 40253f free 66338->66340 66353 401e10 MessageBoxA 66339->66353 66344 402480 66340->66344 66343 40258c 66345 402560 66344->66345 66346 40249d 66344->66346 66351 4015d0 ntohl MessageBoxA 66344->66351 66352 401610 25 API calls 66346->66352 66348 4024a9 strcpy 66349 4024c0 66348->66349 66349->66337 66349->66349 66350 402500 PyString_FromString 66349->66350 66350->66338 66351->66344 66352->66348 66353->66343 66354 6cec3a60 _PyArg_ParseTupleAndKeywords_SizeT 66355 6cec3a9f 66354->66355 66356 6cec3aa5 66354->66356 66357 6cec3ab8 66356->66357 66358 6cec3ab0 PyEval_SaveThread 66356->66358 66359 6cec3ac0 66357->66359 66360 6cec3ad1 66357->66360 66358->66357 66363 6cf6bdf0 5 API calls 66359->66363 66361 6cec3ad6 66360->66361 66362 6cec3ae7 66360->66362 66365 6cf6bdf0 5 API calls 66361->66365 66366 6cec3aec 66362->66366 66367 6cec3afd 66362->66367 66364 6cec3aca 66363->66364 66371 6cec3b38 PyEval_RestoreThread 66364->66371 66372 6cec3b42 66364->66372 66365->66364 66368 6cf6bdf0 5 API calls 66366->66368 66369 6cec3b02 66367->66369 66370 6cec3b13 66367->66370 66368->66364 66373 6cf6bdf0 5 API calls 66369->66373 66370->66364 66384 6cf6bdf0 66370->66384 66371->66372 66374 6cec3b68 66372->66374 66375 6cec3b48 PyErr_SetString 66372->66375 66373->66364 66377 6cec3b6c 66374->66377 66380 6cec3b95 66374->66380 66404 6ced0f20 66377->66404 66381 6ced0f20 GetCurrentThreadId 66380->66381 66383 6cec3bab 66380->66383 66382 6cec3c39 PyErr_SetString 66381->66382 66385 6cf6be23 66384->66385 66386 6cf6be01 66384->66386 66389 6cf6be2f 66385->66389 66390 6cf6be5a 66385->66390 66415 6ced0e00 GetCurrentThreadId 66386->66415 66388 6cf6be1a 66388->66364 66416 6ced0e00 GetCurrentThreadId 66389->66416 66392 6cf6be79 memset 66390->66392 66402 6cf6be48 66390->66402 66395 6cf6bea6 memset 66392->66395 66394 6cf6c1b3 66394->66364 66396 6cf6bf13 66395->66396 66396->66402 66407 6cecaa40 66396->66407 66398 6cf6bf52 66398->66402 66411 6ced6e30 66398->66411 66400 6cf6bfa3 66400->66402 66417 6cf6e360 66400->66417 66403 6cf6c168 66402->66403 66421 6ced0e00 GetCurrentThreadId 66402->66421 66403->66364 66423 6ced21e0 66404->66423 66406 6cec3b8c 66408 6cecaa4c 66407->66408 66409 6ced6e30 memset 66408->66409 66410 6cecaab4 66408->66410 66409->66410 66410->66398 66412 6ced6e3d 66411->66412 66413 6ced6eb0 memset 66412->66413 66414 6ced6ec4 66412->66414 66413->66414 66414->66400 66415->66388 66416->66402 66419 6cf6e369 66417->66419 66420 6cf6e3dd 66419->66420 66422 6cef09f0 GetCurrentThreadId 66419->66422 66420->66402 66421->66394 66422->66420 66424 6ced21f4 66423->66424 66425 6ced2218 GetCurrentThreadId 66424->66425 66426 6ced21ff 66424->66426 66425->66426 66426->66406 66427 6cec31c0 _PyArg_ParseTuple_SizeT 66428 6cec320d 66427->66428 66429 6cec31f3 66427->66429 66430 6cec3238 66428->66430 66431 6cec3217 PyErr_Format 66428->66431 66454 6cec8ce0 66430->66454 66432 6cec33e3 PyBuffer_Release 66431->66432 66435 6cec3268 66436 6cec8ce0 5 API calls 66435->66436 66437 6cec327d 66436->66437 66438 6cec328e PyErr_SetString 66437->66438 66439 6cec32a8 66437->66439 66438->66432 66440 6cec32ad PyErr_SetString 66439->66440 66441 6cec32c6 66439->66441 66440->66432 66442 6cec32cb PyErr_SetString 66441->66442 66445 6cec32e5 66441->66445 66442->66432 66443 6cec32ef PyEval_SaveThread 66443->66445 66445->66443 66446 6cec3327 PyEval_RestoreThread 66445->66446 66447 6cec3331 PyErr_CheckSignals 66445->66447 66448 6cec33c1 PyErr_SetString 66445->66448 66453 6cec3389 PyBuffer_Release 66445->66453 66462 6cf6ae20 66445->66462 66446->66447 66447->66432 66447->66445 66448->66432 66451 6cec340f 66452 6cec33b0 PyInt_FromLong 66453->66451 66453->66452 66455 6cec8cef 66454->66455 66456 6cec8ce9 66454->66456 66457 6cec8d4a 66455->66457 66459 6cec8cfb 66455->66459 66456->66435 66489 6ced0e00 GetCurrentThreadId 66457->66489 66460 6cec8d2a 66459->66460 66470 6cf67390 66459->66470 66460->66435 66463 6cf6ae4c 66462->66463 66464 6cf6ae29 66462->66464 66463->66464 66465 6cf6ae65 66463->66465 66513 6ced0e00 GetCurrentThreadId 66464->66513 66504 6cf74900 SetLastError 66465->66504 66467 6cf6ae76 66467->66445 66468 6cf6ae44 66468->66445 66471 6cf673b5 66470->66471 66487 6cf673c3 66470->66487 66472 6cf6767a 66471->66472 66473 6cf675bb 66471->66473 66480 6cf67451 66471->66480 66485 6cf675f8 66471->66485 66486 6cf674b4 66471->66486 66471->66487 66488 6cf673d8 66471->66488 66474 6cec8ce0 4 API calls 66472->66474 66477 6cec8ce0 4 API calls 66473->66477 66473->66488 66476 6cf67691 66474->66476 66475 6cf6748d memcpy 66475->66460 66482 6cec8ce0 4 API calls 66476->66482 66476->66488 66479 6cf675d3 66477->66479 66478 6cec8ce0 4 API calls 66478->66488 66479->66460 66480->66475 66481 6cf67471 66480->66481 66480->66486 66481->66475 66482->66488 66485->66487 66485->66488 66490 6cec8a70 66485->66490 66486->66488 66498 6ced0e00 GetCurrentThreadId 66486->66498 66487->66478 66487->66488 66488->66460 66489->66460 66491 6cec8a78 66490->66491 66492 6cec8a7d 66490->66492 66491->66485 66494 6cec8aab 66492->66494 66495 6cec8ab7 66492->66495 66496 6cec8ac4 66492->66496 66503 6ced0e00 GetCurrentThreadId 66494->66503 66499 6cf98400 WSASetLastError send 66495->66499 66496->66485 66498->66488 66500 6cf9842e 66499->66500 66502 6cf98440 66499->66502 66501 6cf98435 WSAGetLastError 66500->66501 66500->66502 66501->66502 66502->66496 66503->66496 66505 6cf7491c 66504->66505 66506 6cf7499b 66505->66506 66507 6cf74935 66505->66507 66514 6cf7a9e0 66506->66514 66508 6cf7494b 66507->66508 66509 6cf7a9e0 33 API calls 66507->66509 66510 6cec8ce0 5 API calls 66508->66510 66511 6cf7496e 66508->66511 66509->66508 66510->66511 66511->66467 66513->66468 66515 6cf7aa06 66514->66515 66516 6cf7ab70 66514->66516 66518 6cf7aa55 66515->66518 66521 6cf7aa49 66515->66521 66523 6cf7aa2e 66515->66523 66551 6cedcda0 27 API calls 66516->66551 66518->66516 66520 6cf7aa7d 66518->66520 66526 6cf7aa9b 66518->66526 66519 6cf7ab93 66520->66526 66542 6cf7af30 66520->66542 66521->66511 66541 6ced0e00 GetCurrentThreadId 66523->66541 66527 6cf7aaa2 66526->66527 66528 6cf7aba0 66526->66528 66527->66511 66529 6cf7abe9 66528->66529 66530 6cf7aba0 5 API calls 66529->66530 66531 6cf7ad08 66529->66531 66538 6cf7ac14 66529->66538 66530->66531 66532 6cf7ae2d memcpy 66531->66532 66533 6cf7adfc 66531->66533 66537 6cf7ae3e 66532->66537 66534 6cf7ae07 66533->66534 66533->66537 66552 6ced0e00 GetCurrentThreadId 66534->66552 66536 6cf7ae20 66536->66526 66537->66538 66539 6cf7af30 5 API calls 66537->66539 66538->66526 66540 6cf7af23 66539->66540 66540->66526 66541->66521 66543 6cf7af4c 66542->66543 66544 6cf7b028 66542->66544 66543->66544 66546 6cf7af73 SetLastError 66543->66546 66554 6ced0e00 GetCurrentThreadId 66544->66554 66549 6cf7af82 66546->66549 66547 6cec8a70 4 API calls 66547->66549 66549->66546 66549->66547 66550 6cf7afe6 66549->66550 66553 6ced0e00 GetCurrentThreadId 66549->66553 66550->66526 66551->66519 66552->66536 66553->66549 66554->66550 66555 40178c 66556 401790 66555->66556 66588 402e70 66556->66588 66558 4017a3 66559 4017ad 66558->66559 66560 40162f ntohl fseek ntohl malloc 66558->66560 66595 401e70 MessageBoxA 66559->66595 66562 4017ce 66560->66562 66563 401678 ntohl fread 66560->66563 66597 401e70 MessageBoxA 66562->66597 66566 4017c0 66563->66566 66567 4016ad 66563->66567 66564 4016c7 66596 401e70 MessageBoxA 66566->66596 66570 4016b3 66567->66570 66572 4016d6 ntohl malloc 66567->66572 66569 4017e1 66598 401e70 MessageBoxA 66569->66598 66570->66564 66571 4016b9 fclose 66570->66571 66571->66564 66573 4016f5 ntohl ntohl 66572->66573 66574 40183a 66572->66574 66593 405c10 malloc 66573->66593 66601 401e70 MessageBoxA 66574->66601 66578 4017fe free 66599 401e70 MessageBoxA 66578->66599 66579 401753 66579->66569 66582 40175b 66579->66582 66580 40181b 66580->66578 66600 401e70 MessageBoxA 66580->66600 66594 405cb0 memcpy memcpy memcpy 66582->66594 66584 40176b 66584->66580 66586 401773 66584->66586 66587 40177b free 66586->66587 66587->66570 66589 405210 6 API calls 66588->66589 66590 402e9b 66589->66590 66591 405210 6 API calls 66590->66591 66592 402eb6 _wfopen 66591->66592 66592->66558 66593->66579 66594->66584 66595->66564 66596->66562 66597->66569 66598->66578 66599->66580 66600->66580 66601->66580 66602 6cec34a0 _PyArg_ParseTuple_SizeT 66603 6cec34f3 66602->66603 66622 6cec36a5 66602->66622 66605 6cec352c PyString_FromStringAndSize 66603->66605 66606 6cec3511 PyErr_SetString 66603->66606 66607 6cec3544 66603->66607 66604 6cec3776 PyBuffer_Release 66613 6cec36d5 66604->66613 66605->66607 66605->66622 66606->66622 66608 6cec354b 66607->66608 66609 6cec8ce0 5 API calls 66607->66609 66615 6cec360c 66607->66615 66610 6cec358c 66609->66610 66614 6cec8ce0 5 API calls 66610->66614 66611 6cec378d PyBuffer_Release PyLong_FromLong 66612 6cec3745 _PyString_Resize 66620 6cec359d 66614->66620 66615->66611 66615->66612 66616 6cec35ae PyEval_SaveThread 66616->66620 66618 6cec365e PyErr_CheckSignals 66618->66620 66618->66622 66619 6cec3650 PyEval_RestoreThread 66619->66618 66620->66616 66620->66618 66620->66619 66621 6cec369d 66620->66621 66623 6cec375f PyErr_SetString 66620->66623 66625 6cf74a40 66620->66625 66628 6ced0e00 GetCurrentThreadId 66620->66628 66621->66615 66621->66622 66622->66604 66622->66613 66623->66622 66629 6cf749c0 SetLastError 66625->66629 66628->66620 66630 6cf749d7 66629->66630 66633 6cf7b050 66630->66633 66631 6cf749fe 66631->66620 66634 6cf7b083 66633->66634 66635 6cf7b07e 66633->66635 66637 6cf7b0d2 66634->66637 66638 6cf7b0bc 66634->66638 66639 6cf7b0a3 66634->66639 66730 6cf7dd20 66635->66730 66640 6cf7b0e8 66637->66640 66648 6cf7b15c 66637->66648 66736 6cfc08f0 7 API calls 66638->66736 66735 6ced0e00 GetCurrentThreadId 66639->66735 66644 6cf7b132 66640->66644 66666 6cf7b906 66640->66666 66643 6cf7b0ce 66643->66631 66644->66644 66647 6cf7b14b 66644->66647 66737 6cfc08f0 7 API calls 66647->66737 66651 6cf7b17e 66648->66651 66648->66666 66674 6cf7b1b0 66648->66674 66649 6cf7b925 66649->66631 66738 6ced0e00 GetCurrentThreadId 66651->66738 66652 6cf7b684 66743 6cfc08f0 7 API calls 66652->66743 66653 6cf7b158 66653->66631 66655 6cf7b6a1 66659 6cf7b6c4 66655->66659 66662 6cf7b546 66655->66662 66657 6cf7b197 66739 6cfc08f0 7 API calls 66657->66739 66658 6cf7b69d 66658->66631 66660 6cf7b6cf memcpy 66659->66660 66659->66666 66667 6cf7b71f 66660->66667 66668 6cf7b6f4 66660->66668 66751 6ced0e00 GetCurrentThreadId 66662->66751 66664 6cf7b1aa 66664->66631 66752 6cfc08f0 7 API calls 66666->66752 66744 6cfc08f0 7 API calls 66667->66744 66668->66667 66670 6cf7b733 66670->66631 66671 6cf7b811 66749 6cfc08f0 7 API calls 66671->66749 66672 6cf7b3f4 66741 6cfc08f0 7 API calls 66672->66741 66674->66652 66674->66655 66674->66662 66674->66666 66674->66671 66674->66672 66678 6cf7b779 66674->66678 66681 6cf7b762 66674->66681 66684 6cf7b85e 66674->66684 66689 6cf7b5e4 66674->66689 66697 6cf7b37c 66674->66697 66700 6cf7a430 66674->66700 66676 6cf7b419 66676->66631 66677 6cf7b82a 66677->66631 66678->66662 66679 6cf7b783 66678->66679 66746 6ced0e00 GetCurrentThreadId 66679->66746 66745 6cfc08f0 7 API calls 66681->66745 66683 6cf7b7aa 66747 6ced23e0 GetCurrentThreadId 66683->66747 66684->66662 66686 6cf7b8b9 66684->66686 66687 6cf7b8b2 66684->66687 66685 6cf7b775 66685->66631 66750 6cfc08f0 7 API calls 66686->66750 66687->66662 66687->66686 66742 6cfc08f0 7 API calls 66689->66742 66691 6cf7b7ca 66748 6cfc08f0 7 API calls 66691->66748 66693 6cf7b8cf 66693->66631 66694 6cf7b5f4 66694->66631 66696 6cf7b7f9 66696->66631 66740 6cfc08f0 7 API calls 66697->66740 66699 6cf7b3a2 66699->66631 66701 6cf7a46d 66700->66701 66708 6cf7a4ac 66700->66708 66702 6cf7a47f 66701->66702 66701->66708 66753 6ced0e00 GetCurrentThreadId 66702->66753 66704 6cf7a496 66754 6cfc08f0 7 API calls 66704->66754 66706 6cf7a1d0 7 API calls 66706->66708 66707 6cf7a4a8 66707->66674 66708->66706 66713 6cf7a7cd 66708->66713 66714 6cf7a823 66708->66714 66720 6cf7a75a 66708->66720 66722 6cf7a79d 66708->66722 66724 6cf7a8e9 66708->66724 66727 6cf7a7b6 66708->66727 66755 6cf94a70 28 API calls 66708->66755 66711 6cf7a8fb 66711->66674 66712 6cf7a77a 66757 6cfc08f0 7 API calls 66712->66757 66760 6ced0e00 GetCurrentThreadId 66713->66760 66761 6ced0e00 GetCurrentThreadId 66714->66761 66717 6cf7a83c 66762 6cfc08f0 7 API calls 66717->66762 66719 6cf7a7e6 66719->66712 66756 6ced0e00 GetCurrentThreadId 66720->66756 66721 6cf7a84f 66721->66674 66758 6ced0e00 GetCurrentThreadId 66722->66758 66763 6cfc08f0 7 API calls 66724->66763 66725 6cf7a799 66725->66674 66759 6cedcda0 27 API calls 66727->66759 66731 6cf7dda4 66730->66731 66732 6cf7dd3d 66730->66732 66731->66634 66732->66731 66764 6ced0e00 GetCurrentThreadId 66732->66764 66734 6cf7dd9d 66734->66634 66735->66638 66736->66643 66737->66653 66738->66657 66739->66664 66740->66699 66741->66676 66742->66694 66743->66658 66744->66670 66745->66685 66746->66683 66747->66691 66748->66696 66749->66677 66750->66693 66751->66666 66752->66649 66753->66704 66754->66707 66755->66708 66756->66712 66757->66725 66758->66727 66759->66713 66760->66719 66761->66717 66762->66721 66763->66711 66764->66734 66765 401130 __wgetmainargs 66766 401179 66767 40119e 66766->66767 66768 401487 GetStartupInfoW 66767->66768 66769 4011ef 66767->66769 66771 401498 _initterm 66768->66771 66770 401224 66769->66770 66772 40120a Sleep 66769->66772 66773 401234 66770->66773 66774 40143c _amsg_exit 66770->66774 66776 4014bb 66771->66776 66772->66769 66773->66771 66775 401241 66773->66775 66777 401456 _initterm 66774->66777 66778 401259 66774->66778 66775->66777 66775->66778 66779 4014c2 exit 66776->66779 66777->66778 66795 409b80 VirtualQuery VirtualQuery VirtualProtect VirtualQuery VirtualProtect 66778->66795 66782 40128b SetUnhandledExceptionFilter 66784 4012ac 66782->66784 66783 40132b malloc 66783->66776 66786 401358 66783->66786 66784->66783 66785 401380 malloc memcpy 66785->66786 66787 4013a9 66785->66787 66786->66785 66786->66786 66796 409e60 _lock __dllonexit _unlock _onexit 66787->66796 66789 4013c4 66797 409ed0 293 API calls 66789->66797 66791 4013f0 66791->66779 66792 401403 66791->66792 66793 401417 66792->66793 66794 40140d _cexit 66792->66794 66794->66793 66795->66782 66796->66789 66797->66791 66798 401b99 66799 401ba0 66798->66799 66800 402e70 7 API calls 66799->66800 66801 401bb3 66800->66801 66802 401924 fseek ftell 66801->66802 66803 401b88 66801->66803 66825 401550 fseek 66802->66825 66806 401a30 fseek fread 66806->66803 66810 401a7f 66806->66810 66807 401959 ntohl ntohl fseek ntohl malloc 66808 401c00 66807->66808 66809 4019ba ntohl fread 66807->66809 66830 401e10 MessageBoxA 66808->66830 66812 401bc0 66809->66812 66813 4019ea ntohl ferror 66809->66813 66810->66803 66814 401a8a fseek fread fseek fread 66810->66814 66828 401e10 MessageBoxA 66812->66828 66816 401be0 66813->66816 66817 401a11 66813->66817 66815 401a25 66814->66815 66819 401b11 66814->66819 66829 401e10 MessageBoxA 66816->66829 66817->66815 66820 401a17 fclose 66817->66820 66819->66803 66822 401b27 fseek fread 66819->66822 66820->66815 66822->66803 66824 401b68 66822->66824 66823 401550 2 API calls 66823->66824 66824->66803 66824->66807 66824->66823 66826 40159a 66825->66826 66827 401575 fread 66825->66827 66826->66806 66826->66807 66827->66826 66828->66815 66829->66815 66830->66815 66831 6cec6770 PyType_Ready 66832 6cec678f PyType_Ready 66831->66832 66833 6cec6fc6 66831->66833 66832->66833 66834 6cec67a1 Py_InitModule4 66832->66834 66834->66833 66835 6cec67ca PyModule_GetDict 66834->66835 66836 6cec67dc 66835->66836 66836->66833 66880 6cedca10 66836->66880 66838 6cec67e9 66888 6cf8c6b0 66838->66888 66844 6cec6807 66844->66833 66845 6cec680f PyErr_NewExceptionWithDoc 66844->66845 66845->66833 66846 6cec683a PyErr_NewExceptionWithDoc PyErr_NewExceptionWithDoc PyErr_NewExceptionWithDoc PyErr_NewExceptionWithDoc PyErr_NewExceptionWithDoc 66845->66846 66846->66833 66847 6cec68d2 66846->66847 66847->66833 66848 6cec6903 PyDict_SetItemString 66847->66848 66848->66833 66849 6cec693b PyDict_SetItemString 66848->66849 66849->66833 66850 6cec6954 PyDict_SetItemString 66849->66850 66850->66833 66851 6cec696e PyDict_SetItemString 66850->66851 66851->66833 66852 6cec6988 PyDict_SetItemString 66851->66852 66852->66833 66853 6cec69a1 PyDict_SetItemString 66852->66853 66853->66833 66854 6cec69bb PyDict_SetItemString 66853->66854 66854->66833 66855 6cec69d3 PyDict_SetItemString 66854->66855 66855->66833 66856 6cec69eb 69 API calls 66855->66856 66856->66833 66871 6cec6d1f 66856->66871 66857 6cec6ded PyModule_AddObject 66857->66833 66858 6cec6e07 PyModule_AddObject 66857->66858 66858->66833 66860 6cec6e20 PyDict_New 66858->66860 66859 6cec6d40 PyUnicodeUCS2_FromString _Py_BuildValue_SizeT 66859->66833 66859->66871 66860->66833 66869 6cec6e2f 66860->66869 66861 6cec6d7a PyDict_SetItem 66861->66833 66864 6cec6d93 PyDict_SetItem 66861->66864 66862 6cec6ec6 PyModule_AddObject 66862->66833 66865 6cec6eda PyLong_FromUnsignedLong 66862->66865 66863 6cec6e43 PyLong_FromLong PyUnicodeUCS2_FromString 66863->66833 66863->66869 66864->66833 66864->66871 66865->66833 66866 6cec6ef0 PyModule_AddObject 66865->66866 66866->66833 66868 6cec6f04 66866->66868 66867 6cec6e74 PyDict_SetItem 66867->66833 66867->66869 66872 6cec6f21 _Py_BuildValue_SizeT 66868->66872 66869->66833 66869->66862 66869->66863 66869->66867 66874 6cec6ec1 66869->66874 66870 6cec6de7 66870->66857 66871->66833 66871->66857 66871->66859 66871->66861 66871->66870 66872->66833 66873 6cec6f49 PyModule_AddObject 66872->66873 66873->66833 66875 6cec6f59 PyString_FromString 66873->66875 66874->66862 66875->66833 66876 6cec6f6b PyModule_AddObject 66875->66876 66876->66833 66877 6cec6f7b 66876->66877 66878 6cec6f98 _Py_BuildValue_SizeT 66877->66878 66878->66833 66879 6cec6fba PyModule_AddObject 66878->66879 66879->66833 66881 6cedca23 getenv 66880->66881 66882 6cedcaf4 66880->66882 66881->66882 66883 6cedca46 sscanf 66881->66883 66882->66838 66884 6cedca6a strtoul 66883->66884 66886 6cedca80 66883->66886 66884->66886 66885 6cedcab9 strchr 66885->66882 66887 6cedcad5 strtoul 66885->66887 66886->66885 66887->66882 66889 6cf8c6c2 66888->66889 66890 6cec67fd 66889->66890 66911 6ced0cb0 strerror strncpy 66889->66911 66894 6cf72580 66890->66894 66892 6cf8c6fb 66912 6ced0cb0 strerror strncpy 66892->66912 66895 6cf72592 66894->66895 66896 6cf6e360 GetCurrentThreadId 66895->66896 66897 6cf72734 66896->66897 66913 6cf6e090 66897->66913 66899 6cec6802 66900 6cec6640 66899->66900 66901 6cec664f PyMem_Malloc 66900->66901 66902 6cec66b8 66900->66902 66903 6cec667b memset 66901->66903 66904 6cec6670 PyErr_NoMemory 66901->66904 66902->66844 66903->66902 66905 6cec669a 66903->66905 66904->66844 66905->66902 66906 6cec66a0 PyThread_allocate_lock 66905->66906 66906->66905 66908 6cec66f0 66906->66908 66907 6cec6714 PyMem_Free 66907->66844 66908->66907 66909 6cec6700 PyThread_free_lock 66908->66909 66909->66909 66910 6cec6713 66909->66910 66910->66907 66911->66892 66912->66890 66914 6cf6e09f 66913->66914 66917 6cf6e1bb 66914->66917 66929 6ced0e00 GetCurrentThreadId 66914->66929 66916 6cf6e30e 66917->66916 66919 6cf6e204 66917->66919 66930 6ced0e00 GetCurrentThreadId 66917->66930 66919->66916 66921 6cf6e239 66919->66921 66931 6cef9d40 GetCurrentThreadId 66919->66931 66932 6cf6e050 29 API calls 66921->66932 66923 6cf6e274 66925 6cf6e2b8 66923->66925 66933 6ced0e00 GetCurrentThreadId 66923->66933 66926 6cf6e305 66925->66926 66934 6ced0e00 GetCurrentThreadId 66925->66934 66926->66899 66928 6cf6e2f9 66928->66899 66929->66917 66930->66919 66931->66921 66932->66923 66933->66925 66934->66928 66935 6cec15d0 66936 6cec15f4 66935->66936 66937 6cec8ce0 5 API calls 66936->66937 66938 6cec160d 66937->66938 66939 6cec8ce0 5 API calls 66938->66939 66944 6cec161e 66939->66944 66940 6cec1632 PyEval_SaveThread 66940->66944 66942 6cec16a8 PyEval_RestoreThread 66943 6cec16b6 PyErr_CheckSignals 66942->66943 66943->66944 66945 6cec178b 66943->66945 66944->66940 66944->66942 66944->66943 66946 6cec1747 PyErr_SetString 66944->66946 66947 6cec175d PyErr_SetString 66944->66947 66948 6cec1774 PyErr_SetString 66944->66948 66950 6cec1713 66944->66950 66955 6cf7dd20 GetCurrentThreadId 66944->66955 66957 6cf7c750 _time64 66944->66957 66973 6ced0e00 GetCurrentThreadId 66944->66973 66946->66945 66947->66945 66948->66945 66949 6cec172d 66950->66949 66951 6cec17ce 66950->66951 66952 6cec17c6 PyEval_SaveThread 66950->66952 66953 6cec17ec 66951->66953 66954 6cec17e2 PyEval_RestoreThread 66951->66954 66952->66951 66954->66953 66955->66944 66958 6cf7c783 66957->66958 66959 6ced0f20 GetCurrentThreadId 66958->66959 66960 6cf7c78b SetLastError 66959->66960 66968 6cf7c79f 66960->66968 66961 6cf7c932 66987 6cf7cfc0 66961->66987 66962 6cf7c945 67016 6ced0e00 GetCurrentThreadId 66962->67016 66965 6cf7dd20 GetCurrentThreadId 66965->66968 66968->66961 66968->66962 66968->66965 66969 6cf7c939 66968->66969 66972 6cec8ce0 5 API calls 66968->66972 66974 6cf7ca70 66968->66974 67013 6ceea140 GetCurrentThreadId 66968->67013 67014 6ceea260 GetCurrentThreadId memset memset 66968->67014 67015 6cf7ddd0 GetCurrentThreadId 66968->67015 66969->66944 66972->66968 66973->66944 66975 6cf7ca92 66974->66975 66986 6cf7cd67 66975->66986 67022 6cf7e530 15 API calls 66975->67022 66978 6cf7cb57 66979 6cf7cb74 _time64 66978->66979 66980 6cf7cbf5 66978->66980 66983 6cf7cba2 66978->66983 66979->66983 66980->66968 66981 6cf7cbda 67023 6ced0e00 GetCurrentThreadId 66981->67023 66983->66980 66983->66981 66984 6cf7cca7 66983->66984 66983->66986 66984->66980 66985 6cf7cd26 memcpy 66984->66985 66985->66986 67017 6cf958f0 66986->67017 67024 6cf95970 66987->67024 66989 6cf7d2ec 67040 6cfc08f0 7 API calls 66989->67040 66991 6cf7d015 67039 6ced0e00 GetCurrentThreadId 66991->67039 66992 6cf7d2ff 66992->66969 66995 6cf7d23f 67037 6ced0e00 GetCurrentThreadId 66995->67037 66996 6cf7d22b 67036 6cedcda0 27 API calls 66996->67036 66997 6cf7d0fb 67000 6cf7d113 66997->67000 67002 6cf7d194 66997->67002 67000->66991 67002->66989 67004 6cf7d1d8 67002->67004 67005 6cf7dd20 GetCurrentThreadId 67002->67005 67003 6cf7d2ab 67038 6cfc08f0 7 API calls 67003->67038 67030 6cf6ad40 67004->67030 67007 6cf7d1d0 67005->67007 67007->66989 67007->67004 67011 6cf7d2cd 67011->66969 67012 6cf7d227 67012->66969 67013->66968 67014->66968 67015->66968 67016->66969 67018 6cec8a70 4 API calls 67017->67018 67019 6cf9591c 67018->67019 67020 6cf95954 67019->67020 67021 6cec8a70 4 API calls 67019->67021 67020->66980 67021->67019 67022->66978 67023->66980 67025 6cf7cfde 67024->67025 67026 6cf95980 67024->67026 67025->66989 67025->66991 67025->66995 67025->66996 67025->66997 67041 6cec89d0 67026->67041 67028 6cf9599c 67028->67025 67029 6cec89d0 4 API calls 67028->67029 67029->67028 67031 6cf6ad47 67030->67031 67054 6cf87220 _time64 67031->67054 67084 6cf87797 67031->67084 67032 6cf6ad57 67035 6cfc08f0 7 API calls 67032->67035 67035->67012 67036->66995 67037->67003 67038->67011 67039->66989 67040->66992 67042 6cec89d8 67041->67042 67044 6cec8a06 67041->67044 67042->67044 67045 6cec8a12 67042->67045 67046 6cec8a1f 67042->67046 67053 6ced0e00 GetCurrentThreadId 67044->67053 67048 6cf983a0 67045->67048 67046->67028 67049 6cf983ad WSASetLastError recv 67048->67049 67052 6cf983e5 67048->67052 67050 6cf983d3 67049->67050 67049->67052 67051 6cf983da WSAGetLastError 67050->67051 67050->67052 67051->67052 67052->67046 67053->67046 67055 6cf87257 67054->67055 67056 6ced0f20 GetCurrentThreadId 67055->67056 67057 6cf8725f SetLastError 67056->67057 67058 6cf87273 67057->67058 67059 6cf87949 67058->67059 67060 6cf879ff 67058->67060 67062 6cf87a20 67058->67062 67071 6cf7dd20 GetCurrentThreadId 67058->67071 67075 6cec8ce0 GetCurrentThreadId memcpy WSASetLastError send WSAGetLastError 67058->67075 67081 6cf879c6 67058->67081 67083 6cf8749c 67058->67083 67113 6cf87f00 67058->67113 67142 6cf8c4a0 67058->67142 67146 6cf88580 67058->67146 67187 6cf88ad0 67058->67187 67246 6cf8a350 67058->67246 67257 6cf7d3a0 67058->67257 67272 6cec8e40 GetCurrentThreadId memcpy WSASetLastError send WSAGetLastError 67058->67272 67273 6cf8c0d0 29 API calls 67058->67273 67274 6cf8acb0 GetCurrentThreadId 67058->67274 67275 6cf823c0 7 API calls 67058->67275 67276 6cf8add0 49 API calls 67058->67276 67277 6ceea140 GetCurrentThreadId 67058->67277 67278 6ceea260 GetCurrentThreadId memset memset 67058->67278 67279 6cf7ddd0 GetCurrentThreadId 67058->67279 67280 6cf6cc10 28 API calls 67059->67280 67282 6ced0e00 GetCurrentThreadId 67060->67282 67283 6ced0e00 GetCurrentThreadId 67062->67283 67071->67058 67075->67058 67281 6ced0e00 GetCurrentThreadId 67081->67281 67083->67032 67085 6cf877a2 67084->67085 67485 6cf7d500 67085->67485 67087 6cf8749c 67087->67032 67088 6cec8ce0 GetCurrentThreadId memcpy WSASetLastError send WSAGetLastError 67099 6cf872c0 67088->67099 67089 6cf879ff 67510 6ced0e00 GetCurrentThreadId 67089->67510 67091 6cf87a20 67511 6ced0e00 GetCurrentThreadId 67091->67511 67093 6cf88ad0 48 API calls 67093->67099 67095 6cf87f00 47 API calls 67095->67099 67096 6cf8a350 42 API calls 67096->67099 67098 6cf8c4a0 GetCurrentThreadId 67098->67099 67099->67087 67099->67088 67099->67089 67099->67091 67099->67093 67099->67095 67099->67096 67099->67098 67101 6cf87949 67099->67101 67102 6cf7dd20 GetCurrentThreadId 67099->67102 67103 6cf7d3a0 34 API calls 67099->67103 67110 6cf88580 44 API calls 67099->67110 67111 6cf879c6 67099->67111 67500 6cec8e40 GetCurrentThreadId memcpy WSASetLastError send WSAGetLastError 67099->67500 67501 6cf8c0d0 29 API calls 67099->67501 67502 6cf8acb0 GetCurrentThreadId 67099->67502 67503 6cf823c0 7 API calls 67099->67503 67504 6cf8add0 49 API calls 67099->67504 67505 6ceea140 GetCurrentThreadId 67099->67505 67506 6ceea260 GetCurrentThreadId memset memset 67099->67506 67507 6cf7ddd0 GetCurrentThreadId 67099->67507 67508 6cf6cc10 28 API calls 67101->67508 67102->67099 67103->67099 67110->67099 67509 6ced0e00 GetCurrentThreadId 67111->67509 67114 6cf87f29 67113->67114 67284 6cf7d780 67114->67284 67115 6cf87f4a 67116 6cf87fb4 67115->67116 67117 6cf87f7c 67115->67117 67118 6cf87fcf 67115->67118 67116->67058 67119 6cf87f84 67117->67119 67298 6ced0e00 GetCurrentThreadId 67117->67298 67122 6cf8801d 67118->67122 67123 6cf88042 67118->67123 67128 6cf88005 67118->67128 67119->67058 67121 6cf884f4 67305 6ced0e00 GetCurrentThreadId 67121->67305 67299 6ced0e00 GetCurrentThreadId 67122->67299 67126 6cf8822b 67123->67126 67123->67128 67300 6ced0e00 GetCurrentThreadId 67126->67300 67128->67121 67132 6cf8824e 67128->67132 67134 6cf88120 67128->67134 67129 6cf882af memcpy 67135 6cf8821c 67129->67135 67131 6cf882a4 67131->67116 67131->67129 67301 6ced0e00 GetCurrentThreadId 67132->67301 67134->67129 67134->67135 67302 6cf7e530 15 API calls 67134->67302 67135->67121 67136 6cf88347 67135->67136 67136->67116 67303 6cf786a0 GetCurrentThreadId 67136->67303 67138 6cf88448 67138->67116 67304 6ced0e00 GetCurrentThreadId 67138->67304 67140 6cf88468 67140->67058 67143 6cf8c4ba 67142->67143 67145 6cf8c555 67142->67145 67143->67145 67309 6ced0e00 GetCurrentThreadId 67143->67309 67145->67058 67186 6cf7d780 39 API calls 67146->67186 67147 6cf88ab0 67147->67058 67148 6cf885c6 67148->67147 67149 6cf88603 67148->67149 67150 6cf88624 67148->67150 67310 6ced0e00 GetCurrentThreadId 67149->67310 67152 6cf88638 67150->67152 67153 6cf88660 67150->67153 67311 6ced0e00 GetCurrentThreadId 67152->67311 67155 6cf88681 67153->67155 67156 6cf886a2 67153->67156 67312 6ced0e00 GetCurrentThreadId 67155->67312 67158 6cf886a8 67156->67158 67171 6cf886f3 67156->67171 67313 6cf80780 GetCurrentThreadId memset 67158->67313 67159 6cf887a8 67316 6ced0e00 GetCurrentThreadId 67159->67316 67162 6cf886b0 67163 6cf88834 67162->67163 67165 6cf886c8 67162->67165 67167 6ced0f20 GetCurrentThreadId 67163->67167 67314 6ced0e00 GetCurrentThreadId 67165->67314 67168 6cf88839 67167->67168 67318 6cf80580 GetCurrentThreadId memset 67168->67318 67171->67159 67172 6cf88809 67171->67172 67180 6cf887d3 67171->67180 67315 6cecbda0 6 API calls 67171->67315 67317 6ced0e00 GetCurrentThreadId 67172->67317 67174 6cf8883e 67179 6cf8861f 67174->67179 67319 6ced4f40 29 API calls 67174->67319 67176 6cf888db 67320 6ced0e00 GetCurrentThreadId 67176->67320 67178 6cf888a1 67178->67176 67181 6cf888bc 67178->67181 67179->67058 67321 6ced0e00 GetCurrentThreadId 67180->67321 67181->67179 67181->67180 67182 6cf88991 67181->67182 67322 6cedc950 27 API calls 67182->67322 67185 6cf889ab 67323 6cedc950 27 API calls 67185->67323 67186->67148 67245 6cf7d780 39 API calls 67187->67245 67188 6cf88b63 67190 6cf88c21 67188->67190 67191 6cf88b97 67188->67191 67216 6cf8a314 67188->67216 67200 6cf88c44 67190->67200 67327 6cf80580 GetCurrentThreadId memset 67190->67327 67193 6cf88b9c 67191->67193 67194 6cf88bc4 67191->67194 67192 6cf8a345 67192->67058 67324 6ced0e00 GetCurrentThreadId 67193->67324 67202 6cf88bed 67194->67202 67325 6cf80580 GetCurrentThreadId memset 67194->67325 67199 6cf88bd1 67199->67202 67203 6cf88dcd 67200->67203 67206 6cf88d22 67200->67206 67201 6cf88c1d 67201->67058 67326 6cfc08f0 7 API calls 67202->67326 67218 6cf88dd9 67203->67218 67222 6cf8944f 67203->67222 67204 6cf895c5 67208 6cf89c28 67204->67208 67236 6cf88d2d 67204->67236 67238 6cf89650 67204->67238 67206->67236 67328 6cee6bc0 GetCurrentThreadId memcpy 67206->67328 67209 6cf88d8b 67208->67209 67208->67236 67333 6cf74f40 GetCurrentThreadId 67208->67333 67209->67236 67237 6cf8a0c1 67209->67237 67341 6cf8c0d0 29 API calls 67209->67341 67210 6cf88f32 67329 6ced0e00 GetCurrentThreadId 67210->67329 67212 6cf88bb5 67212->67216 67215 6cf8a261 67342 6cfc08f0 7 API calls 67215->67342 67344 6cfc08f0 7 API calls 67216->67344 67218->67210 67229 6cf88f55 67218->67229 67218->67236 67219 6cf8a289 67219->67058 67220 6cf89c7c 67220->67236 67334 6ceee870 GetCurrentThreadId memcpy memcpy __aulldiv 67220->67334 67222->67204 67222->67236 67331 6ced4f40 29 API calls 67222->67331 67224 6cf89cbc 67225 6cf89d2a 67224->67225 67335 6ceec6e0 GetCurrentThreadId 67224->67335 67225->67236 67336 6ceecc00 GetCurrentThreadId 67225->67336 67228 6cf89d61 67228->67209 67230 6cf89d87 67228->67230 67229->67209 67229->67236 67330 6ced4f40 29 API calls 67229->67330 67230->67236 67337 6cf1dc20 GetCurrentThreadId memcpy 67230->67337 67232 6cf893ef 67232->67209 67242 6cf89408 67232->67242 67234 6cf89db8 67234->67236 67338 6ced4f40 29 API calls 67234->67338 67343 6ced0e00 GetCurrentThreadId 67236->67343 67237->67212 67237->67215 67237->67236 67238->67236 67332 6ced4f40 29 API calls 67238->67332 67240 6cf8a0e1 67340 6ced0e00 GetCurrentThreadId 67240->67340 67242->67212 67242->67236 67242->67237 67242->67240 67243 6cf8a094 67242->67243 67339 6cf1a090 7 API calls 67243->67339 67245->67188 67256 6cf7d780 39 API calls 67246->67256 67247 6cf8a3b6 67247->67058 67249 6cf8a38e 67249->67247 67250 6cf8a4e3 memcpy 67249->67250 67254 6cf8a3ed 67249->67254 67255 6cf8a50e 67249->67255 67250->67255 67251 6cf8a85e 67253 6ced0f20 GetCurrentThreadId 67251->67253 67251->67254 67253->67254 67346 6ced0e00 GetCurrentThreadId 67254->67346 67255->67247 67255->67251 67255->67254 67345 6cecbda0 6 API calls 67255->67345 67256->67249 67347 6cf91110 67257->67347 67258 6cf7d3cc 67259 6cf7d3d5 67258->67259 67260 6cf7d3db memcpy 67258->67260 67259->67058 67261 6cf7d401 67260->67261 67262 6cf7d43b 67260->67262 67263 6cf7d427 67261->67263 67264 6cf7d406 memcpy 67261->67264 67265 6cf7d440 memcpy 67262->67265 67266 6cf7d48a 67262->67266 67361 6cedcda0 27 API calls 67263->67361 67270 6cf7d45f 67264->67270 67265->67270 67362 6cedcda0 27 API calls 67266->67362 67269 6cf7d49e 67270->67058 67272->67058 67273->67058 67274->67058 67275->67058 67276->67058 67277->67058 67278->67058 67279->67058 67280->67083 67281->67083 67282->67083 67283->67083 67286 6cf7d795 67284->67286 67293 6cf7d7f1 67284->67293 67285 6cf7d7c5 67285->67115 67286->67285 67306 6ced0e00 GetCurrentThreadId 67286->67306 67287 6cf7d88c 67287->67286 67290 6cf7d910 67287->67290 67289 6cf7d877 67289->67115 67290->67289 67307 6ceea360 GetCurrentThreadId memset memset memset 67290->67307 67291 6cf7d8f0 67291->67115 67293->67287 67293->67289 67297 6cf7b050 36 API calls 67293->67297 67294 6cf7d921 67294->67289 67308 6ced0e00 GetCurrentThreadId 67294->67308 67296 6cf7d943 67296->67115 67297->67293 67298->67116 67299->67116 67300->67116 67301->67116 67302->67131 67303->67138 67304->67140 67305->67116 67306->67291 67307->67294 67308->67296 67309->67145 67310->67179 67311->67179 67312->67179 67313->67162 67314->67179 67315->67171 67316->67179 67317->67179 67318->67174 67319->67178 67320->67179 67321->67179 67322->67185 67323->67179 67324->67212 67325->67199 67326->67201 67327->67200 67328->67209 67329->67212 67330->67232 67331->67204 67332->67236 67333->67220 67334->67224 67335->67225 67336->67228 67337->67234 67338->67236 67339->67237 67340->67212 67341->67237 67342->67219 67343->67212 67344->67192 67345->67255 67346->67247 67348 6cf91154 67347->67348 67355 6cf91176 67347->67355 67349 6cf91161 67348->67349 67348->67355 67371 6cfc08f0 7 API calls 67349->67371 67351 6cf91172 67351->67258 67352 6cf91294 67363 6cf90140 67352->67363 67355->67352 67372 6ced0e00 GetCurrentThreadId 67355->67372 67373 6cef95c0 67355->67373 67357 6cf91310 67383 6cfc08f0 7 API calls 67357->67383 67360 6cf9135a 67360->67258 67361->67262 67362->67269 67365 6cf90158 67363->67365 67364 6cf90176 67407 6ced0e00 GetCurrentThreadId 67364->67407 67365->67364 67366 6cf901ad memset 67365->67366 67369 6cf901c8 67366->67369 67368 6cf9018f 67368->67357 67369->67364 67369->67368 67384 6cf8fde0 67369->67384 67371->67351 67372->67355 67374 6cef95eb 67373->67374 67378 6cef95d2 67373->67378 67484 6ced0e00 GetCurrentThreadId 67374->67484 67376 6cef96f5 67376->67355 67377 6cef968f 67380 6cf1c810 28 API calls 67377->67380 67382 6cef96a2 67377->67382 67378->67374 67378->67377 67379 6cef9648 memcpy 67378->67379 67379->67377 67380->67382 67382->67355 67383->67360 67385 6cf8fe31 67384->67385 67386 6cf8fe18 67384->67386 67388 6cf8fe52 67385->67388 67458 6cedcda0 27 API calls 67385->67458 67457 6ced0e00 GetCurrentThreadId 67386->67457 67408 6cf56c30 67388->67408 67391 6cf8fec0 67392 6cef95c0 29 API calls 67391->67392 67394 6cf900c3 67391->67394 67393 6cf8fef6 67392->67393 67393->67394 67428 6cf21920 67393->67428 67459 6cfc08f0 7 API calls 67394->67459 67397 6cf8ff85 67397->67394 67399 6cef95c0 29 API calls 67397->67399 67398 6cf90133 67398->67369 67401 6cf8ffa0 67399->67401 67400 6cef95c0 29 API calls 67400->67401 67401->67394 67401->67400 67402 6cf900c5 67401->67402 67403 6cf21920 29 API calls 67401->67403 67404 6cf21920 29 API calls 67402->67404 67403->67401 67405 6cf900d1 67404->67405 67405->67394 67406 6cf900d8 memcpy 67405->67406 67406->67394 67407->67368 67460 6cf1c380 28 API calls 67408->67460 67410 6cf56c46 67411 6cf56c4f 67410->67411 67461 6cf56aa0 GetCurrentThreadId 67410->67461 67411->67391 67413 6cf56d2d 67413->67391 67414 6cf56c5c 67414->67413 67415 6cf56ca6 67414->67415 67416 6cf56c7c 67414->67416 67425 6cf56cec 67414->67425 67420 6cf56cd7 67415->67420 67421 6cf56cab 67415->67421 67462 6ced0e00 GetCurrentThreadId 67416->67462 67419 6cf56d0c 67419->67391 67420->67425 67426 6cf56d1f 67420->67426 67463 6ced0e00 GetCurrentThreadId 67421->67463 67423 6cf56c95 67423->67391 67424 6cf56cc4 67424->67391 67464 6ced0e00 GetCurrentThreadId 67425->67464 67426->67413 67465 6cf56b00 GetCurrentThreadId 67426->67465 67429 6cf219a8 67428->67429 67430 6cf21949 67428->67430 67431 6cf21a68 67429->67431 67432 6cf219bd 67429->67432 67433 6cf2196a 67430->67433 67434 6cf2194d 67430->67434 67442 6cf21a23 67431->67442 67482 6cef9d40 GetCurrentThreadId 67431->67482 67435 6cef95c0 29 API calls 67432->67435 67467 6cf1c810 67433->67467 67466 6cfc08f0 7 API calls 67434->67466 67450 6cf219db 67435->67450 67438 6cf21970 67440 6cf21a42 67438->67440 67448 6cf2197d 67438->67448 67439 6cf21a7f 67439->67440 67439->67442 67480 6cfc08f0 7 API calls 67440->67480 67442->67440 67445 6cf21a96 67442->67445 67444 6cf21966 67444->67397 67483 6cfc08f0 7 API calls 67445->67483 67446 6cf21a51 67446->67397 67479 6cfc08f0 7 API calls 67448->67479 67449 6cf21aa8 67449->67397 67450->67440 67452 6cf21a55 67450->67452 67453 6cf21a1f 67450->67453 67481 6cfc08f0 7 API calls 67452->67481 67453->67442 67453->67452 67454 6cf219a4 67454->67397 67456 6cf21a64 67456->67397 67457->67385 67458->67385 67459->67398 67460->67410 67461->67414 67462->67423 67463->67424 67464->67419 67465->67413 67466->67444 67468 6cf1c823 67467->67468 67477 6cf1c8f1 67467->67477 67469 6cf1c83d 67468->67469 67470 6cf1c860 67468->67470 67468->67477 67471 6ced0e00 GetCurrentThreadId 67469->67471 67472 6cf1c8a4 67470->67472 67474 6cedc950 27 API calls 67470->67474 67470->67477 67473 6cf1c856 67471->67473 67475 6cf1c8ce 67472->67475 67476 6cedc950 27 API calls 67472->67476 67473->67438 67474->67472 67478 6cf3b9f0 29 API calls 67475->67478 67476->67475 67477->67438 67478->67477 67479->67454 67480->67446 67481->67456 67482->67439 67483->67449 67484->67376 67499 6cf7d780 39 API calls 67485->67499 67486 6cf7d521 67487 6cf7d5a9 67486->67487 67489 6cf7d5c1 67486->67489 67490 6cf7d53a 67486->67490 67487->67099 67491 6cf7d611 67489->67491 67492 6cf7d5cf memcpy 67489->67492 67493 6cf7d5fd 67489->67493 67512 6ced0e00 GetCurrentThreadId 67490->67512 67494 6cf7d616 memcpy 67491->67494 67495 6cf7d644 67491->67495 67492->67099 67513 6cedcda0 27 API calls 67493->67513 67494->67099 67514 6cedcda0 27 API calls 67495->67514 67498 6cf7d658 67499->67486 67500->67099 67501->67099 67502->67099 67503->67099 67504->67099 67505->67099 67506->67099 67507->67099 67508->67087 67509->67087 67510->67087 67511->67087 67512->67487 67513->67491 67514->67498 67515 40503c 67518 404ff1 67515->67518 67516 404ed0 7 API calls 67517 405048 free 67516->67517 67517->67518 67519 40505c 67517->67519 67518->67516 67521 405010 malloc GetShortPathNameW 67518->67521 67523 404e70 GetLastError FormatMessageA 67518->67523 67521->67518 67522 405032 free 67521->67522 67522->67518 67523->67518 67524 6cedee70 67527 6cede870 67524->67527 67526 6cedee84 67528 6cede897 67527->67528 67531 6cede8ae 67527->67531 67616 6cfc08f0 7 API calls 67528->67616 67530 6cede8aa 67530->67526 67532 6cede940 GetCurrentThreadId 67531->67532 67533 6cede927 67531->67533 67532->67533 67535 6cede98d 67533->67535 67554 6cf072a0 LoadLibraryA LoadLibraryA LoadLibraryA 67533->67554 67541 6cedea0c 67535->67541 67617 6cede420 8 API calls 67535->67617 67537 6cedee16 67622 6cfc08f0 7 API calls 67537->67622 67539 6cedee42 67539->67526 67540 6cedee09 67540->67537 67541->67537 67541->67540 67542 6cededf5 67541->67542 67544 6ceded30 67541->67544 67621 6cedcda0 27 API calls 67542->67621 67544->67540 67545 6ceded88 67544->67545 67545->67528 67546 6cededb1 67545->67546 67546->67537 67547 6cededb7 67546->67547 67618 6ced0e00 GetCurrentThreadId 67547->67618 67549 6cededcf 67619 6ced23e0 GetCurrentThreadId 67549->67619 67551 6cededde 67620 6cfc08f0 7 API calls 67551->67620 67553 6cededf1 67553->67526 67555 6cf07356 67554->67555 67556 6cf0733a GetProcAddress GetProcAddress 67554->67556 67557 6cf073d5 67555->67557 67560 6cf07370 NetStatisticsGet 67555->67560 67556->67555 67558 6cf07403 FreeLibrary 67557->67558 67559 6cf0740a 67557->67559 67558->67559 67561 6cf07413 GetProcAddress GetProcAddress GetProcAddress 67559->67561 67568 6cf07443 67559->67568 67562 6cf073b9 NetStatisticsGet 67560->67562 67563 6cf0738c 67560->67563 67561->67568 67562->67557 67563->67562 67564 6cf07546 GetVersion 67566 6cf07560 LoadLibraryA 67564->67566 67567 6cf07553 67564->67567 67565 6cf07539 FreeLibrary 67565->67564 67570 6cf07575 GetProcAddress GetProcAddress GetProcAddress 67566->67570 67571 6cf0766d 67566->67571 67630 6cedcb30 14 API calls 67567->67630 67568->67564 67568->67565 67575 6cf075a8 67570->67575 67572 6cf07675 12 API calls 67571->67572 67573 6cf07b47 67571->67573 67578 6cf07b40 FreeLibrary 67572->67578 67584 6cf0772b 67572->67584 67623 6cf07cb0 67573->67623 67574 6cf07558 67574->67566 67574->67571 67577 6cf075d6 GetVersion 67575->67577 67585 6cf07633 67575->67585 67580 6cf075e3 GetVersion 67577->67580 67587 6cf075ed 67577->67587 67578->67573 67580->67585 67580->67587 67581 6cf07666 FreeLibrary 67581->67571 67582 6cec7160 67583 6cf07b6f GetCurrentProcessId 67582->67583 67586 6cf07b94 67583->67586 67584->67578 67590 6cf077a8 CreateToolhelp32Snapshot 67584->67590 67585->67581 67631 6cfc08f0 7 API calls 67586->67631 67587->67585 67589 6cf07bb4 67589->67535 67590->67578 67591 6cf077bd 67590->67591 67592 6cf077f7 Heap32ListFirst 67591->67592 67593 6cf077ef GetTickCount 67591->67593 67594 6cf07971 67592->67594 67600 6cf07813 67592->67600 67593->67592 67595 6cf07984 GetTickCount 67594->67595 67596 6cf0798c Process32First 67594->67596 67595->67596 67597 6cf079f8 67596->67597 67601 6cf0799e 67596->67601 67599 6cf07a11 GetTickCount 67597->67599 67605 6cf07a19 67597->67605 67598 6cf0783f Heap32First 67598->67600 67599->67605 67600->67594 67600->67598 67602 6cf07934 Heap32ListNext 67600->67602 67604 6cf07955 GetTickCount 67600->67604 67606 6cf078d1 Heap32Next 67600->67606 67608 6cf078ee GetTickCount 67600->67608 67601->67597 67609 6cf079e9 GetTickCount 67601->67609 67602->67594 67602->67600 67603 6cf07a8b 67607 6cf07aa4 GetTickCount 67603->67607 67611 6cf07aac 67603->67611 67604->67594 67604->67600 67605->67603 67614 6cf07a80 GetTickCount 67605->67614 67606->67600 67607->67611 67608->67600 67609->67597 67609->67601 67610 6cf07b1e 67612 6cf07b33 CloseHandle 67610->67612 67613 6cf07b28 67610->67613 67611->67610 67615 6cf07b0f GetTickCount 67611->67615 67612->67578 67613->67578 67614->67603 67614->67605 67615->67610 67615->67611 67616->67530 67617->67535 67618->67549 67619->67551 67620->67553 67621->67540 67622->67539 67624 6cf07cf3 GetTickCount 67623->67624 67625 6cf07cbf QueryPerformanceCounter 67623->67625 67628 6cf07d0f 67624->67628 67626 6cf07cd4 67625->67626 67627 6cf07ccd 67625->67627 67626->67624 67629 6cf07b4c GlobalMemoryStatus 67626->67629 67627->67624 67628->67629 67629->67582 67630->67574 67631->67589

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 82 6cf072a0-6cf07338 LoadLibraryA * 3 83 6cf07356-6cf0735d 82->83 84 6cf0733a-6cf07350 GetProcAddress * 2 82->84 85 6cf07363-6cf0736a 83->85 86 6cf073ff-6cf07401 83->86 84->83 85->86 89 6cf07370-6cf0738a NetStatisticsGet 85->89 87 6cf07403-6cf07404 FreeLibrary 86->87 88 6cf0740a-6cf07411 86->88 87->88 90 6cf07443-6cf0744a 88->90 91 6cf07413-6cf0743d GetProcAddress * 3 88->91 92 6cf073b9-6cf073d3 NetStatisticsGet 89->92 93 6cf0738c-6cf073b2 call 6cec7160 89->93 95 6cf07530-6cf07537 90->95 96 6cf07450-6cf07457 90->96 91->90 92->86 94 6cf073d5-6cf073f8 call 6cec7160 92->94 93->92 94->86 100 6cf07546-6cf07551 GetVersion 95->100 101 6cf07539-6cf07540 FreeLibrary 95->101 96->95 102 6cf0745d-6cf07464 96->102 104 6cf07560-6cf0756f LoadLibraryA 100->104 105 6cf07553-6cf0755a call 6cedcb30 100->105 101->100 102->95 106 6cf0746a-6cf07486 102->106 108 6cf07575-6cf075a6 GetProcAddress * 3 104->108 109 6cf0766d-6cf0766f 104->109 105->104 105->109 117 6cf07488-6cf0749d 106->117 118 6cf074ce-6cf074df 106->118 114 6cf075a8 108->114 115 6cf075cd-6cf075d4 108->115 111 6cf07675-6cf07725 GetProcAddress * 12 109->111 112 6cf07b47-6cf07b6a call 6cf07cb0 GlobalMemoryStatus call 6cec7160 109->112 121 6cf07b40-6cf07b41 FreeLibrary 111->121 122 6cf0772b-6cf07732 111->122 137 6cf07b6f-6cf07bb7 GetCurrentProcessId call 6cec7160 call 6cfc08f0 112->137 129 6cf075ae-6cf075ca call 6cec7160 114->129 119 6cf07633-6cf0763a 115->119 120 6cf075d6-6cf075e1 GetVersion 115->120 138 6cf074bf-6cf074c7 117->138 139 6cf0749f-6cf074b5 call 6cec7160 117->139 134 6cf074e2-6cf074e4 118->134 127 6cf07666-6cf07667 FreeLibrary 119->127 128 6cf0763c-6cf07663 call 6cec7160 119->128 124 6cf075e3-6cf075eb GetVersion 120->124 125 6cf075ed-6cf075f4 120->125 121->112 122->121 126 6cf07738-6cf0773f 122->126 124->119 124->125 125->119 132 6cf075f6-6cf0760f 125->132 126->121 133 6cf07745-6cf0774c 126->133 127->109 128->127 129->115 132->119 151 6cf07611-6cf07630 call 6cec7160 132->151 133->121 140 6cf07752-6cf07759 133->140 134->95 141 6cf074e6-6cf074fb 134->141 138->118 139->138 140->121 146 6cf0775f-6cf07766 140->146 157 6cf07521-6cf07529 141->157 158 6cf074fd-6cf07517 call 6cec7160 141->158 146->121 152 6cf0776c-6cf07773 146->152 151->119 152->121 156 6cf07779-6cf07780 152->156 156->121 162 6cf07786-6cf0778d 156->162 157->95 158->157 162->121 164 6cf07793-6cf0779a 162->164 164->121 165 6cf077a0-6cf077a2 164->165 165->121 166 6cf077a8-6cf077b7 CreateToolhelp32Snapshot 165->166 166->121 167 6cf077bd-6cf077ed 166->167 168 6cf077f7-6cf0780d Heap32ListFirst 167->168 169 6cf077ef-6cf077f1 GetTickCount 167->169 170 6cf07971-6cf07982 168->170 171 6cf07813-6cf0781d 168->171 169->168 172 6cf07984-6cf07986 GetTickCount 170->172 173 6cf0798c-6cf0799c Process32First 170->173 174 6cf07820-6cf078a5 call 6cec7160 Heap32First 171->174 172->173 176 6cf079fe-6cf07a0f 173->176 177 6cf0799e-6cf079a4 173->177 182 6cf078a7-6cf078ac 174->182 183 6cf07908-6cf0794a Heap32ListNext 174->183 180 6cf07a11-6cf07a13 GetTickCount 176->180 181 6cf07a19-6cf07a2f 176->181 179 6cf079aa-6cf079de call 6cec7160 177->179 202 6cf079e0-6cf079e7 179->202 203 6cf079f8 179->203 180->181 189 6cf07a91-6cf07aa2 181->189 190 6cf07a31-6cf07a37 181->190 186 6cf078b2-6cf078e3 call 6cec7160 Heap32Next 182->186 183->170 192 6cf0794c-6cf07953 183->192 186->183 201 6cf078e5-6cf078ec 186->201 198 6cf07aa4-6cf07aa6 GetTickCount 189->198 199 6cf07aac-6cf07ac2 189->199 195 6cf07a3d-6cf07a75 call 6cec7160 190->195 193 6cf07964-6cf0796b 192->193 194 6cf07955-6cf07962 GetTickCount 192->194 193->170 193->174 194->170 194->193 216 6cf07a77-6cf07a7e 195->216 217 6cf07a8b 195->217 198->199 209 6cf07ac4-6cf07aca 199->209 210 6cf07b1e-6cf07b26 199->210 206 6cf078fd-6cf07906 201->206 207 6cf078ee-6cf078fb GetTickCount 201->207 202->179 208 6cf079e9-6cf079f6 GetTickCount 202->208 203->176 206->183 206->186 207->183 207->206 208->179 208->203 211 6cf07ad0-6cf07b04 call 6cec7160 209->211 213 6cf07b33-6cf07b3a CloseHandle 210->213 214 6cf07b28-6cf07b31 210->214 211->210 222 6cf07b06-6cf07b0d 211->222 213->121 214->121 216->195 219 6cf07a80-6cf07a89 GetTickCount 216->219 217->189 219->195 219->217 222->211 223 6cf07b0f-6cf07b1c GetTickCount 222->223 223->210 223->211
                                                APIs
                                                • LoadLibraryA.KERNEL32(ADVAPI32.DLL,7AEC0E1A,00000001,?,00000000), ref: 6CF072F2
                                                • LoadLibraryA.KERNEL32(KERNEL32.DLL,?,00000000), ref: 6CF072FF
                                                • LoadLibraryA.KERNELBASE(NETAPI32.DLL,?,00000000), ref: 6CF0730E
                                                • GetProcAddress.KERNEL32(00000000,NetStatisticsGet), ref: 6CF07340
                                                • GetProcAddress.KERNELBASE(00000000,NetApiBufferFree), ref: 6CF0734E
                                                • NetStatisticsGet.NETAPI32(00000000,LanmanWorkstation,00000000,00000000,?,?,00000000), ref: 6CF07382
                                                • NetStatisticsGet.NETAPI32(00000000,LanmanServer,00000000,00000000,?,?,00000000), ref: 6CF073CB
                                                • FreeLibrary.KERNELBASE(00000000,?,00000000), ref: 6CF07404
                                                • GetProcAddress.KERNEL32(00000000,CryptAcquireContextW), ref: 6CF0741F
                                                • GetProcAddress.KERNEL32(00000000,CryptGenRandom), ref: 6CF0742D
                                                • GetProcAddress.KERNEL32(00000000,CryptReleaseContext), ref: 6CF0743B
                                                • FreeLibrary.KERNEL32(00000000,?,00000000), ref: 6CF07540
                                                • GetVersion.KERNEL32(?,00000000), ref: 6CF07546
                                                • LoadLibraryA.KERNEL32(USER32.DLL,?,00000000), ref: 6CF07565
                                                • GetProcAddress.KERNEL32(00000000,GetForegroundWindow), ref: 6CF0757B
                                                • GetProcAddress.KERNEL32(00000000,GetCursorInfo), ref: 6CF07589
                                                • GetProcAddress.KERNEL32(00000000,GetQueueStatus), ref: 6CF07597
                                                • GetVersion.KERNEL32(?,00000000), ref: 6CF075D6
                                                • GetVersion.KERNEL32(?,00000000), ref: 6CF075E3
                                                • FreeLibrary.KERNEL32(00000000,?,00000000), ref: 6CF07667
                                                • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 6CF07685
                                                • GetProcAddress.KERNEL32(00000000,CloseToolhelp32Snapshot), ref: 6CF0768F
                                                • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 6CF0769D
                                                • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 6CF076AB
                                                • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 6CF076B9
                                                • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 6CF076C7
                                                • GetProcAddress.KERNEL32(00000000,Process32First), ref: 6CF076D5
                                                • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 6CF076E3
                                                • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 6CF076F1
                                                • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 6CF076FF
                                                • GetProcAddress.KERNEL32(00000000,Module32First), ref: 6CF0770D
                                                • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 6CF0771B
                                                • CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000,?,00000000), ref: 6CF077AC
                                                • GetTickCount.KERNEL32 ref: 6CF077EF
                                                • Heap32ListFirst.KERNEL32(?,00000010,?,00000000), ref: 6CF07805
                                                • Heap32First.KERNEL32(00000024,?,?), ref: 6CF0789D
                                                • Heap32Next.KERNEL32(00000024), ref: 6CF078DB
                                                • GetTickCount.KERNEL32 ref: 6CF078EE
                                                • Heap32ListNext.KERNEL32(?,00000010), ref: 6CF07942
                                                • GetTickCount.KERNEL32 ref: 6CF07955
                                                • GetTickCount.KERNEL32 ref: 6CF07984
                                                • Process32First.KERNEL32(?,00000128,?,00000000), ref: 6CF07994
                                                • GetTickCount.KERNEL32 ref: 6CF079E9
                                                • GetTickCount.KERNEL32 ref: 6CF07A11
                                                • GetTickCount.KERNEL32 ref: 6CF07A80
                                                • GetTickCount.KERNEL32 ref: 6CF07AA4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: AddressProc$CountTick$Library$Heap32Load$FirstFreeVersion$ListNextStatistics$CreateProcess32SnapshotToolhelp32
                                                • String ID: $$*$ADVAPI32.DLL$CloseToolhelp32Snapshot$CreateToolhelp32Snapshot$CryptAcquireContextW$CryptGenRandom$CryptReleaseContext$GetCursorInfo$GetForegroundWindow$GetQueueStatus$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Intel Hardware Cryptographic Service Provider$KERNEL32.DLL$LanmanServer$LanmanWorkstation$Module32First$Module32Next$NETAPI32.DLL$NetApiBufferFree$NetStatisticsGet$Process32First$Process32Next$Thread32First$Thread32Next$USER32.DLL
                                                • API String ID: 622057041-688639677
                                                • Opcode ID: b029ace5a0f9eb2274816ab46e62cdc5a1d9eecbfdda3c93e7fc77c86b80d57d
                                                • Instruction ID: 8e9c2729d1df2fb28e799666647505148d62c3b3374587e93f4ea14287251017
                                                • Opcode Fuzzy Hash: b029ace5a0f9eb2274816ab46e62cdc5a1d9eecbfdda3c93e7fc77c86b80d57d
                                                • Instruction Fuzzy Hash: C83280B1E11329DBEB629F64CC94BAEB7BCFB04708F1055DAE608A2580DB744B84CF55

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 224 401910-40191e 225 401ba0-401bb7 call 402e70 224->225 226 401924-401953 fseek ftell call 401550 224->226 225->226 233 401bbd 225->233 231 401a30-401a79 fseek fread 226->231 232 401959-4019b4 ntohl * 2 fseek ntohl malloc 226->232 236 401b88-401b95 231->236 237 401a7f-401a84 231->237 234 401c00-401c11 call 401e10 232->234 235 4019ba-4019e4 ntohl fread 232->235 233->236 247 401a25-401a2d 234->247 239 401bc0-401bd1 call 401e10 235->239 240 4019ea-401a0b ntohl ferror 235->240 237->236 241 401a8a-401b0b fseek fread fseek fread 237->241 239->247 243 401be0-401bf1 call 401e10 240->243 244 401a11-401a15 240->244 246 401b11-401b18 241->246 241->247 243->247 244->247 248 401a17-401a1f fclose 244->248 250 401bf6-401bfb 246->250 251 401b1e-401b20 246->251 248->247 255 401b27-401b66 fseek fread 250->255 251->236 253 401b22 251->253 253->255 255->236 256 401b68 255->256 256->236 257 401b6a-401b6d 256->257 258 401b70-401b7b call 401550 257->258 258->232 261 401b81-401b86 258->261 261->236 261->258
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: fseek$fread$ntohl$fcloseferrorftellmalloc
                                                • String ID: <$M$Z
                                                • API String ID: 1210635778-2411191596
                                                • Opcode ID: 22c94d8cbfd2c8a756679ede75317217de67614fe7dbd657829fe7cd87c47316
                                                • Instruction ID: 63e9dff835d06efa9c253b72d6fa9fbe9e8e210f0df08c9395a141b2f83197ea
                                                • Opcode Fuzzy Hash: 22c94d8cbfd2c8a756679ede75317217de67614fe7dbd657829fe7cd87c47316
                                                • Instruction Fuzzy Hash: A781F8B19087108FDB00AF29C48531ABBF0AF45354F05896EE994AB3D5E778D889CF87

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 397 401610-401629 398 401790-4017a7 call 402e70 397->398 399 40162f-401672 ntohl fseek ntohl malloc 397->399 398->399 407 4017ad-4017bb call 401e70 398->407 400 4017d3-4017e1 call 401e70 399->400 401 401678-4016a7 ntohl fread 399->401 419 4017e6-4017f9 call 401e70 400->419 404 4017c0-4017ce call 401e70 401->404 405 4016ad-4016b1 401->405 404->400 410 4016d1-4016ef call 405750 ntohl malloc 405->410 411 4016b3-4016b7 405->411 415 4016c7-4016d0 407->415 420 4016f5-401755 ntohl * 2 call 405c10 410->420 421 40183a-401846 call 401e70 410->421 411->415 416 4016b9-4016c1 fclose 411->416 416->415 425 4017fe-40181b free call 401e70 419->425 420->419 429 40175b-40176d call 405cb0 420->429 421->425 432 401820-401838 call 401e70 425->432 429->432 435 401773-401787 call 407b80 free 429->435 432->425 435->411
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ntohl$malloc$fclosefreadfreefseek
                                                • String ID: 8
                                                • API String ID: 3563950672-4194326291
                                                • Opcode ID: 71c987e3ab84fa5ae62887f41dbef14642ab441643ae0335d389b5b4044012b5
                                                • Instruction ID: 41aeb47febc30618cac309c64aa81c6421efd7c50b9d6fbac4d1b3f2b222a95d
                                                • Opcode Fuzzy Hash: 71c987e3ab84fa5ae62887f41dbef14642ab441643ae0335d389b5b4044012b5
                                                • Instruction Fuzzy Hash: 1D51D2B4908700CFD700BF65C58561ABBE0AF45344F05893EE8C8A7391E779E845CB8B

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 571 401179-4011e9 call 40a5e0 574 401487-401490 GetStartupInfoW 571->574 575 4011ef-401200 571->575 579 401498-4014b1 _initterm 574->579 576 401216-401222 575->576 577 401202-401204 576->577 578 401224-40122e 576->578 580 401429-401436 577->580 581 40120a-401213 Sleep 577->581 582 401234-40123b 578->582 583 40143c-401450 _amsg_exit 578->583 585 4014bb 579->585 580->582 580->583 581->576 582->579 584 401241-401253 582->584 586 401456-401476 _initterm 583->586 587 401259-40125b 583->587 584->586 584->587 590 4014c2-4014ca exit 585->590 588 401261-401268 586->588 589 40147c-401482 586->589 587->588 587->589 591 401286-4012c4 call 409b80 SetUnhandledExceptionFilter call 40a840 call 409e20 588->591 592 40126a-401283 588->592 589->588 600 4012c6-4012c8 591->600 601 40130c-401314 591->601 592->591 604 4012e1-4012e8 600->604 602 401316-401326 601->602 603 40132b-401352 malloc 601->603 602->603 603->585 607 401358-40135c 603->607 605 4012d0-4012d3 604->605 606 4012ea-4012f6 604->606 610 4012d5-4012d7 605->610 611 401307 605->611 608 4012de 606->608 609 401360-401367 607->609 608->604 614 40136d 609->614 615 40141f-401424 609->615 612 4012f8-401305 610->612 613 4012d9 610->613 611->601 612->611 612->612 613->608 617 401372-40137b 614->617 616 401380-4013a7 malloc memcpy 615->616 616->609 619 4013a9-4013fd call 409eb0 call 409ed0 616->619 617->617 618 40137d 617->618 618->616 619->590 624 401403-40140b 619->624 625 401417-40141e 624->625 626 40140d-401412 _cexit 624->626 626->625
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpy
                                                • String ID:
                                                • API String ID: 772431862-0
                                                • Opcode ID: 19d6fbc226cdd4db3d11f52ab5f5630fc0c68800101226e4b1f4ca7a7eef5a3a
                                                • Instruction ID: c8aecaf62c9696b9110834f88a24b20446e6a75ea57b9a4d6652262331ab5fd4
                                                • Opcode Fuzzy Hash: 19d6fbc226cdd4db3d11f52ab5f5630fc0c68800101226e4b1f4ca7a7eef5a3a
                                                • Instruction Fuzzy Hash: AE817CB1A043018FD710EF6AD980B9ABBF1FB54304F41853ED944AB3B1D7789846CB8A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 627 6cede870-6cede895 628 6cede8ae-6cede8e4 627->628 629 6cede897-6cede8ad call 6cfc08f0 627->629 631 6cede8e6-6cede8ed 628->631 632 6cede902-6cede909 628->632 633 6cede91e-6cede925 631->633 636 6cede8ef-6cede8ff 631->636 632->633 634 6cede90b-6cede91b 632->634 637 6cede927-6cede931 633->637 638 6cede933-6cede93a 633->638 634->633 636->632 645 6cede959-6cede960 637->645 641 6cede93c-6cede93e 638->641 642 6cede940 GetCurrentThreadId 638->642 644 6cede946-6cede953 641->644 642->644 644->645 647 6cede975-6cede986 645->647 648 6cede962-6cede972 645->648 649 6cede9ac-6cede9b4 647->649 650 6cede988 call 6cf072a0 647->650 648->647 653 6cede9b8-6cede9c1 649->653 654 6cede9b6 649->654 655 6cede98d-6cede9a4 650->655 656 6cede9e1-6cede9e3 653->656 657 6cede9c3-6cede9d9 653->657 654->653 655->649 658 6cede9a6 655->658 660 6cede9e5-6cede9ea 656->660 661 6cedea20 656->661 657->656 659 6cede9db 657->659 658->649 659->656 662 6cede9f2-6cedea0a call 6cede420 660->662 663 6cedea22-6cedea82 661->663 670 6cedea0c-6cedea12 662->670 671 6cede9f0 662->671 665 6cedea8e-6cedeaa2 663->665 666 6cedea84-6cedea88 663->666 668 6cedeaa4-6cedeaab 665->668 669 6cedeac0-6cedeac6 665->669 666->665 668->669 672 6cedeaad-6cedeabd 668->672 673 6cedeac8-6cedead1 669->673 674 6cedead3-6cedead5 669->674 670->663 676 6cedea14-6cedea1e 670->676 671->662 672->669 675 6cedead9-6cedeaf4 call 6cef92a0 673->675 674->675 680 6cedee29-6cedee2d call 6cef97e0 675->680 681 6cedeafa-6cedeb0f 675->681 676->663 683 6cedee32-6cedee45 call 6cfc08f0 680->683 681->680 686 6cedeb15-6cedeb2a 681->686 686->680 689 6cedeb30-6cedeb44 686->689 689->680 691 6cedeb4a-6cedeb5f 689->691 692 6cedeb87-6cedeb8a 691->692 693 6cedeb61-6cedeb74 691->693 694 6cedeb8b-6cedeb94 692->694 693->680 696 6cedeb7a-6cedeb85 693->696 694->680 698 6cedeb9a-6cedebab call 6cef9530 694->698 696->694 698->680 701 6cedebb1-6cedebbf 698->701 702 6cedebc2-6cedebcf 701->702 703 6cedebd1 702->703 704 6cedebd3-6cedebd7 702->704 703->704 705 6cedebd9-6cedebdf 704->705 706 6cedebe0-6cedebed 704->706 705->706 707 6cedebef 706->707 708 6cedebf1-6cedebfc 706->708 707->708 709 6cedebfe-6cedec04 708->709 710 6cedec05-6cedec12 708->710 709->710 711 6cedec14 710->711 712 6cedec16-6cedec1a 710->712 711->712 713 6cedec1c-6cedec22 712->713 714 6cedec23-6cedec30 712->714 713->714 715 6cedec34-6cedec3d 714->715 716 6cedec32 714->716 717 6cedec3f-6cedec49 715->717 718 6cedec4a-6cedec5b 715->718 716->715 717->718 719 6cedec5d 718->719 720 6cedec5f-6cedec68 718->720 719->720 721 6cedec6a-6cedec70 720->721 722 6cedec71-6cedec7e 720->722 721->722 722->702 723 6cedec84-6cedec8c 722->723 723->669 724 6cedec92-6cedeca8 call 6cef92a0 723->724 724->680 727 6cedecae-6cedecc3 724->727 727->680 729 6cedecc9-6cedecde 727->729 729->680 731 6cedece4-6cedece9 729->731 732 6cedeceb-6cedecf2 731->732 733 6ceded07-6ceded1c 731->733 732->733 734 6cedecf4-6ceded04 732->734 736 6cedee09-6cedee0b 733->736 737 6ceded22-6ceded2a 733->737 734->733 736->680 741 6cedee0d-6cedee14 736->741 739 6cededf5-6cedee04 call 6cedcda0 737->739 740 6ceded30-6ceded4d 737->740 739->736 746 6ceded4f-6ceded59 740->746 747 6ceded5e-6ceded75 call 6cfa2320 740->747 741->680 743 6cedee16-6cedee26 741->743 743->680 746->747 747->736 751 6ceded7b-6ceded7d 747->751 752 6ceded7f-6ceded86 751->752 753 6ceded9b-6cededab call 6cef97e0 751->753 752->753 755 6ceded88-6ceded98 752->755 753->629 757 6cededb1-6cededb5 753->757 755->753 757->683 759 6cededb7-6cededf4 call 6ced0e00 call 6ced23e0 call 6cfc08f0 757->759
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ....................$C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\digest.c$C:\build27\cpython\externals\openssl-1.0.2t\crypto\rand\md_rand.c$You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html$ctx->digest->md_size <= EVP_MAX_MD_SIZE$gfff
                                                • API String ID: 0-2963164398
                                                • Opcode ID: 124b665820e06b934e628a982245ac4ce4074a465cb64cb69657eccb41eca836
                                                • Instruction ID: d6775d1cdf902167b3496179c584c009e5cd983053a856be7b226da431cdf88b
                                                • Opcode Fuzzy Hash: 124b665820e06b934e628a982245ac4ce4074a465cb64cb69657eccb41eca836
                                                • Instruction Fuzzy Hash: 1EF103306097419FD704CFA5D885B9AB7F0AB85708F25492CF9A9C7781D7B1E80ACBC2
                                                APIs
                                                • _time64.MSVCR90 ref: 6CF7CB76
                                                • memcpy.MSVCR90(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CF7CD37
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\s23_clnt.c, xrefs: 6CF7CBE4
                                                • , xrefs: 6CF7CB6B
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: _time64memcpy
                                                • String ID: $C:\build27\cpython\externals\openssl-1.0.2t\ssl\s23_clnt.c
                                                • API String ID: 1622878224-1811189137
                                                • Opcode ID: 9f8f2ad9349fc6236f7a91a9e7738b211675f2f4f428edfc352957cc9c5eef1c
                                                • Instruction ID: 3f0db605ee445dca452f8262e8fcc782a0bf4db06aaa596574496679441d482e
                                                • Opcode Fuzzy Hash: 9f8f2ad9349fc6236f7a91a9e7738b211675f2f4f428edfc352957cc9c5eef1c
                                                • Instruction Fuzzy Hash: D4F14771E042418BEB24DF6CD8807DEBBB5AF45308F2881AED849AB782D375D945C7B1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_pkt.c$SSL alert number
                                                • API String ID: 0-2580806745
                                                • Opcode ID: f3994f7c77f95eeb4ad651edc1823efcc729a1d2d46a9e579cd4c3a5360e1290
                                                • Instruction ID: 0de88746d1c0d20510b423c68ab25a759c13c010a87da0d59b8667f34cda2467
                                                • Opcode Fuzzy Hash: f3994f7c77f95eeb4ad651edc1823efcc729a1d2d46a9e579cd4c3a5360e1290
                                                • Instruction Fuzzy Hash: 5C32E2706047458FE720CF15E884BABB3B1EF46318F144A7FD95A8BE91C771A885CBA1
                                                APIs
                                                • WSASetLastError.WS2_32(00000000), ref: 6CF983AF
                                                • recv.WS2_32(?,?,?,00000000), ref: 6CF983C3
                                                • WSAGetLastError.WS2_32 ref: 6CF983DA
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: ErrorLast$recv
                                                • String ID:
                                                • API String ID: 316788870-0
                                                • Opcode ID: 8f3c23e2ed589bbef6a72fac62923e71b51809a565dd33da6f5e15d03c6c203e
                                                • Instruction ID: bf7093a31b027e0f6a6c48e4f62d6b92479e447b30f498094953bb8c041860fc
                                                • Opcode Fuzzy Hash: 8f3c23e2ed589bbef6a72fac62923e71b51809a565dd33da6f5e15d03c6c203e
                                                • Instruction Fuzzy Hash: 4CF09632A12611A7FE214A669808E9B7738EB05335F310712FC21E7690C731E94486E5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 6cec6770-6cec6789 PyType_Ready 1 6cec678f-6cec679b PyType_Ready 0->1 2 6cec6fc8-6cec6fcc 0->2 1->2 3 6cec67a1-6cec67c4 Py_InitModule4 1->3 3->2 4 6cec67ca-6cec67de PyModule_GetDict call 6cec1000 3->4 4->2 7 6cec67e4-6cec6809 call 6cedca10 call 6cf04d80 call 6cf054e0 call 6cf99680 call 6cf8c6b0 call 6cf72580 call 6cec6640 4->7 7->2 22 6cec680f-6cec6834 PyErr_NewExceptionWithDoc 7->22 23 6cec683a-6cec68cc PyErr_NewExceptionWithDoc * 5 22->23 24 6cec6fc7 22->24 25 6cec6fc6 23->25 26 6cec68d2-6cec68d9 23->26 24->2 25->24 26->25 27 6cec68df-6cec68e7 26->27 27->25 28 6cec68ed-6cec68f5 27->28 28->25 29 6cec68fb-6cec68fd 28->29 29->25 30 6cec6903-6cec6935 PyDict_SetItemString 29->30 30->25 31 6cec693b-6cec694e PyDict_SetItemString 30->31 31->25 32 6cec6954-6cec6968 PyDict_SetItemString 31->32 32->25 33 6cec696e-6cec6982 PyDict_SetItemString 32->33 33->25 34 6cec6988-6cec699b PyDict_SetItemString 33->34 34->25 35 6cec69a1-6cec69b5 PyDict_SetItemString 34->35 35->25 36 6cec69bb-6cec69cd PyDict_SetItemString 35->36 36->25 37 6cec69d3-6cec69e5 PyDict_SetItemString 36->37 37->25 38 6cec69eb-6cec6d19 PyModule_AddIntConstant * 61 PyModule_AddObject * 6 PyDict_New * 2 37->38 38->25 39 6cec6d1f-6cec6d21 38->39 39->25 40 6cec6d27-6cec6d35 39->40 41 6cec6ded-6cec6e01 PyModule_AddObject 40->41 42 6cec6d3b 40->42 41->25 43 6cec6e07-6cec6e1a PyModule_AddObject 41->43 44 6cec6d40-6cec6d6c PyUnicodeUCS2_FromString _Py_BuildValue_SizeT 42->44 43->25 45 6cec6e20-6cec6e29 PyDict_New 43->45 44->25 46 6cec6d72-6cec6d74 44->46 45->25 47 6cec6e2f-6cec6e3d 45->47 46->25 48 6cec6d7a-6cec6d8d PyDict_SetItem 46->48 49 6cec6ec6-6cec6ed4 PyModule_AddObject 47->49 50 6cec6e43-6cec6e66 PyLong_FromLong PyUnicodeUCS2_FromString 47->50 48->25 51 6cec6d93-6cec6daa PyDict_SetItem 48->51 49->25 52 6cec6eda-6cec6eea PyLong_FromUnsignedLong 49->52 50->25 53 6cec6e6c-6cec6e6e 50->53 51->25 54 6cec6db0-6cec6db6 51->54 52->25 57 6cec6ef0-6cec6efe PyModule_AddObject 52->57 53->25 58 6cec6e74-6cec6e88 PyDict_SetItem 53->58 55 6cec6db8-6cec6dc1 54->55 56 6cec6dc4-6cec6dc7 54->56 55->56 60 6cec6dc9-6cec6dd2 56->60 61 6cec6dd5-6cec6de1 56->61 57->25 62 6cec6f04-6cec6f47 call 6cec6730 _Py_BuildValue_SizeT 57->62 58->25 59 6cec6e8e-6cec6e91 58->59 63 6cec6e9f-6cec6ea5 59->63 64 6cec6e93-6cec6e9c 59->64 60->61 61->44 66 6cec6de7 61->66 62->25 72 6cec6f49-6cec6f57 PyModule_AddObject 62->72 68 6cec6ea7-6cec6eb0 63->68 69 6cec6eb3-6cec6ebf 63->69 64->63 66->41 68->69 69->50 74 6cec6ec1 69->74 72->25 75 6cec6f59-6cec6f69 PyString_FromString 72->75 74->49 75->25 77 6cec6f6b-6cec6f79 PyModule_AddObject 75->77 77->25 78 6cec6f7b-6cec6fb8 call 6cec6730 _Py_BuildValue_SizeT 77->78 78->25 81 6cec6fba-6cec6fc3 PyModule_AddObject 78->81 81->25
                                                APIs
                                                • PyType_Ready.PYTHON27(6D00E8B8), ref: 6CEC6782
                                                • PyType_Ready.PYTHON27(6D00E2D0), ref: 6CEC6794
                                                • Py_InitModule4.PYTHON27(_ssl,6D00F0E0,Implementation module for SSL socket operations. See the socket modulefor documentation.,00000000,000003F5), ref: 6CEC67B7
                                                • PyModule_GetDict.PYTHON27(00000000), ref: 6CEC67CB
                                                  • Part of subcall function 6CEC1000: PyCapsule_Import.PYTHON27(_socket.CAPI,00000001,6CEC67DC), ref: 6CEC1007
                                                  • Part of subcall function 6CEDCA10: getenv.MSVCR90 ref: 6CEDCA33
                                                  • Part of subcall function 6CEDCA10: sscanf.MSVCR90 ref: 6CEDCA5D
                                                  • Part of subcall function 6CEDCA10: strtoul.MSVCR90 ref: 6CEDCA6D
                                                  • Part of subcall function 6CEDCA10: strchr.MSVCR90 ref: 6CEDCAC6
                                                  • Part of subcall function 6CEDCA10: strtoul.MSVCR90 ref: 6CEDCAE7
                                                  • Part of subcall function 6CEC6640: PyMem_Malloc.PYTHON27(000000A4,?,00000000,6CEC6807), ref: 6CEC665E
                                                  • Part of subcall function 6CEC6640: PyErr_NoMemory.PYTHON27(6CEC6807), ref: 6CEC6670
                                                • PyErr_NewExceptionWithDoc.PYTHON27(ssl.SSLError,An error occurred in the SSL implementation.,028AF968,00000000), ref: 6CEC6828
                                                • PyErr_NewExceptionWithDoc.PYTHON27(ssl.SSLZeroReturnError,SSL/TLS session closed cleanly.,00000000,00000000), ref: 6CEC6850
                                                • PyErr_NewExceptionWithDoc.PYTHON27(ssl.SSLWantReadError,Non-blocking SSL socket needs to read more databefore the requested operation can be completed.,028CB208,00000000), ref: 6CEC686A
                                                • PyErr_NewExceptionWithDoc.PYTHON27(ssl.SSLWantWriteError,Non-blocking SSL socket needs to write more databefore the requested operation can be completed.,028CB208,00000000), ref: 6CEC6884
                                                • PyErr_NewExceptionWithDoc.PYTHON27(ssl.SSLSyscallError,System error when attempting SSL operation.,028CB208,00000000), ref: 6CEC689D
                                                • PyErr_NewExceptionWithDoc.PYTHON27(ssl.SSLEOFError,SSL/TLS connection terminated abruptly.,028CB208,00000000), ref: 6CEC68BA
                                                • PyDict_SetItemString.PYTHON27(?,SSLError,028CB208), ref: 6CEC692E
                                                • PyDict_SetItemString.PYTHON27(?,SSLZeroReturnError,028CB3E0), ref: 6CEC6947
                                                • PyDict_SetItemString.PYTHON27(?,SSLWantReadError,028CB5B8), ref: 6CEC6961
                                                • PyDict_SetItemString.PYTHON27(?,SSLWantWriteError,028CB790), ref: 6CEC697B
                                                • PyDict_SetItemString.PYTHON27(?,SSLSyscallError,028CB968), ref: 6CEC6994
                                                • PyDict_SetItemString.PYTHON27(?,SSLEOFError,028CBB40), ref: 6CEC69AE
                                                • PyDict_SetItemString.PYTHON27(?,_SSLContext,6D00E8B8), ref: 6CEC69C6
                                                • PyDict_SetItemString.PYTHON27(?,_SSLSocket,6D00E2D0), ref: 6CEC69DE
                                                • PyModule_AddIntConstant.PYTHON27(00000000,SSL_ERROR_ZERO_RETURN,00000006), ref: 6CEC69F9
                                                • PyModule_AddIntConstant.PYTHON27(00000000,SSL_ERROR_WANT_READ,00000002), ref: 6CEC6A03
                                                • PyModule_AddIntConstant.PYTHON27(00000000,SSL_ERROR_WANT_WRITE,00000003), ref: 6CEC6A0D
                                                • PyModule_AddIntConstant.PYTHON27(00000000,SSL_ERROR_WANT_X509_LOOKUP,00000004), ref: 6CEC6A17
                                                • PyModule_AddIntConstant.PYTHON27(00000000,SSL_ERROR_SYSCALL,00000005), ref: 6CEC6A21
                                                • PyModule_AddIntConstant.PYTHON27(00000000,SSL_ERROR_SSL,00000001), ref: 6CEC6A2B
                                                • PyModule_AddIntConstant.PYTHON27(00000000,SSL_ERROR_WANT_CONNECT,00000007), ref: 6CEC6A38
                                                • PyModule_AddIntConstant.PYTHON27(00000000,SSL_ERROR_EOF,00000008), ref: 6CEC6A42
                                                • PyModule_AddIntConstant.PYTHON27(00000000,SSL_ERROR_INVALID_ERROR_CODE,0000000A), ref: 6CEC6A4C
                                                • PyModule_AddIntConstant.PYTHON27(00000000,CERT_NONE,00000000), ref: 6CEC6A56
                                                • PyModule_AddIntConstant.PYTHON27(00000000,CERT_OPTIONAL,00000001), ref: 6CEC6A60
                                                • PyModule_AddIntConstant.PYTHON27(00000000,CERT_REQUIRED,00000002), ref: 6CEC6A6A
                                                • PyModule_AddIntConstant.PYTHON27(00000000,VERIFY_DEFAULT,00000000), ref: 6CEC6A77
                                                • PyModule_AddIntConstant.PYTHON27(00000000,VERIFY_CRL_CHECK_LEAF,00000004), ref: 6CEC6A81
                                                • PyModule_AddIntConstant.PYTHON27(00000000,VERIFY_CRL_CHECK_CHAIN,0000000C), ref: 6CEC6A8B
                                                • PyModule_AddIntConstant.PYTHON27(00000000,VERIFY_X509_STRICT,00000020), ref: 6CEC6A95
                                                • PyModule_AddIntConstant.PYTHON27(00000000,VERIFY_X509_TRUSTED_FIRST,00008000), ref: 6CEC6AA2
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_CLOSE_NOTIFY,00000000), ref: 6CEC6AAC
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_UNEXPECTED_MESSAGE,0000000A), ref: 6CEC6AB9
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_BAD_RECORD_MAC,00000014), ref: 6CEC6AC3
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_RECORD_OVERFLOW,00000016), ref: 6CEC6ACD
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_DECOMPRESSION_FAILURE,0000001E), ref: 6CEC6AD7
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_HANDSHAKE_FAILURE,00000028), ref: 6CEC6AE1
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_BAD_CERTIFICATE,0000002A), ref: 6CEC6AEB
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_UNSUPPORTED_CERTIFICATE,0000002B), ref: 6CEC6AF8
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_CERTIFICATE_REVOKED,0000002C), ref: 6CEC6B02
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_CERTIFICATE_EXPIRED,0000002D), ref: 6CEC6B0C
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_CERTIFICATE_UNKNOWN,0000002E), ref: 6CEC6B16
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_ILLEGAL_PARAMETER,0000002F), ref: 6CEC6B20
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_UNKNOWN_CA,00000030), ref: 6CEC6B2A
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_ACCESS_DENIED,00000031), ref: 6CEC6B37
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_DECODE_ERROR,00000032), ref: 6CEC6B41
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_DECRYPT_ERROR,00000033), ref: 6CEC6B4B
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_PROTOCOL_VERSION,00000046), ref: 6CEC6B55
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_INSUFFICIENT_SECURITY,00000047), ref: 6CEC6B5F
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_INTERNAL_ERROR,00000050), ref: 6CEC6B69
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_USER_CANCELLED,0000005A), ref: 6CEC6B76
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_NO_RENEGOTIATION,00000064), ref: 6CEC6B80
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_UNSUPPORTED_EXTENSION,0000006E), ref: 6CEC6B8A
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_CERTIFICATE_UNOBTAINABLE,0000006F), ref: 6CEC6B94
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_UNRECOGNIZED_NAME,00000070), ref: 6CEC6B9E
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_BAD_CERTIFICATE_STATUS_RESPONSE,00000071), ref: 6CEC6BA8
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_BAD_CERTIFICATE_HASH_VALUE,00000072), ref: 6CEC6BB5
                                                • PyModule_AddIntConstant.PYTHON27(00000000,ALERT_DESCRIPTION_UNKNOWN_PSK_IDENTITY,00000073), ref: 6CEC6BBF
                                                • PyModule_AddIntConstant.PYTHON27(00000000,PROTOCOL_SSLv3,00000001), ref: 6CEC6BC9
                                                • PyModule_AddIntConstant.PYTHON27(00000000,PROTOCOL_SSLv23,00000002), ref: 6CEC6BD3
                                                • PyModule_AddIntConstant.PYTHON27(00000000,PROTOCOL_TLS,00000002), ref: 6CEC6BDD
                                                • PyModule_AddIntConstant.PYTHON27(00000000,PROTOCOL_TLSv1,00000003), ref: 6CEC6BE7
                                                • PyModule_AddIntConstant.PYTHON27(00000000,PROTOCOL_TLSv1_1,00000004), ref: 6CEC6BF4
                                                • PyModule_AddIntConstant.PYTHON27(00000000,PROTOCOL_TLSv1_2,00000005), ref: 6CEC6BFE
                                                • PyModule_AddIntConstant.PYTHON27(00000000,OP_ALL,800003FF), ref: 6CEC6C0B
                                                • PyModule_AddIntConstant.PYTHON27(00000000,OP_NO_SSLv2,01000000), ref: 6CEC6C18
                                                • PyModule_AddIntConstant.PYTHON27(00000000,OP_NO_SSLv3,02000000), ref: 6CEC6C25
                                                • PyModule_AddIntConstant.PYTHON27(00000000,OP_NO_TLSv1,04000000), ref: 6CEC6C32
                                                • PyModule_AddIntConstant.PYTHON27(00000000,OP_NO_TLSv1_1,10000000), ref: 6CEC6C42
                                                • PyModule_AddIntConstant.PYTHON27(00000000,OP_NO_TLSv1_2,08000000), ref: 6CEC6C4F
                                                • PyModule_AddIntConstant.PYTHON27(00000000,OP_NO_TLSv1_3,00000000), ref: 6CEC6C59
                                                • PyModule_AddIntConstant.PYTHON27(00000000,OP_CIPHER_SERVER_PREFERENCE,00400000), ref: 6CEC6C66
                                                • PyModule_AddIntConstant.PYTHON27(00000000,OP_SINGLE_DH_USE,00100000), ref: 6CEC6C73
                                                • PyModule_AddIntConstant.PYTHON27(00000000,OP_SINGLE_ECDH_USE,00080000), ref: 6CEC6C80
                                                • PyModule_AddIntConstant.PYTHON27(00000000,OP_NO_COMPRESSION,00020000), ref: 6CEC6C90
                                                • PyModule_AddObject.PYTHON27(00000000,HAS_SNI,6D3864BD), ref: 6CEC6CA6
                                                • PyModule_AddObject.PYTHON27(00000000,HAS_TLS_UNIQUE,6D3864BD), ref: 6CEC6CB6
                                                • PyModule_AddObject.PYTHON27(00000000,HAS_ECDH,6D3864BD), ref: 6CEC6CC6
                                                • PyModule_AddObject.PYTHON27(00000000,HAS_NPN,6D3864BD), ref: 6CEC6CD6
                                                • PyModule_AddObject.PYTHON27(00000000,HAS_ALPN,6D3864BD), ref: 6CEC6CE6
                                                • PyModule_AddObject.PYTHON27(00000000,HAS_TLSv1_3,6D3863ED), ref: 6CEC6CF9
                                                • PyDict_New.PYTHON27 ref: 6CEC6D04
                                                • PyDict_New.PYTHON27 ref: 6CEC6D0B
                                                • PyUnicodeUCS2_FromString.PYTHON27(00000000), ref: 6CEC6D46
                                                • _Py_BuildValue_SizeT.PYTHON27(6CFC4B68,00000009,00000064), ref: 6CEC6D5E
                                                • PyDict_SetItem.PYTHON27(028C78A0,00000000,00000000), ref: 6CEC6D82
                                                • PyDict_SetItem.PYTHON27(028C7C90,00000000,?), ref: 6CEC6D9F
                                                • PyModule_AddObject.PYTHON27(00000000,err_codes_to_names,028C78A0), ref: 6CEC6DFA
                                                • PyModule_AddObject.PYTHON27(00000000,err_names_to_codes,028C7C90), ref: 6CEC6E13
                                                • PyDict_New.PYTHON27 ref: 6CEC6E20
                                                • PyLong_FromLong.PYTHON27(00000009), ref: 6CEC6E4A
                                                • PyUnicodeUCS2_FromString.PYTHON27 ref: 6CEC6E58
                                                • PyDict_SetItem.PYTHON27(028C7D20,00000000,00000000), ref: 6CEC6E7D
                                                • PyModule_AddObject.PYTHON27(00000000,lib_codes_to_names,00000000), ref: 6CEC6ECD
                                                • PyLong_FromUnsignedLong.PYTHON27(1000214F), ref: 6CEC6EDF
                                                • PyModule_AddObject.PYTHON27(00000000,OPENSSL_VERSION_NUMBER,00000000), ref: 6CEC6EF7
                                                • _Py_BuildValue_SizeT.PYTHON27(IIIII,?,?,?,?,6D00C8C8,?,?,?,?), ref: 6CEC6F40
                                                • PyModule_AddObject.PYTHON27(00000000,OPENSSL_VERSION_INFO,00000000), ref: 6CEC6F50
                                                • PyString_FromString.PYTHON27(OpenSSL 1.0.2t 10 Sep 2019), ref: 6CEC6F5E
                                                • PyModule_AddObject.PYTHON27(00000000,OPENSSL_VERSION,00000000), ref: 6CEC6F72
                                                • _Py_BuildValue_SizeT.PYTHON27(IIIII,?,?,?,?,6D00C8C8,?,?,?,?), ref: 6CEC6FB1
                                                • PyModule_AddObject.PYTHON27(00000000,_OPENSSL_API_VERSION,00000000), ref: 6CEC6FC1
                                                Strings
                                                • HAS_ALPN, xrefs: 6CEC6CE0
                                                • HAS_NPN, xrefs: 6CEC6CD0
                                                • _SSLSocket, xrefs: 6CEC69D8
                                                • SSLSyscallError, xrefs: 6CEC698E
                                                • OP_NO_TLSv1_3, xrefs: 6CEC6C53
                                                • ALERT_DESCRIPTION_UNSUPPORTED_EXTENSION, xrefs: 6CEC6B84
                                                • PROTOCOL_SSLv3, xrefs: 6CEC6BC3
                                                • SSL_ERROR_ZERO_RETURN, xrefs: 6CEC69F3
                                                • Non-blocking SSL socket needs to read more databefore the requested operation can be completed., xrefs: 6CEC685B
                                                • OPENSSL_VERSION_INFO, xrefs: 6CEC6F4A
                                                • ALERT_DESCRIPTION_HANDSHAKE_FAILURE, xrefs: 6CEC6ADB
                                                • OPENSSL_VERSION, xrefs: 6CEC6F6C
                                                • PROTOCOL_SSLv23, xrefs: 6CEC6BCD
                                                • OP_SINGLE_ECDH_USE, xrefs: 6CEC6C7A
                                                • lib_codes_to_names, xrefs: 6CEC6EC7
                                                • SSLWantWriteError, xrefs: 6CEC6975
                                                • ALERT_DESCRIPTION_INTERNAL_ERROR, xrefs: 6CEC6B63
                                                • OP_NO_SSLv2, xrefs: 6CEC6C12
                                                • An error occurred in the SSL implementation., xrefs: 6CEC681E
                                                • Non-blocking SSL socket needs to write more databefore the requested operation can be completed., xrefs: 6CEC6875
                                                • ssl.SSLWantReadError, xrefs: 6CEC6860
                                                • ALERT_DESCRIPTION_UNRECOGNIZED_NAME, xrefs: 6CEC6B98
                                                • ALERT_DESCRIPTION_BAD_CERTIFICATE, xrefs: 6CEC6AE5
                                                • ALERT_DESCRIPTION_UNEXPECTED_MESSAGE, xrefs: 6CEC6AB3
                                                • CERT_OPTIONAL, xrefs: 6CEC6A5A
                                                • ALERT_DESCRIPTION_UNKNOWN_CA, xrefs: 6CEC6B24
                                                • ALERT_DESCRIPTION_CERTIFICATE_UNKNOWN, xrefs: 6CEC6B10
                                                • OP_CIPHER_SERVER_PREFERENCE, xrefs: 6CEC6C60
                                                • ALERT_DESCRIPTION_DECODE_ERROR, xrefs: 6CEC6B3B
                                                • OP_SINGLE_DH_USE, xrefs: 6CEC6C6D
                                                • VERIFY_X509_TRUSTED_FIRST, xrefs: 6CEC6A9C
                                                • ALERT_DESCRIPTION_CERTIFICATE_REVOKED, xrefs: 6CEC6AFC
                                                • ssl.SSLEOFError, xrefs: 6CEC68B0
                                                • ssl.SSLError, xrefs: 6CEC6823
                                                • ALERT_DESCRIPTION_CERTIFICATE_UNOBTAINABLE, xrefs: 6CEC6B8E
                                                • VERIFY_CRL_CHECK_CHAIN, xrefs: 6CEC6A85
                                                • HAS_SNI, xrefs: 6CEC6CA0
                                                • ALERT_DESCRIPTION_BAD_CERTIFICATE_HASH_VALUE, xrefs: 6CEC6BAF
                                                • HAS_TLSv1_3, xrefs: 6CEC6CF3
                                                • PROTOCOL_TLS, xrefs: 6CEC6BD7
                                                • SSL_ERROR_WANT_WRITE, xrefs: 6CEC6A07
                                                • SSL_ERROR_INVALID_ERROR_CODE, xrefs: 6CEC6A46
                                                • SSL_ERROR_EOF, xrefs: 6CEC6A3C
                                                • err_names_to_codes, xrefs: 6CEC6E0D
                                                • ALERT_DESCRIPTION_RECORD_OVERFLOW, xrefs: 6CEC6AC7
                                                • Implementation module for SSL socket operations. See the socket modulefor documentation., xrefs: 6CEC67A8
                                                • SSL/TLS connection terminated abruptly., xrefs: 6CEC68AB
                                                • OP_NO_COMPRESSION, xrefs: 6CEC6C8A
                                                • ALERT_DESCRIPTION_USER_CANCELLED, xrefs: 6CEC6B70
                                                • VERIFY_X509_STRICT, xrefs: 6CEC6A8F
                                                • PROTOCOL_TLSv1_2, xrefs: 6CEC6BF8
                                                • ALERT_DESCRIPTION_CERTIFICATE_EXPIRED, xrefs: 6CEC6B06
                                                • PROTOCOL_TLSv1_1, xrefs: 6CEC6BEE
                                                • ssl.SSLSyscallError, xrefs: 6CEC6898
                                                • OP_NO_SSLv3, xrefs: 6CEC6C1F
                                                • ALERT_DESCRIPTION_ACCESS_DENIED, xrefs: 6CEC6B31
                                                • ALERT_DESCRIPTION_CLOSE_NOTIFY, xrefs: 6CEC6AA6
                                                • PROTOCOL_TLSv1, xrefs: 6CEC6BE1
                                                • _SSLContext, xrefs: 6CEC69C0
                                                • OPENSSL_VERSION_NUMBER, xrefs: 6CEC6EF1
                                                • ALERT_DESCRIPTION_NO_RENEGOTIATION, xrefs: 6CEC6B7A
                                                • VERIFY_DEFAULT, xrefs: 6CEC6A71
                                                • System error when attempting SSL operation., xrefs: 6CEC6893
                                                • HAS_TLS_UNIQUE, xrefs: 6CEC6CB0
                                                • SSL_ERROR_WANT_X509_LOOKUP, xrefs: 6CEC6A11
                                                • OP_NO_TLSv1, xrefs: 6CEC6C2C
                                                • ALERT_DESCRIPTION_BAD_CERTIFICATE_STATUS_RESPONSE, xrefs: 6CEC6BA2
                                                • SSLWantReadError, xrefs: 6CEC695B
                                                • SSL_ERROR_WANT_CONNECT, xrefs: 6CEC6A32
                                                • SSLError, xrefs: 6CEC6928
                                                • err_codes_to_names, xrefs: 6CEC6DF4
                                                • HAS_ECDH, xrefs: 6CEC6CC0
                                                • SSL_ERROR_WANT_READ, xrefs: 6CEC69FD
                                                • ALERT_DESCRIPTION_INSUFFICIENT_SECURITY, xrefs: 6CEC6B59
                                                • OP_NO_TLSv1_1, xrefs: 6CEC6C3C
                                                • SSL_ERROR_SYSCALL, xrefs: 6CEC6A1B
                                                • CERT_NONE, xrefs: 6CEC6A50
                                                • ALERT_DESCRIPTION_ILLEGAL_PARAMETER, xrefs: 6CEC6B1A
                                                • OpenSSL 1.0.2t 10 Sep 2019, xrefs: 6CEC6F59
                                                • SSL/TLS session closed cleanly., xrefs: 6CEC683E
                                                • ALERT_DESCRIPTION_UNKNOWN_PSK_IDENTITY, xrefs: 6CEC6BB9
                                                • SSLZeroReturnError, xrefs: 6CEC6941
                                                • CERT_REQUIRED, xrefs: 6CEC6A64
                                                • ALERT_DESCRIPTION_BAD_RECORD_MAC, xrefs: 6CEC6ABD
                                                • SSLEOFError, xrefs: 6CEC69A8
                                                • _ssl, xrefs: 6CEC67B2
                                                • OP_NO_TLSv1_2, xrefs: 6CEC6C49
                                                • IIIII, xrefs: 6CEC6F3B, 6CEC6FAC
                                                • ALERT_DESCRIPTION_UNSUPPORTED_CERTIFICATE, xrefs: 6CEC6AF2
                                                • VERIFY_CRL_CHECK_LEAF, xrefs: 6CEC6A7B
                                                • ssl.SSLZeroReturnError, xrefs: 6CEC6848
                                                • ALERT_DESCRIPTION_DECRYPT_ERROR, xrefs: 6CEC6B45
                                                • OP_ALL, xrefs: 6CEC6C05
                                                • SSL_ERROR_SSL, xrefs: 6CEC6A25
                                                • ALERT_DESCRIPTION_PROTOCOL_VERSION, xrefs: 6CEC6B4F
                                                • ssl.SSLWantWriteError, xrefs: 6CEC687A
                                                • ALERT_DESCRIPTION_DECOMPRESSION_FAILURE, xrefs: 6CEC6AD1
                                                • _OPENSSL_API_VERSION, xrefs: 6CEC6FBB
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Module_$Constant$Dict_$Object$ItemString$Err_$ExceptionWith$From$BuildSizeValue_$LongLong_ReadyType_Unicodestrtoul$Capsule_DictImportInitMallocMem_MemoryModule4String_Unsignedgetenvsscanfstrchr
                                                • String ID: ALERT_DESCRIPTION_ACCESS_DENIED$ALERT_DESCRIPTION_BAD_CERTIFICATE$ALERT_DESCRIPTION_BAD_CERTIFICATE_HASH_VALUE$ALERT_DESCRIPTION_BAD_CERTIFICATE_STATUS_RESPONSE$ALERT_DESCRIPTION_BAD_RECORD_MAC$ALERT_DESCRIPTION_CERTIFICATE_EXPIRED$ALERT_DESCRIPTION_CERTIFICATE_REVOKED$ALERT_DESCRIPTION_CERTIFICATE_UNKNOWN$ALERT_DESCRIPTION_CERTIFICATE_UNOBTAINABLE$ALERT_DESCRIPTION_CLOSE_NOTIFY$ALERT_DESCRIPTION_DECODE_ERROR$ALERT_DESCRIPTION_DECOMPRESSION_FAILURE$ALERT_DESCRIPTION_DECRYPT_ERROR$ALERT_DESCRIPTION_HANDSHAKE_FAILURE$ALERT_DESCRIPTION_ILLEGAL_PARAMETER$ALERT_DESCRIPTION_INSUFFICIENT_SECURITY$ALERT_DESCRIPTION_INTERNAL_ERROR$ALERT_DESCRIPTION_NO_RENEGOTIATION$ALERT_DESCRIPTION_PROTOCOL_VERSION$ALERT_DESCRIPTION_RECORD_OVERFLOW$ALERT_DESCRIPTION_UNEXPECTED_MESSAGE$ALERT_DESCRIPTION_UNKNOWN_CA$ALERT_DESCRIPTION_UNKNOWN_PSK_IDENTITY$ALERT_DESCRIPTION_UNRECOGNIZED_NAME$ALERT_DESCRIPTION_UNSUPPORTED_CERTIFICATE$ALERT_DESCRIPTION_UNSUPPORTED_EXTENSION$ALERT_DESCRIPTION_USER_CANCELLED$An error occurred in the SSL implementation.$CERT_NONE$CERT_OPTIONAL$CERT_REQUIRED$HAS_ALPN$HAS_ECDH$HAS_NPN$HAS_SNI$HAS_TLS_UNIQUE$HAS_TLSv1_3$IIIII$Implementation module for SSL socket operations. See the socket modulefor documentation.$Non-blocking SSL socket needs to read more databefore the requested operation can be completed.$Non-blocking SSL socket needs to write more databefore the requested operation can be completed.$OPENSSL_VERSION$OPENSSL_VERSION_INFO$OPENSSL_VERSION_NUMBER$OP_ALL$OP_CIPHER_SERVER_PREFERENCE$OP_NO_COMPRESSION$OP_NO_SSLv2$OP_NO_SSLv3$OP_NO_TLSv1$OP_NO_TLSv1_1$OP_NO_TLSv1_2$OP_NO_TLSv1_3$OP_SINGLE_DH_USE$OP_SINGLE_ECDH_USE$OpenSSL 1.0.2t 10 Sep 2019$PROTOCOL_SSLv23$PROTOCOL_SSLv3$PROTOCOL_TLS$PROTOCOL_TLSv1$PROTOCOL_TLSv1_1$PROTOCOL_TLSv1_2$SSL/TLS connection terminated abruptly.$SSL/TLS session closed cleanly.$SSLEOFError$SSLError$SSLSyscallError$SSLWantReadError$SSLWantWriteError$SSLZeroReturnError$SSL_ERROR_EOF$SSL_ERROR_INVALID_ERROR_CODE$SSL_ERROR_SSL$SSL_ERROR_SYSCALL$SSL_ERROR_WANT_CONNECT$SSL_ERROR_WANT_READ$SSL_ERROR_WANT_WRITE$SSL_ERROR_WANT_X509_LOOKUP$SSL_ERROR_ZERO_RETURN$System error when attempting SSL operation.$VERIFY_CRL_CHECK_CHAIN$VERIFY_CRL_CHECK_LEAF$VERIFY_DEFAULT$VERIFY_X509_STRICT$VERIFY_X509_TRUSTED_FIRST$_OPENSSL_API_VERSION$_SSLContext$_SSLSocket$_ssl$err_codes_to_names$err_names_to_codes$lib_codes_to_names$ssl.SSLEOFError$ssl.SSLError$ssl.SSLSyscallError$ssl.SSLWantReadError$ssl.SSLWantWriteError$ssl.SSLZeroReturnError
                                                • API String ID: 353964823-2835524041
                                                • Opcode ID: a3932a82f3d4261d6bbc1bd444d45304d4ec091cc8324c16473cf76a671b9183
                                                • Instruction ID: a769f0f731b8ca00223817ba975f3d4b0c4ad772962a9e61206aa670db2ff401
                                                • Opcode Fuzzy Hash: a3932a82f3d4261d6bbc1bd444d45304d4ec091cc8324c16473cf76a671b9183
                                                • Instruction Fuzzy Hash: 40221770B052067BE710FB658E46FAF367CDF85308F110514FA10FAA81DB669E05DAAB

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 262 6cec31c0-6cec31f1 _PyArg_ParseTuple_SizeT 263 6cec320d-6cec3215 262->263 264 6cec31f3-6cec31f6 262->264 267 6cec3238-6cec324a 263->267 268 6cec3217-6cec3233 PyErr_Format 263->268 265 6cec31f8-6cec3201 264->265 266 6cec3204-6cec320c 264->266 265->266 270 6cec324c 267->270 271 6cec3254-6cec328c call 6cec8ce0 * 2 call 6cec30f0 267->271 269 6cec33e7-6cec33ea 268->269 273 6cec33ec-6cec33f5 269->273 274 6cec33f8-6cec340e PyBuffer_Release 269->274 270->271 282 6cec328e-6cec32a3 PyErr_SetString 271->282 283 6cec32a8-6cec32ab 271->283 273->274 282->269 284 6cec32ad-6cec32c1 PyErr_SetString 283->284 285 6cec32c6-6cec32c9 283->285 284->269 286 6cec32cb-6cec32e0 PyErr_SetString 285->286 287 6cec32e5-6cec32ed 285->287 286->269 288 6cec32ef-6cec32f5 PyEval_SaveThread 287->288 289 6cec32f7-6cec3307 call 6cf6ae20 287->289 288->289 291 6cec330c-6cec3325 call 6cf6cd80 289->291 294 6cec3327-6cec332e PyEval_RestoreThread 291->294 295 6cec3331-6cec3339 PyErr_CheckSignals 291->295 294->295 296 6cec333f-6cec3342 295->296 297 6cec33e3 295->297 298 6cec3344-6cec3350 call 6cec30f0 296->298 299 6cec3352-6cec3355 296->299 297->269 307 6cec3366-6cec336c 298->307 301 6cec3377-6cec337a 299->301 302 6cec3357-6cec3362 call 6cec30f0 299->302 301->287 305 6cec3380-6cec3383 301->305 302->307 305->287 306 6cec3389 305->306 309 6cec338d-6cec3390 306->309 310 6cec336e-6cec3371 307->310 311 6cec33c1-6cec33cc 307->311 312 6cec339e-6cec33ae PyBuffer_Release 309->312 313 6cec3392-6cec339b 309->313 315 6cec33ce-6cec33d9 310->315 316 6cec3373-6cec3375 310->316 314 6cec33da-6cec33e0 PyErr_SetString 311->314 317 6cec340f-6cec3428 call 6cec12b0 312->317 318 6cec33b0-6cec33c0 PyInt_FromLong 312->318 313->312 314->297 315->314 316->301 316->309
                                                APIs
                                                • _PyArg_ParseTuple_SizeT.PYTHON27(?,s*:write,?), ref: 6CEC31E6
                                                • PyErr_Format.PYTHON27(?,string longer than %d bytes,7FFFFFFF), ref: 6CEC322A
                                                • PyErr_SetString.PYTHON27(028CB208,The write operation timed out), ref: 6CEC329A
                                                • PyErr_SetString.PYTHON27(028CB208,Underlying socket has been closed.), ref: 6CEC32B8
                                                • PyErr_SetString.PYTHON27(028CB208,Underlying socket too large for select().), ref: 6CEC32D7
                                                • PyBuffer_Release.PYTHON27(?), ref: 6CEC33FD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Err_$String$Arg_Buffer_FormatParseReleaseSizeTuple_
                                                • String ID: The write operation timed out$Underlying socket has been closed.$Underlying socket too large for select().$s*:write$string longer than %d bytes
                                                • API String ID: 3277940145-1779320975
                                                • Opcode ID: c5cc1c2cacce251ba2f60ce4b822fc54b845de186733be110b668acabf4e7c10
                                                • Instruction ID: 2c93fb635cb474a70279a268e48c064c3424f7ebd9e0aa70f300b287ddfe5783
                                                • Opcode Fuzzy Hash: c5cc1c2cacce251ba2f60ce4b822fc54b845de186733be110b668acabf4e7c10
                                                • Instruction Fuzzy Hash: CF610675B042019BCB00CF68DD85A9B73B4FB86329F244729E93987741DB32E955CB93

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 322 6cec34a0-6cec34ed _PyArg_ParseTuple_SizeT 323 6cec36b9-6cec36bc 322->323 324 6cec34f3-6cec34f9 322->324 327 6cec36be-6cec36c7 323->327 328 6cec36ca-6cec36cf 323->328 325 6cec34ff-6cec3503 324->325 326 6cec35e4-6cec35f6 324->326 325->326 329 6cec3509-6cec350f 325->329 332 6cec35f8-6cec35fa 326->332 333 6cec3600-6cec3606 326->333 327->328 330 6cec36d5-6cec36db 328->330 331 6cec3776-6cec3781 PyBuffer_Release 328->331 334 6cec352c-6cec353e PyString_FromStringAndSize 329->334 335 6cec3511-6cec3527 PyErr_SetString 329->335 337 6cec3784-6cec378c 330->337 338 6cec36e1-6cec36ea 330->338 331->337 332->333 339 6cec356e-6cec3578 332->339 333->339 340 6cec360c-6cec360e 333->340 334->323 341 6cec3544-6cec3549 334->341 335->323 338->337 342 6cec36f0-6cec3704 338->342 343 6cec357c-6cec359d call 6cec8ce0 * 2 339->343 344 6cec357a 339->344 345 6cec372d-6cec3730 340->345 348 6cec354b-6cec354e 341->348 349 6cec3567-6cec356a 341->349 361 6cec35a0-6cec35ac 343->361 344->343 346 6cec373e-6cec3743 345->346 347 6cec3732-6cec373b 345->347 354 6cec378d-6cec37ab PyBuffer_Release PyLong_FromLong 346->354 355 6cec3745-6cec375e _PyString_Resize 346->355 347->346 352 6cec355c-6cec3566 348->352 353 6cec3550-6cec3559 348->353 349->339 353->352 362 6cec35ae-6cec35b4 PyEval_SaveThread 361->362 363 6cec35b8-6cec35c1 361->363 362->363 364 6cec3613-6cec3617 363->364 365 6cec35c3-6cec35e2 call 6ced0e00 363->365 367 6cec3619-6cec3620 364->367 368 6cec3622-6cec3633 call 6cf74a40 364->368 370 6cec363a-6cec364e call 6cf6cd80 365->370 367->370 371 6cec3635-6cec3638 368->371 374 6cec365e-6cec3666 PyErr_CheckSignals 370->374 375 6cec3650-6cec365b PyEval_RestoreThread 370->375 371->370 376 6cec3668-6cec366b 374->376 377 6cec36b5 374->377 375->374 378 6cec3705-6cec3708 376->378 379 6cec3671 376->379 377->323 381 6cec370a-6cec370c 378->381 382 6cec3711-6cec3714 378->382 380 6cec3672-6cec3681 call 6cec30f0 379->380 392 6cec375f-6cec3771 PyErr_SetString 380->392 393 6cec3687-6cec3689 380->393 381->380 383 6cec371a-6cec3721 382->383 384 6cec368b-6cec368e 382->384 386 6cec369d-6cec369f 383->386 387 6cec3727 383->387 384->361 389 6cec3694-6cec3697 384->389 390 6cec3729 386->390 391 6cec36a5-6cec36ad call 6cec12b0 386->391 387->390 389->361 389->386 390->345 395 6cec36b2 391->395 392->395 393->384 393->386 395->377
                                                APIs
                                                • _PyArg_ParseTuple_SizeT.PYTHON27(?,i|w*:read,?,?), ref: 6CEC34E2
                                                • PyErr_SetString.PYTHON27(?,size should not be negative), ref: 6CEC351E
                                                • PyString_FromStringAndSize.PYTHON27(00000000,?), ref: 6CEC352F
                                                • PyEval_RestoreThread.PYTHON27(?), ref: 6CEC3655
                                                • PyErr_CheckSignals.PYTHON27 ref: 6CEC365E
                                                • _PyString_Resize.PYTHON27(?,00000000), ref: 6CEC374B
                                                • PyErr_SetString.PYTHON27(028CB208,The read operation timed out), ref: 6CEC376B
                                                • PyBuffer_Release.PYTHON27(?), ref: 6CEC377B
                                                • PyBuffer_Release.PYTHON27(?), ref: 6CEC3792
                                                • PyLong_FromLong.PYTHON27(00000000), ref: 6CEC379C
                                                Strings
                                                • size should not be negative, xrefs: 6CEC3518
                                                • i|w*:read, xrefs: 6CEC34D8
                                                • The read operation timed out, xrefs: 6CEC3765
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\ssl_lib.c, xrefs: 6CEC35CD
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Err_String$Buffer_FromReleaseSizeString_$Arg_CheckEval_LongLong_ParseResizeRestoreSignalsThreadTuple_
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\ssl_lib.c$The read operation timed out$i|w*:read$size should not be negative
                                                • API String ID: 4119156880-2442610700
                                                • Opcode ID: f1bda5f5284cff6d786a6519481a0c0936f5e2f68755d6e151bc4cfc51884794
                                                • Instruction ID: 3e3c909c3a4259ff44dceabbb3aa4c4a0b8369f3cc6a96761c5e9b963f6c8963
                                                • Opcode Fuzzy Hash: f1bda5f5284cff6d786a6519481a0c0936f5e2f68755d6e151bc4cfc51884794
                                                • Instruction Fuzzy Hash: 7591AD71B083018BD700CF69D984A9BB3F4FB85328F24066DE96997781E731D955CB93

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 439 6cec15d0-6cec15f2 440 6cec15fb 439->440 441 6cec15f4-6cec15f9 439->441 442 6cec15fd-6cec161e call 6cec8ce0 * 2 440->442 441->442 447 6cec1621-6cec1630 442->447 448 6cec163c-6cec164b 447->448 449 6cec1632-6cec1638 PyEval_SaveThread 447->449 450 6cec164d-6cec166c call 6ced0e00 448->450 451 6cec166e-6cec1681 448->451 449->448 457 6cec1690-6cec16a6 call 6cf6cd80 450->457 455 6cec168e 451->455 456 6cec1683-6cec1686 451->456 455->457 504 6cec1687 call 6cf7dd20 456->504 505 6cec1687 call 6cf7c750 456->505 461 6cec16a8-6cec16b3 PyEval_RestoreThread 457->461 462 6cec16b6-6cec16be PyErr_CheckSignals 457->462 459 6cec1689-6cec168c 459->455 461->462 463 6cec178b 462->463 464 6cec16c4-6cec16c7 462->464 465 6cec178f-6cec1792 463->465 466 6cec16c9-6cec16d5 call 6cec30f0 464->466 467 6cec16d7-6cec16da 464->467 468 6cec1794-6cec179d 465->468 469 6cec17a0-6cec17a8 465->469 479 6cec16eb-6cec16f1 466->479 471 6cec16dc-6cec16e7 call 6cec30f0 467->471 472 6cec1701-6cec1704 467->472 468->469 471->479 472->447 473 6cec170a-6cec170d 472->473 473->447 478 6cec1713 473->478 482 6cec1717-6cec171a 478->482 480 6cec1747-6cec175b PyErr_SetString 479->480 481 6cec16f3-6cec16f6 479->481 480->465 483 6cec175d-6cec1772 PyErr_SetString 481->483 484 6cec16f8-6cec16fb 481->484 485 6cec171c-6cec1725 482->485 486 6cec1728-6cec172b 482->486 483->465 487 6cec16fd-6cec16ff 484->487 488 6cec1774-6cec1789 PyErr_SetString 484->488 485->486 489 6cec172d-6cec1746 call 6cec12b0 486->489 490 6cec17a9-6cec17b1 486->490 487->472 487->482 488->465 491 6cec17bc-6cec17c4 490->491 492 6cec17b3-6cec17b9 call 6ced56b0 490->492 496 6cec17ce-6cec17e0 call 6cf6aa50 491->496 497 6cec17c6-6cec17cc PyEval_SaveThread 491->497 492->491 502 6cec17ec-6cec1802 496->502 503 6cec17e2-6cec17e9 PyEval_RestoreThread 496->503 497->496 503->502 504->459 505->459
                                                APIs
                                                • PyEval_SaveThread.PYTHON27 ref: 6CEC1632
                                                • PyEval_RestoreThread.PYTHON27(00007000), ref: 6CEC16AD
                                                • PyErr_CheckSignals.PYTHON27 ref: 6CEC16B6
                                                • PyErr_SetString.PYTHON27(028CB208,_ssl.c:711: The handshake operation timed out), ref: 6CEC1752
                                                • PyErr_SetString.PYTHON27(028CB208,_ssl.c:715: Underlying socket has been closed.), ref: 6CEC1769
                                                • PyEval_SaveThread.PYTHON27 ref: 6CEC17C6
                                                • PyEval_RestoreThread.PYTHON27(00000000), ref: 6CEC17E3
                                                Strings
                                                • _ssl.c:711: The handshake operation timed out, xrefs: 6CEC174C
                                                • _ssl.c:715: Underlying socket has been closed., xrefs: 6CEC1763
                                                • _ssl.c:719: Underlying socket too large for select()., xrefs: 6CEC177A
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\ssl_lib.c, xrefs: 6CEC1657
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Eval_Thread$Err_$RestoreSaveString$CheckSignals
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\ssl_lib.c$_ssl.c:711: The handshake operation timed out$_ssl.c:715: Underlying socket has been closed.$_ssl.c:719: Underlying socket too large for select().
                                                • API String ID: 1947425757-4144061731
                                                • Opcode ID: 25dba743e73f1dd03a9bf78057245705769100301a3f313a21e02894ae0c40d2
                                                • Instruction ID: 5c53b4b25cfda6c690c3582e0dc958fd911306b27c3357615cfe28c7b9a66915
                                                • Opcode Fuzzy Hash: 25dba743e73f1dd03a9bf78057245705769100301a3f313a21e02894ae0c40d2
                                                • Instruction Fuzzy Hash: D251F675B003008BDB00DFA8D945B8A73B5FB87328F280659E96987B41D732E965CBD3

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 506 6cec3a60-6cec3a9d _PyArg_ParseTupleAndKeywords_SizeT 507 6cec3a9f-6cec3aa4 506->507 508 6cec3aa5-6cec3aae 506->508 509 6cec3ab8-6cec3abe 508->509 510 6cec3ab0-6cec3ab6 PyEval_SaveThread 508->510 511 6cec3ac0-6cec3acf call 6cf6bdf0 509->511 512 6cec3ad1-6cec3ad4 509->512 510->509 520 6cec3b30-6cec3b36 511->520 513 6cec3ad6-6cec3ae5 call 6cf6bdf0 512->513 514 6cec3ae7-6cec3aea 512->514 513->520 518 6cec3aec-6cec3afb call 6cf6bdf0 514->518 519 6cec3afd-6cec3b00 514->519 518->520 523 6cec3b02-6cec3b11 call 6cf6bdf0 519->523 524 6cec3b13-6cec3b16 519->524 525 6cec3b38-6cec3b3f PyEval_RestoreThread 520->525 526 6cec3b42-6cec3b46 520->526 523->520 529 6cec3b18-6cec3b1d call 6cf6bdf0 524->529 530 6cec3b29 524->530 525->526 531 6cec3b68-6cec3b6a 526->531 532 6cec3b48-6cec3b67 PyErr_SetString 526->532 535 6cec3b22-6cec3b27 529->535 530->520 536 6cec3b6c-6cec3b94 call 6ced15e0 call 6cec10e0 call 6ced0f20 531->536 537 6cec3b95-6cec3ba9 531->537 535->520 541 6cec3bbd-6cec3be2 537->541 542 6cec3bab-6cec3bbc call 6cf6c240 537->542 545 6cec3be9-6cec3bec 541->545 546 6cec3be4 541->546 549 6cec3bee 545->549 550 6cec3bf4-6cec3bff 545->550 546->545 549->550 552 6cec3c0a-6cec3c13 550->552 553 6cec3c01-6cec3c07 550->553 555 6cec3c1a-6cec3c21 call 6cf6b440 552->555 556 6cec3c15 552->556 553->552 559 6cec3c57-6cec3c5c 555->559 560 6cec3c23-6cec3c26 555->560 556->555 563 6cec3c6e-6cec3c8e call 6cf6a060 559->563 564 6cec3c5e-6cec3c6b 559->564 561 6cec3c28-6cec3c31 560->561 562 6cec3c34-6cec3c56 call 6ced0f20 PyErr_SetString 560->562 561->562 564->563
                                                APIs
                                                • _PyArg_ParseTupleAndKeywords_SizeT.PYTHON27(?,?,i:_SSLContext,?,?), ref: 6CEC3A92
                                                • PyEval_SaveThread.PYTHON27 ref: 6CEC3AB0
                                                • PyEval_RestoreThread.PYTHON27(00000000), ref: 6CEC3B39
                                                • PyErr_SetString.PYTHON27(?,invalid protocol version), ref: 6CEC3B56
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Eval_Thread$Arg_Err_Keywords_ParseRestoreSaveSizeStringTuple
                                                • String ID: HIGH:!aNULL:!eNULL$HIGH:!aNULL:!eNULL:!MD5$No cipher can be selected.$i:_SSLContext$invalid protocol version
                                                • API String ID: 3720710401-3967712203
                                                • Opcode ID: c5bdb940ac2b81c90c97842337c302557c81a876f80a4986e5e5c2682e930423
                                                • Instruction ID: 3abd2b4744e28956557232dd06a628bb71321b94b8e6bfa2ecd5dfb90a5ff120
                                                • Opcode Fuzzy Hash: c5bdb940ac2b81c90c97842337c302557c81a876f80a4986e5e5c2682e930423
                                                • Instruction Fuzzy Hash: D5510772B041059BD710DF6AD981ADFB3B4EB8522CF244679E829C7B00DB32DD158793

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 766 6cf6bdf0-6cf6bdff 767 6cf6be23-6cf6be2d call 6cf7f700 766->767 768 6cf6be01-6cf6be22 call 6ced0e00 766->768 773 6cf6be2f-6cf6be55 call 6ced0e00 767->773 774 6cf6be5a-6cf6be73 call 6cedb1e0 767->774 779 6cf6c1a2-6cf6c1bb call 6ced0e00 773->779 780 6cf6c15c-6cf6c166 774->780 781 6cf6be79-6cf6bf1b memset * 2 call 6cf7f840 774->781 785 6cf6c1c6-6cf6c1ce 779->785 786 6cf6c1bd-6cf6c1c3 call 6cf6c240 779->786 780->779 781->780 791 6cf6bf21-6cf6bf47 call 6cee6d40 781->791 786->785 791->780 794 6cf6bf4d-6cf6bf59 call 6cecaa40 791->794 794->780 797 6cf6bf5f-6cf6bf67 794->797 798 6cf6bf6e-6cf6bf8f call 6cf6f7f0 797->798 799 6cf6bf69 797->799 802 6cf6bf95-6cf6bf98 798->802 803 6cf6c198-6cf6c19d 798->803 799->798 802->803 804 6cf6bf9e-6cf6bfab call 6ced6e30 802->804 803->779 804->780 807 6cf6bfb1-6cf6bfc8 call 6cf29a60 804->807 810 6cf6bfca-6cf6bfd4 807->810 811 6cf6bfd9-6cf6bff0 call 6cf29a60 807->811 810->779 814 6cf6bff2-6cf6bffc 811->814 815 6cf6c001-6cf6c018 call 6cf29a60 811->815 814->779 818 6cf6c01a-6cf6c024 815->818 819 6cf6c029-6cf6c03b call 6ced3a90 815->819 818->779 819->780 822 6cf6c041-6cf6c062 call 6cee52e0 819->822 825 6cf6c074-6cf6c094 call 6cec71d0 822->825 826 6cf6c064-6cf6c06e call 6cf6e360 822->826 829 6cf6c099-6cf6c09e 825->829 826->825 831 6cf6c0a0-6cf6c0b3 call 6cec71d0 829->831 832 6cf6c0ca 829->832 831->832 837 6cf6c0b5-6cf6c0c8 call 6cec71d0 831->837 834 6cf6c0d0-6cf6c12a call 6cf81ae0 call 6cedb1e0 832->834 834->780 843 6cf6c12c-6cf6c15a call 6cedb1e0 834->843 837->832 837->834 843->780 846 6cf6c168-6cf6c197 843->846
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ALL:!EXPORT:!LOW:!aNULL:!eNULL:!SSLv2$C:\build27\cpython\externals\openssl-1.0.2t\ssl\ssl_lib.c$SSLv2$ssl2-md5$ssl3-md5$ssl3-sha1
                                                • API String ID: 0-762417532
                                                • Opcode ID: d8c4742ebb63e429c15e117a409b36fdf46ad15b5bd11bda906d0c385aef530d
                                                • Instruction ID: dc52da06a5b95d991f9391725cecf117f707775905e11fda7849f80edf2f2a57
                                                • Opcode Fuzzy Hash: d8c4742ebb63e429c15e117a409b36fdf46ad15b5bd11bda906d0c385aef530d
                                                • Instruction Fuzzy Hash: F1A18EB1A007019BE7209F2AC841B97F7E4BF95308F10496EE59ACBB51E7B5E504CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 847 402440-402472 call 40a5e0 PyImport_AddModule 850 402474 847->850 851 402497-40249b 847->851 852 402560-40256c 850->852 853 402480-402491 call 4015d0 851->853 854 40249d-4024a1 851->854 853->851 853->852 856 4024a4 call 401610 854->856 858 4024a9-4024be strcpy 856->858 859 4024c0-4024d4 858->859 859->859 860 4024d6-4024fe 859->860 861 402550-402558 860->861 862 402500-402506 PyString_FromString 860->862 863 402508-40253d PyObject_SetAttrString Py_DecRef PyRun_SimpleString 861->863 862->863 864 402570-40259a call 401e10 863->864 865 40253f-402547 free 863->865 865->853
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: String$AttrFromImport_ModuleObject_Run_SimpleString_freestrcpy
                                                • String ID:
                                                • API String ID: 2863042373-0
                                                • Opcode ID: 38a5d0987218056ee668aea603d0878fa816bf4b0bedfba9df5d0f11675cc43b
                                                • Instruction ID: e8fd23f063c17629a143328e0033cfeb96340cb5f85429ec93d48a0f7a74ee99
                                                • Opcode Fuzzy Hash: 38a5d0987218056ee668aea603d0878fa816bf4b0bedfba9df5d0f11675cc43b
                                                • Instruction Fuzzy Hash: 11314EB5A083018FD714EF65D68855ABBE0EF88344F00893EE4C9D7391E7789989CB5A

                                                Control-flow Graph

                                                APIs
                                                • memcpy.MSVCR90(?,?,00000000), ref: 6CF7D3F0
                                                • memcpy.MSVCR90(?,?,00000000), ref: 6CF7D417
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID: @$@$C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_both.c$i <= EVP_MAX_MD_SIZE
                                                • API String ID: 3510742995-3082968397
                                                • Opcode ID: dea27ee191c17b2c0c213cca880953e279db9afff0d1d99849c7e0b6cbe8447a
                                                • Instruction ID: 95278c659104c6814cdb0ca2fbe3da0700ff99fbef4ca1d3b880a08946cb330f
                                                • Opcode Fuzzy Hash: dea27ee191c17b2c0c213cca880953e279db9afff0d1d99849c7e0b6cbe8447a
                                                • Instruction Fuzzy Hash: D631E0712017019FE310EF84D980E97B7E9EF85318B1480ADE9498BF11D375F956CBA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 886 4052f0-405355 call 405210 LoadLibraryA GetProcAddress * 2 889 4053c4-4053cb 886->889 890 405357-405359 886->890 890->889 891 40535b-405369 890->891 891->891 892 40536b-40539d CreateActCtxWWorker free 891->892 893 4053b3-4053c2 call 404e70 892->893 894 40539f-4053b1 892->894 893->889 894->893 898 4053d0-4053dc 894->898
                                                APIs
                                                  • Part of subcall function 00405210: MultiByteToWideChar.KERNEL32 ref: 00405249
                                                • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00002068,00000000,00000000,004026E0), ref: 0040531C
                                                • GetProcAddress.KERNEL32 ref: 00405338
                                                • GetProcAddress.KERNEL32 ref: 0040534A
                                                • CreateActCtxWWorker.KERNEL32 ref: 00405386
                                                • free.MSVCRT ref: 00405395
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: AddressProc$ByteCharCreateLibraryLoadMultiWideWorkerfree
                                                • String ID:
                                                • API String ID: 1453477836-3916222277
                                                • Opcode ID: aa8bcccdedd4f4024c265faddddaa8f9a41ed6605e16622b8acee048b89dca75
                                                • Instruction ID: f7fa3d31de41ebfc25f04b6bfa2f7641fe892b4ca97745c4cd34cacb2e0a35f9
                                                • Opcode Fuzzy Hash: aa8bcccdedd4f4024c265faddddaa8f9a41ed6605e16622b8acee048b89dca75
                                                • Instruction Fuzzy Hash: 422162B15147004BD710BFB9E94824FBBE0EB80358F014E3EE99497390E7B994498B8A

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 899 40254c 900 402550-402558 899->900 902 402508-40253d PyObject_SetAttrString Py_DecRef PyRun_SimpleString 900->902 903 402570-40259a call 401e10 902->903 904 40253f-402547 free 902->904 906 402480-402491 call 4015d0 904->906 910 402560-40256c 906->910 911 402497-40249b 906->911 911->906 912 40249d-4024be call 401610 strcpy 911->912 915 4024c0-4024d4 912->915 915->915 916 4024d6-4024fe 915->916 916->900 917 402500-402506 PyString_FromString 916->917 917->902
                                                APIs
                                                • strcpy.MSVCRT ref: 004024B9
                                                • PyString_FromString.PYTHON27 ref: 00402500
                                                • PyObject_SetAttrString.PYTHON27 ref: 0040251F
                                                • Py_DecRef.PYTHON27 ref: 0040252C
                                                • PyRun_SimpleString.PYTHON27 ref: 00402535
                                                • free.MSVCRT ref: 00402542
                                                  • Part of subcall function 004015D0: ntohl.WS2_32(?,?,00000000,?,0040235F), ref: 004015E2
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: String$AttrFromObject_Run_SimpleString_freentohlstrcpy
                                                • String ID:
                                                • API String ID: 1114997145-0
                                                • Opcode ID: 237dfa5a32e5763ef6e43fba204de41ae2a913351412f05c3ed5b181bf43df63
                                                • Instruction ID: 32504a1939c2323dedb865ed5e74e7e0c3da6bf7179223560a8ee1a271ee221e
                                                • Opcode Fuzzy Hash: 237dfa5a32e5763ef6e43fba204de41ae2a913351412f05c3ed5b181bf43df63
                                                • Instruction Fuzzy Hash: 352110B45087018FD714EF25C58915ABBE0EF84744F00893EE485D7395D778D989CB4A
                                                APIs
                                                  • Part of subcall function 004015D0: ntohl.WS2_32(?,?,00000000,?,0040235F), ref: 004015E2
                                                • strcpy.MSVCRT ref: 004024B9
                                                • PyString_FromString.PYTHON27 ref: 00402500
                                                • PyObject_SetAttrString.PYTHON27 ref: 0040251F
                                                • Py_DecRef.PYTHON27 ref: 0040252C
                                                • PyRun_SimpleString.PYTHON27 ref: 00402535
                                                • free.MSVCRT ref: 00402542
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: String$AttrFromObject_Run_SimpleString_freentohlstrcpy
                                                • String ID:
                                                • API String ID: 1114997145-0
                                                • Opcode ID: b0e2dd3581f0fa98c5a9871b7647d1f62c40080b42c7a6d65e4c7262ab752b8a
                                                • Instruction ID: 2d4c2cf9b4146ebcee53eb0a73992dcdba7c51992c818bc209d4c21239ce87a4
                                                • Opcode Fuzzy Hash: b0e2dd3581f0fa98c5a9871b7647d1f62c40080b42c7a6d65e4c7262ab752b8a
                                                • Instruction Fuzzy Hash: 84210EB49087018FD714EF25C58925ABBE0EF84704F04893EE889D7395D778D989CB4A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: NamePathShort$freemalloc
                                                • String ID:
                                                • API String ID: 859375759-0
                                                • Opcode ID: 2df2b412d309d7c36f49991fc7ba5eed1ce7a99e1fb9888bf44697f781b362b8
                                                • Instruction ID: 3beaf80c49d4d74242e0349f6237524424644aeea3499a333aa3f78d0f17a321
                                                • Opcode Fuzzy Hash: 2df2b412d309d7c36f49991fc7ba5eed1ce7a99e1fb9888bf44697f781b362b8
                                                • Instruction Fuzzy Hash: 56011BB15087058FC700BF76D48925FBBE4EF84358F05883EEA8897241E73998558BDB
                                                APIs
                                                  • Part of subcall function 6CEDCDA0: raise.MSVCR90 ref: 6CEDCDAF
                                                  • Part of subcall function 6CEDCDA0: _exit.MSVCR90 ref: 6CEDCDBA
                                                  • Part of subcall function 6CEDCDA0: __iob_func.MSVCR90 ref: 6CEDCDD0
                                                  • Part of subcall function 6CEF95C0: memcpy.MSVCR90(00000000,00000000,?,?,?,?,?,?,6CEF95B1,00000000,?,?,?,6CF0A494), ref: 6CEF9687
                                                • memcpy.MSVCR90(?,?,?), ref: 6CF900E1
                                                Strings
                                                • chunk >= 0, xrefs: 6CF8FE34
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_lib.c, xrefs: 6CF8FE22
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\t1_enc.c, xrefs: 6CF8FE3E
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy$__iob_func_exitraise
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_lib.c$C:\build27\cpython\externals\openssl-1.0.2t\ssl\t1_enc.c$chunk >= 0
                                                • API String ID: 13576257-1872200342
                                                • Opcode ID: d6a3f14d2d87d04bdc09bf135555d5abc6a4d90089ab83147cab5bc2a852f12c
                                                • Instruction ID: c96ab8dccf5ccde7638751845b6117817b9c6e1568c05ee06f461e09037d481b
                                                • Opcode Fuzzy Hash: d6a3f14d2d87d04bdc09bf135555d5abc6a4d90089ab83147cab5bc2a852f12c
                                                • Instruction Fuzzy Hash: 80A14F71D043199BEF00CFA5CC44BDEB7B9AF48208F144169E919E7641EB71EA19CFA1
                                                APIs
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_pkt.c, xrefs: 6CF7A312, 6CF7A3B6
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memmove
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_pkt.c
                                                • API String ID: 2162964266-36802313
                                                • Opcode ID: 614231aaa3728b40967091c94e7bcf5776f07cbfcccbb8979f1e15acd782e3f9
                                                • Instruction ID: a3fb308da5fee5111c5cd455b5f3fd3f97ec465c6e039cec1e05fab3c292d3c4
                                                • Opcode Fuzzy Hash: 614231aaa3728b40967091c94e7bcf5776f07cbfcccbb8979f1e15acd782e3f9
                                                • Instruction Fuzzy Hash: F9917271B042449FDB50CF69D480B99B7F1FF84328F25929AEC588BB45D732D986CBA0
                                                APIs
                                                • memcpy.MSVCR90(?,?,?), ref: 6CF7D627
                                                • memcpy.MSVCR90(?,?,?), ref: 6CF7D5E0
                                                  • Part of subcall function 6CEDCDA0: raise.MSVCR90 ref: 6CEDCDAF
                                                  • Part of subcall function 6CEDCDA0: _exit.MSVCR90 ref: 6CEDCDBA
                                                  • Part of subcall function 6CEDCDA0: __iob_func.MSVCR90 ref: 6CEDCDD0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy$__iob_func_exitraise
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_both.c$i <= EVP_MAX_MD_SIZE
                                                • API String ID: 13576257-3443307041
                                                • Opcode ID: 81d8d818bec62486554e5bccb2874c4666ca0315e44686507b25e0c34ca4d77c
                                                • Instruction ID: 615a70d75ed9ac95fb6697226038c8d8314e34bdd3ca9901af333fec89763e24
                                                • Opcode Fuzzy Hash: 81d8d818bec62486554e5bccb2874c4666ca0315e44686507b25e0c34ca4d77c
                                                • Instruction Fuzzy Hash: F73126727003045BE320D754EC81BDA73A9EB8531CF584179E6098BF90D775ED4AC7A1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: ErrorLast_time64
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_clnt.c
                                                • API String ID: 16934928-1398658996
                                                • Opcode ID: 7d3487a5eed5fdc0d91b47080184780cb0026e5987ce90fead8b464201b990d8
                                                • Instruction ID: db4f633bbb629064d8d7f5173460d1c7c319dc0a2e55de80bcb9801dc1d078a3
                                                • Opcode Fuzzy Hash: 7d3487a5eed5fdc0d91b47080184780cb0026e5987ce90fead8b464201b990d8
                                                • Instruction Fuzzy Hash: 30128071706B02EBE3048F25C984BA6BBB4BF45318F54522AFA148BF91D775E468CBC1
                                                APIs
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\s23_clnt.c, xrefs: 6CF7C95B
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: ErrorLast_time64
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\s23_clnt.c
                                                • API String ID: 16934928-2782156764
                                                • Opcode ID: 97b7043b52967e9763929d4b0102c849ff5e1c9ddea047ec7ac4942feeaee345
                                                • Instruction ID: 4f63c4f834620f577cbea96d07fb2437da4d8ed27aceb690c21587888bfa35c1
                                                • Opcode Fuzzy Hash: 97b7043b52967e9763929d4b0102c849ff5e1c9ddea047ec7ac4942feeaee345
                                                • Instruction Fuzzy Hash: 3E512331606601ABD371AF24E98079EB6B4FB44B48F10152BFA50E7F80D7B4D851CBE2
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: freadfseek
                                                • String ID: X
                                                • API String ID: 612888758-3081909835
                                                • Opcode ID: 539abc343e9f64d8d4d1f49f56d28b956ce32b5eb8628532d6cc967c8fb8ac93
                                                • Instruction ID: 63b23579973b0fc2a8c848cc11070a24b4d4b75e095fd3bb4bfadd2259f2d151
                                                • Opcode Fuzzy Hash: 539abc343e9f64d8d4d1f49f56d28b956ce32b5eb8628532d6cc967c8fb8ac93
                                                • Instruction Fuzzy Hash: 53F0C2716043119BDB006F6DD88425B7BE4EF80364F40CA6EE894DB3C5E639C4448B82
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_clnt.c$F
                                                • API String ID: 0-3079694442
                                                • Opcode ID: e5168824db83f38f9e7938fcb1a84908c08ff3f90cc586865d5e58dc117c40ee
                                                • Instruction ID: 1c3b56dc646a79b35b1d7ac6514212edf3437e8b6266a0f7f36f37c2116531e2
                                                • Opcode Fuzzy Hash: e5168824db83f38f9e7938fcb1a84908c08ff3f90cc586865d5e58dc117c40ee
                                                • Instruction Fuzzy Hash: 9902E471B06201DBEB10CF15C880B99B7B2EF41318F2841BAED58AFB86D775E945CB91
                                                APIs
                                                • WSASetLastError.WS2_32(00000000), ref: 6CF98407
                                                • send.WS2_32(?,?,?,00000000), ref: 6CF9841E
                                                • WSAGetLastError.WS2_32 ref: 6CF98435
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: ErrorLast$send
                                                • String ID:
                                                • API String ID: 3964319974-0
                                                • Opcode ID: 06aee71e38f98bf265c7d9b37170a1551e0d3f2bb00601f440bd91679b4cdffe
                                                • Instruction ID: 26a16eec42e2f1d4345ad6140e6a852af2f782e1937c66772c4f63d259e4ae42
                                                • Opcode Fuzzy Hash: 06aee71e38f98bf265c7d9b37170a1551e0d3f2bb00601f440bd91679b4cdffe
                                                • Instruction Fuzzy Hash: 36F0903570161167EA104E689848B5A7734EF86379F204712FD24D7680C331E94186E1
                                                APIs
                                                • malloc.MSVCRT ref: 00405017
                                                • GetShortPathNameW.KERNELBASE ref: 00405029
                                                • free.MSVCRT ref: 00405035
                                                  • Part of subcall function 00404E70: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00405155), ref: 00404E73
                                                  • Part of subcall function 00404E70: FormatMessageA.KERNEL32 ref: 00404EB4
                                                • free.MSVCRT ref: 0040504F
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: free$ErrorFormatLastMessageNamePathShortmalloc
                                                • String ID:
                                                • API String ID: 3972796230-0
                                                • Opcode ID: 50f28673293c9481b71ab48fc0896d0721b4577a95fe12ffa1399bf1bbab0f98
                                                • Instruction ID: 14395f89bb27aa1ca1f9753598149e6359d334e72cd4ccc6b7e353c60daad64f
                                                • Opcode Fuzzy Hash: 50f28673293c9481b71ab48fc0896d0721b4577a95fe12ffa1399bf1bbab0f98
                                                • Instruction Fuzzy Hash: 00E0EDB15087058FC340BF35944526ABBE1FF84318F01453FDA88A7242E73955559BC7
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_clnt.c, xrefs: 6CF8A4B0, 6CF8A8E1
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_clnt.c
                                                • API String ID: 0-1398658996
                                                • Opcode ID: 40eea5f0e165e5230ad21bf772359fa0b44037c4c78a0ba59828295df77fa05a
                                                • Instruction ID: e86892473b1d40c794684cc9e958c23add9e981bfe2976277dcbb9fa5b27ff5b
                                                • Opcode Fuzzy Hash: 40eea5f0e165e5230ad21bf772359fa0b44037c4c78a0ba59828295df77fa05a
                                                • Instruction Fuzzy Hash: 44E1C370A053019BD304CF24D481B9AB7F0FB85318F14867DE99C9BB82D775E95ACB92
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\bio\bf_buff.c
                                                • API String ID: 3510742995-3609943304
                                                • Opcode ID: 05a2a272639426b8b5750b11a9ef32db3b7f7bd711cd59b2ca2b674874e8b402
                                                • Instruction ID: 0aa5510d9724a0141e3e4164e1ee6c7c6db308da3222c8560dee3788633cd297
                                                • Opcode Fuzzy Hash: 05a2a272639426b8b5750b11a9ef32db3b7f7bd711cd59b2ca2b674874e8b402
                                                • Instruction Fuzzy Hash: 57B12071A01619EFCB04CF5AD580A99BBB1FF48324F2582AAD8189BB40D331FE55CBD1
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_pkt.c, xrefs: 6CF7AE11
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_pkt.c
                                                • API String ID: 0-36802313
                                                • Opcode ID: 0904b02ada99ca671e465becf49e86f65f893e89bc902c447a025bc6d37ec0b2
                                                • Instruction ID: 49abd7bb5f9da6bbfa08d0ae58bd50eed37f1a739a0aa2249c4dc389199cc335
                                                • Opcode Fuzzy Hash: 0904b02ada99ca671e465becf49e86f65f893e89bc902c447a025bc6d37ec0b2
                                                • Instruction Fuzzy Hash: 98910571205301DFD720CF19D880B9AB7E1FF84319F158A6EE8A98B781D374E885CBA1
                                                APIs
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\t1_enc.c, xrefs: 6CF9017B, 6CF90271
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memset
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\t1_enc.c
                                                • API String ID: 2221118986-433900044
                                                • Opcode ID: b38d51b185752cd937a1a091c441538b1221271aa516fdf7b43ed2b95036d89c
                                                • Instruction ID: 52725e5fd9434cdd225019ed1690f5e2261d172b501db1a02e71b760a896d9d9
                                                • Opcode Fuzzy Hash: b38d51b185752cd937a1a091c441538b1221271aa516fdf7b43ed2b95036d89c
                                                • Instruction Fuzzy Hash: 1B41FD32604248AFEB08CE69D88099B77F4EF8D718F11422DFD5A87641D271EC86CB92
                                                APIs
                                                • memcpy.MSVCR90(00000000,00000000,?,?,?,?,?,?,6CEF95B1,00000000,?,?,?,6CF0A494), ref: 6CEF9687
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\digest.c, xrefs: 6CEF9652, 6CEF96E4
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\digest.c
                                                • API String ID: 3510742995-3606865183
                                                • Opcode ID: 0d76ea2c97f5621450072102bc535ea0d86d6fba01f89cff7dce7e2fc7c3827c
                                                • Instruction ID: 51ae172d4a4a5f24bbb932d657f9f3283ca392bc9bcffb563f68e9e6d2fc5f80
                                                • Opcode Fuzzy Hash: 0d76ea2c97f5621450072102bc535ea0d86d6fba01f89cff7dce7e2fc7c3827c
                                                • Instruction Fuzzy Hash: A441C7757052029FE704CF65E880A5AB3B4FF84368B25816AE928CBB44E735F952CBD1
                                                APIs
                                                • SetLastError.KERNEL32(00000000), ref: 6CF7AF75
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_pkt.c, xrefs: 6CF7AFB3, 6CF7B032
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: ErrorLast
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_pkt.c
                                                • API String ID: 1452528299-36802313
                                                • Opcode ID: b392fee75df4843d119bd85ca1cc7cdf803ce9de0c667a7da8ee5ae1bf78f6b5
                                                • Instruction ID: ea0571838a0ba5617bb8424160e4287bd0c10fc84abb48c643a31a978cf47234
                                                • Opcode Fuzzy Hash: b392fee75df4843d119bd85ca1cc7cdf803ce9de0c667a7da8ee5ae1bf78f6b5
                                                • Instruction Fuzzy Hash: 3331D1B1308601ABD718CF24E8C4BD5B7A1FF51328F21426AE96C8B681D771F899C7E0
                                                APIs
                                                • malloc.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00405C37), ref: 00405B61
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: malloc
                                                • String ID: 8
                                                • API String ID: 2803490479-4194326291
                                                • Opcode ID: 09b62ba97610634032aaee03a65527072419f5a16653db5ab8349d4636d06d90
                                                • Instruction ID: 27960196ec068ea2d4ca984ce8f34aca0f5bb8a1c584f74e4cce3054eee653b0
                                                • Opcode Fuzzy Hash: 09b62ba97610634032aaee03a65527072419f5a16653db5ab8349d4636d06d90
                                                • Instruction Fuzzy Hash: 502171B1604B008BEB109F29D4887677BE0EF88324F55467EE8589B3C5D778E840DF86
                                                APIs
                                                  • Part of subcall function 00405210: MultiByteToWideChar.KERNEL32 ref: 00405249
                                                • LoadLibraryExW.KERNEL32 ref: 00404C46
                                                • free.MSVCRT ref: 00404C54
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ByteCharLibraryLoadMultiWidefree
                                                • String ID:
                                                • API String ID: 3231889924-0
                                                • Opcode ID: ffee880f393c4c36bb1ce4ed726f15dbcabc5eeb0a1e1c12815f15cab301fbda
                                                • Instruction ID: 05c8f3ae87b294e81e5ad3021f5e9e1271b0214f14fb420bb6d6726f0d24f828
                                                • Opcode Fuzzy Hash: ffee880f393c4c36bb1ce4ed726f15dbcabc5eeb0a1e1c12815f15cab301fbda
                                                • Instruction Fuzzy Hash: 37E0E5B19097009BDB00BF78D48930BBEE0EB84344F01897DE4C89B241E67988488B86
                                                APIs
                                                  • Part of subcall function 00405210: MultiByteToWideChar.KERNEL32 ref: 00405249
                                                • _wfopen.MSVCRT ref: 00402EBD
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide_wfopen
                                                • String ID:
                                                • API String ID: 372205238-0
                                                • Opcode ID: e52c21d214796629a240c51fb7b60e75d21fb52d549f7b961c803426c5818c4c
                                                • Instruction ID: 74126713ab80da84faf4757f36691f79a295a803dc0f7ed3549fcb3a874f13b0
                                                • Opcode Fuzzy Hash: e52c21d214796629a240c51fb7b60e75d21fb52d549f7b961c803426c5818c4c
                                                • Instruction Fuzzy Hash: 0CF0F2B04093019BC710BF64E58828BBBE0EF84744F008C6EE4C893240C2389589CF86
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: __wgetmainargs
                                                • String ID:
                                                • API String ID: 1709950718-0
                                                • Opcode ID: b50a7d618143305fccf7f4221a87454376e91ed455ac815f7f5e224d524365dc
                                                • Instruction ID: 9780a8ee34f3fd3c1c610ca31369fa4129d0e73ea6bad815c2c5347cee1c24e9
                                                • Opcode Fuzzy Hash: b50a7d618143305fccf7f4221a87454376e91ed455ac815f7f5e224d524365dc
                                                • Instruction Fuzzy Hash: BBE092B49043008BD700DF2596441897FE0F748348F40CA2EEA94A7210D3F981A8DB8E
                                                APIs
                                                • SetLastError.KERNEL32(00000000), ref: 6CF74907
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: ErrorLast
                                                • String ID:
                                                • API String ID: 1452528299-0
                                                • Opcode ID: 9934eeca4d6e8519e04470ab1fe7874abde31953f3240c1bf21af8e6731e4ea4
                                                • Instruction ID: 06af19880cd1d7c97a91de0c97e45970943ac790e69976961bfa34455d31a56f
                                                • Opcode Fuzzy Hash: 9934eeca4d6e8519e04470ab1fe7874abde31953f3240c1bf21af8e6731e4ea4
                                                • Instruction Fuzzy Hash: 28218175200706AFE310CF56E885BA6B7B4FF85328F154155E9188BB81D370F8A5CBE1
                                                APIs
                                                • SetLastError.KERNEL32(00000000), ref: 6CF749C5
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: ErrorLast
                                                • String ID:
                                                • API String ID: 1452528299-0
                                                • Opcode ID: d0b13e04aa9ca28ddd3b2e93ea282a7baff431c3907ecf32563e82f4bc3381d6
                                                • Instruction ID: 07488ca4417f057eb117175fd112e18a0ef605a63640a9d367b784b4242ec3b0
                                                • Opcode Fuzzy Hash: d0b13e04aa9ca28ddd3b2e93ea282a7baff431c3907ecf32563e82f4bc3381d6
                                                • Instruction Fuzzy Hash: CE019E74200704DFE324CF01E845F9777B9FF89318F440269E84A0BA82C771E882CBA1
                                                APIs
                                                • malloc.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00405C37), ref: 00405B61
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: malloc
                                                • String ID:
                                                • API String ID: 2803490479-0
                                                • Opcode ID: 289d6bc5cf9225bddf9a4ba4c434dce53377662ef230caec052a21ad90f6e574
                                                • Instruction ID: 327cd040e8be9800a2601c75deb4d6c2f338156f6ee823721eb14b8e1700891f
                                                • Opcode Fuzzy Hash: 289d6bc5cf9225bddf9a4ba4c434dce53377662ef230caec052a21ad90f6e574
                                                • Instruction Fuzzy Hash: 3EF06DB5604B018BD700DF29C488357BBE0EF84314F96897ED848AB381DB78E8008F89
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: _errno$free$FileFindmalloc$FirstNextmemsetstrncpy
                                                • String ID: N;Zn
                                                • API String ID: 3162083030-2565800930
                                                • Opcode ID: 4dd04b57bf6dbe1ce3c181080ae667940185ae9d091a744669293ab077b37650
                                                • Instruction ID: 7c815d542fa5ba9c79e28421f7d21b0d47dca91996cd28743a2d919d4b1e16d0
                                                • Opcode Fuzzy Hash: 4dd04b57bf6dbe1ce3c181080ae667940185ae9d091a744669293ab077b37650
                                                • Instruction Fuzzy Hash: A551E375B052059FEB019F6DD8487DABBB8EF4A318F1542A5D84DC7310EB72DA04C7A1
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: String$DictDict_FromImportImport_ItemModuleModule_ObjectString_Sys_freestrlen
                                                • String ID:
                                                • API String ID: 2813007557-0
                                                • Opcode ID: 8638e13c9b08a381a820a06e5729c40eb11c6702f34f87e04ccf3f99befd6a24
                                                • Instruction ID: 13ef81bd32d2d37f53a87a5a2f43fe793e1eca721c993885f661f54c21999dda
                                                • Opcode Fuzzy Hash: 8638e13c9b08a381a820a06e5729c40eb11c6702f34f87e04ccf3f99befd6a24
                                                • Instruction Fuzzy Hash: A35116B59087018BC700AF75D54825EBBE0EF88350F01CA3EE999E7390DB78D995CB5A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: AppendFormatFromList_ObjectString_Sys_freentohlstrlen
                                                • String ID:
                                                • API String ID: 1602724986-0
                                                • Opcode ID: 36c6db5c0c6acf27683b7631ae5c6a626e1c8faec13436edad47b81ef97ce63a
                                                • Instruction ID: bd494f12bd0fd589b41595198eaed635d65b3c603cc781ed69caae3811d7099d
                                                • Opcode Fuzzy Hash: 36c6db5c0c6acf27683b7631ae5c6a626e1c8faec13436edad47b81ef97ce63a
                                                • Instruction Fuzzy Hash: 8F3108B59083009BC300AFA9D98825EBFE0EF88354F558A7EE588E7391D778C4548B5B
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: Err_$CallFunctionObject_$ClearCodeExecImport_MessageModuleOccurredPrintfreentohl
                                                • String ID:
                                                • API String ID: 2592510725-0
                                                • Opcode ID: 0010ccedf207171e35fda171a142b8362fc69459d4931e80034877df5d9c225f
                                                • Instruction ID: fec6499228cd980bc1a5bd415eb7bde3f067a76568abea53337277d3fabf13d9
                                                • Opcode Fuzzy Hash: 0010ccedf207171e35fda171a142b8362fc69459d4931e80034877df5d9c225f
                                                • Instruction Fuzzy Hash: 372126B19087058FC710AF76D94429FBBE0AF84350F01CA3EE999E7290DB38D845CB5A
                                                APIs
                                                • IsDebuggerPresent.KERNEL32 ref: 6CFC0EB5
                                                • _crt_debugger_hook.MSVCR90(00000001), ref: 6CFC0EC2
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CFC0ECA
                                                • UnhandledExceptionFilter.KERNEL32(6CFC23F0), ref: 6CFC0ED5
                                                • _crt_debugger_hook.MSVCR90(00000001), ref: 6CFC0EE6
                                                • GetCurrentProcess.KERNEL32(C0000409), ref: 6CFC0EF1
                                                • TerminateProcess.KERNEL32(00000000), ref: 6CFC0EF8
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterProcessUnhandled_crt_debugger_hook$CurrentDebuggerPresentTerminate
                                                • String ID:
                                                • API String ID: 3369434319-0
                                                • Opcode ID: 386b7999abe296a442e2d9f23a6da65aad89e48199716a6eac901edcb1af5cbc
                                                • Instruction ID: a9d93254d563a1fb06485161eed817e313a319d4627ba7a911d19ea57c65266c
                                                • Opcode Fuzzy Hash: 386b7999abe296a442e2d9f23a6da65aad89e48199716a6eac901edcb1af5cbc
                                                • Instruction Fuzzy Hash: 3421D2B8A51205EFCB44DF29D0487867FB8FB0A314F20516EE50887250E7B19689EF0D
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 0040A00F
                                                • UnhandledExceptionFilter.KERNEL32 ref: 0040A01F
                                                • GetCurrentProcess.KERNEL32 ref: 0040A028
                                                • TerminateProcess.KERNEL32 ref: 0040A039
                                                • abort.MSVCRT ref: 0040A042
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                • String ID:
                                                • API String ID: 520269711-0
                                                • Opcode ID: 32597a08885f00a5d96f52d968800da127951a2effd2a68d820def550ef04dbf
                                                • Instruction ID: 908e5fe2e4d4b4f9fd135d1aae07c580cbffd01a49a55d17d848d4be7f730e2e
                                                • Opcode Fuzzy Hash: 32597a08885f00a5d96f52d968800da127951a2effd2a68d820def550ef04dbf
                                                • Instruction Fuzzy Hash: 6F0196B8905308DFD700EFAAE948299BBF4BB04304F018539E95997220E77594458F4A
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 0040A00F
                                                • UnhandledExceptionFilter.KERNEL32 ref: 0040A01F
                                                • GetCurrentProcess.KERNEL32 ref: 0040A028
                                                • TerminateProcess.KERNEL32 ref: 0040A039
                                                • abort.MSVCRT ref: 0040A042
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                • String ID:
                                                • API String ID: 520269711-0
                                                • Opcode ID: cfe80107bd9ea8fc3025abd89124e695585fe244c5293105b08e45eba9f73a9a
                                                • Instruction ID: b20f870d5eea2d1b28bc474f0d21cf6229e8d97dce3512df4533b4e671bbbf1c
                                                • Opcode Fuzzy Hash: cfe80107bd9ea8fc3025abd89124e695585fe244c5293105b08e45eba9f73a9a
                                                • Instruction Fuzzy Hash: 1E01A4B8905308DFD700EFAAEA48289BBF4BB04304F01853AE95997320E77994498F4A
                                                APIs
                                                • strncpy.MSVCR90 ref: 6CEF9E8B
                                                  • Part of subcall function 6CEEA260: memset.MSVCR90 ref: 6CEEA289
                                                • memcpy.MSVCR90(?,?,?), ref: 6CEFA06E
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\x509\x509_obj.c, xrefs: 6CEFA0ED, 6CEFA136
                                                • NO X509_NAME, xrefs: 6CEF9E85
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpymemsetstrncpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\x509\x509_obj.c$NO X509_NAME
                                                • API String ID: 2927123951-544225123
                                                • Opcode ID: c007fde934f37e5d7b6f9ea1de591d25a3d289b442879c508815ef4867c54429
                                                • Instruction ID: 66d480153a0e284a6024e4de1925e2aba11a6a9f8e27667de46bfcf251d297a9
                                                • Opcode Fuzzy Hash: c007fde934f37e5d7b6f9ea1de591d25a3d289b442879c508815ef4867c54429
                                                • Instruction Fuzzy Hash: 5BC1E5726483418FD700CF29D88075AB7F1EF8931CF24896DE8A99B741D775D90ACB92
                                                APIs
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_cbc.c, xrefs: 6CF94C54, 6CF94C68
                                                • orig_len >= md_size, xrefs: 6CF94C5E
                                                • md_size <= EVP_MAX_MD_SIZE, xrefs: 6CF94C4A
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memset
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\s3_cbc.c$md_size <= EVP_MAX_MD_SIZE$orig_len >= md_size
                                                • API String ID: 2221118986-3221712105
                                                • Opcode ID: d5a540874114244c6cb7ffd8135be92f91e818fd89c8bc8a6951b7cad17075b1
                                                • Instruction ID: ce817cea63a35bbefb526bb613e0ba17bfc452ded65736d13067eec9c83cf472
                                                • Opcode Fuzzy Hash: d5a540874114244c6cb7ffd8135be92f91e818fd89c8bc8a6951b7cad17075b1
                                                • Instruction Fuzzy Hash: EB81B2356082A48FCB15CF398894799BFB2AF9B200F58C1D9D4DDDB747CA32994ACB50
                                                APIs
                                                  • Part of subcall function 00401610: ntohl.WS2_32 ref: 0040163E
                                                  • Part of subcall function 00401610: fseek.MSVCRT ref: 00401656
                                                  • Part of subcall function 00401610: ntohl.WS2_32 ref: 00401661
                                                  • Part of subcall function 00401610: malloc.MSVCRT ref: 00401669
                                                  • Part of subcall function 00401610: ntohl.WS2_32 ref: 00401684
                                                  • Part of subcall function 00401610: fread.MSVCRT ref: 004016A0
                                                  • Part of subcall function 00401610: fclose.MSVCRT ref: 004016BC
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 004049FC
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 00404A0F
                                                  • Part of subcall function 004049D0: strtok.MSVCRT(?,?,00000000), ref: 00404A1F
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000), ref: 00404A73
                                                  • Part of subcall function 004049D0: strtok.MSVCRT(?,?,00000000), ref: 00404A87
                                                  • Part of subcall function 004049D0: _mkdir.MSVCRT ref: 00404AA5
                                                • ntohl.WS2_32(?,?,?,?,?,?,004023E6), ref: 00401897
                                                • fwrite.MSVCRT ref: 004018B9
                                                • fclose.MSVCRT ref: 004018CA
                                                • free.MSVCRT ref: 004018D2
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ntohl$strcpy$fclosestrtok$_mkdirfreadfreefseekfwritemalloc
                                                • String ID:
                                                • API String ID: 1532958511-0
                                                • Opcode ID: 9b1658ee59e78418a1a896e7d1f1d8056e2a366c7e11f4c54195c886a90b60ba
                                                • Instruction ID: 8df8dfa69511768c1765381bdb0415dcaef8feb7ccc1299cfd62f9c5395cf5e0
                                                • Opcode Fuzzy Hash: 9b1658ee59e78418a1a896e7d1f1d8056e2a366c7e11f4c54195c886a90b60ba
                                                • Instruction Fuzzy Hash: 0A114CB18087009BC3107F3A848401EBBE0AF81368F458A3EF8D8A73D1C73898559B4B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\rand\md_rand.c$gfff
                                                • API String ID: 0-1304535762
                                                • Opcode ID: f135fa1ed1f78a1eaf2bba992e82b5f4e7ca16102e2bd24ddfbfd3b861f6b235
                                                • Instruction ID: e3e3f7792d5658038f288026655c5fa1aa9c62ee8c6d24d62b7ca7e54b6103d5
                                                • Opcode Fuzzy Hash: f135fa1ed1f78a1eaf2bba992e82b5f4e7ca16102e2bd24ddfbfd3b861f6b235
                                                • Instruction Fuzzy Hash: A2B1D431A087419FD704CF68C84575ABBF4AB8A718F25892DF9A4D7381E770E906CBC2
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f3c2c2f370dfa4265cfb92d671151a03b6835ddd4f161b2aed8a7dc64b52055f
                                                • Instruction ID: 5902d527c8ff325b9a159f110558f8c138b2dd0b558a20c0c4e348baa7ed48f4
                                                • Opcode Fuzzy Hash: f3c2c2f370dfa4265cfb92d671151a03b6835ddd4f161b2aed8a7dc64b52055f
                                                • Instruction Fuzzy Hash: 1D4182B1901B029FD3A4CF2EC285512FBF4FB986107108A2AD49DC7E24E331FA959B94
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 31cb95ee1a82421ede6f0fee0baa24ab469750fc944d5542bdbe00e50f8cada3
                                                • Instruction ID: bb02bab132e0af868fcaa38565c13997f13b754994f9bd7d7b2636fdb35aa209
                                                • Opcode Fuzzy Hash: 31cb95ee1a82421ede6f0fee0baa24ab469750fc944d5542bdbe00e50f8cada3
                                                • Instruction Fuzzy Hash: 89D02B7E5080009AD605CD35DC95911F3B3F2D6720F4D8E05F095C2408D73BC315A132
                                                APIs
                                                • PyDict_New.PYTHON27 ref: 6CEC2657
                                                • PyDict_SetItemString.PYTHON27(00000000,subject,00000000), ref: 6CEC2699
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Dict_$ItemString
                                                • String ID: OCSP$caIssuers$crlDistributionPoints$issuer$notAfter$notBefore$serialNumber$subject$subjectAltName$version
                                                • API String ID: 1169755417-3036028867
                                                • Opcode ID: 69ae59b7e478e1659b2bda66adab4d4de7bdb5ab5a6c30f8898044503eb3af2f
                                                • Instruction ID: e2afc49c4630697ccbfeaba7e3b44e3a05349eeaa90e8010e1621a6dbf4a5e29
                                                • Opcode Fuzzy Hash: 69ae59b7e478e1659b2bda66adab4d4de7bdb5ab5a6c30f8898044503eb3af2f
                                                • Instruction Fuzzy Hash: A7D1E671B002019BD7108FA4CEC4ADB73B4EF55328F259668E92547781EB35DE46CB93
                                                APIs
                                                • _errno.MSVCR90 ref: 6CEC4B3D
                                                • _PyArg_ParseTupleAndKeywords_SizeT.PYTHON27(?,?,|OOO:load_verify_locations,6CFC53B4,?,?,?), ref: 6CEC4B62
                                                • PyErr_SetString.PYTHON27(?,cafile, capath and cadata cannot be all omitted), ref: 6CEC4BC7
                                                Strings
                                                • cadata should be a contiguous buffer with a single dimension, xrefs: 6CEC4D0E
                                                • cadata should be an ASCII string or a bytes-like object, xrefs: 6CEC4D3D
                                                • cafile, capath and cadata cannot be all omitted, xrefs: 6CEC4BBA
                                                • |OOO:load_verify_locations, xrefs: 6CEC4B5B
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Arg_Err_Keywords_ParseSizeStringTuple_errno
                                                • String ID: cadata should be a contiguous buffer with a single dimension$cadata should be an ASCII string or a bytes-like object$cafile, capath and cadata cannot be all omitted$|OOO:load_verify_locations
                                                • API String ID: 3659128005-2120920770
                                                • Opcode ID: 4c21733ca4cb80ebfd3e0f946903f8f2bdd2e87c537d321a29ccffa8323e63f0
                                                • Instruction ID: 07b12fefca81a29d4444c0d1e7f7335788970befb5255f0331a830bb4c1d9586
                                                • Opcode Fuzzy Hash: 4c21733ca4cb80ebfd3e0f946903f8f2bdd2e87c537d321a29ccffa8323e63f0
                                                • Instruction Fuzzy Hash: 8BB1C271F002059FDB04DFA8CA84BAEB7B5FF85318F31822AE92597740D7359A45CB92
                                                APIs
                                                • _errno.MSVCR90 ref: 6CEC459F
                                                • _PyArg_ParseTupleAndKeywords_SizeT.PYTHON27(?,?,et|OO:load_cert_chain,6CFC5304,?,?,?,?), ref: 6CEC45D1
                                                • PyUnicodeUCS2_FromObject.PYTHON27(?), ref: 6CEC4605
                                                • PyUnicodeUCS2_AsEncodedString.PYTHON27(00000000,?,00000000), ref: 6CEC4622
                                                • PyCallable_Check.PYTHON27(?), ref: 6CEC4659
                                                • PyEval_SaveThread.PYTHON27 ref: 6CEC46A5
                                                • PyEval_RestoreThread.PYTHON27(?), ref: 6CEC46CD
                                                • _errno.MSVCR90 ref: 6CEC46EB
                                                • PyErr_SetFromErrno.PYTHON27 ref: 6CEC4702
                                                • PyEval_SaveThread.PYTHON27 ref: 6CEC473D
                                                • PyEval_RestoreThread.PYTHON27(?), ref: 6CEC476B
                                                • _errno.MSVCR90 ref: 6CEC4789
                                                • PyErr_SetFromErrno.PYTHON27 ref: 6CEC47A1
                                                • PyMem_Free.PYTHON27(?), ref: 6CEC4845
                                                • PyMem_Free.PYTHON27(?), ref: 6CEC484B
                                                • PyMem_Free.PYTHON27(?), ref: 6CEC488A
                                                • PyMem_Free.PYTHON27(?), ref: 6CEC4890
                                                Strings
                                                • password should be a string or callable, xrefs: 6CEC4674
                                                • et|OO:load_cert_chain, xrefs: 6CEC45CA
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Eval_FreeMem_Thread$From_errno$Err_ErrnoRestoreSaveUnicode$Arg_Callable_CheckEncodedKeywords_ObjectParseSizeStringTuple
                                                • String ID: et|OO:load_cert_chain$password should be a string or callable
                                                • API String ID: 3791093290-3981768526
                                                • Opcode ID: 64bf706a8f5c3787180ee2753730bac1ca27ba4ae0218200ab012dffcc0daffa
                                                • Instruction ID: fa8fa652319877e6ce9106168d2761a79fab4160d9954f323c7d6b1f2e882c4f
                                                • Opcode Fuzzy Hash: 64bf706a8f5c3787180ee2753730bac1ca27ba4ae0218200ab012dffcc0daffa
                                                • Instruction Fuzzy Hash: D5B16BB5F102099FCB04DFA4D9849AEB7B5FB4A718B30811AF82597700D735EA51CFA2
                                                APIs
                                                • PyList_New.PYTHON27(00000000), ref: 6CEC1CB6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: List_
                                                • String ID: <INVALID>$DirName$Registered ID$URI$Unknown general name type$p~
                                                • API String ID: 4215266370-2014928804
                                                • Opcode ID: 4076a0f5b847017f6f196b12132952f9840425468f359b8c45a1c2fafbe1dc8b
                                                • Instruction ID: 2616fe375486e835f9e055c136915c4a4dbd8b7aa7ce658ce1ab90355d59e909
                                                • Opcode Fuzzy Hash: 4076a0f5b847017f6f196b12132952f9840425468f359b8c45a1c2fafbe1dc8b
                                                • Instruction Fuzzy Hash: DBD1A071B053018BDB04CFA4CA85B5B77F4AF85318F24462DE9298B781EB75E905CB93
                                                APIs
                                                • LoadLibraryA.KERNEL32(KERNEL32.DLL), ref: 6CF66981
                                                • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 6CF669CB
                                                • FreeLibrary.KERNEL32(00000000), ref: 6CF669D4
                                                • GetProcAddress.KERNEL32(00000000,Module32First), ref: 6CF669E7
                                                • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 6CF669F5
                                                • FreeLibrary.KERNEL32(00000000), ref: 6CF66A0B
                                                • CloseHandle.KERNEL32(00000000), ref: 6CF66A38
                                                • FreeLibrary.KERNEL32(00000000), ref: 6CF66A3F
                                                • CloseHandle.KERNEL32(00000000), ref: 6CF66A80
                                                • FreeLibrary.KERNEL32(00000000), ref: 6CF66A87
                                                • CloseHandle.KERNEL32(00000000), ref: 6CF66AA1
                                                • FreeLibrary.KERNEL32(00000000), ref: 6CF66AA8
                                                • memcpy.MSVCR90(?,?,?), ref: 6CF66ADF
                                                Strings
                                                • KERNEL32.DLL, xrefs: 6CF6697C
                                                • Module32First, xrefs: 6CF669E1
                                                • CreateToolhelp32Snapshot, xrefs: 6CF669C5
                                                • Module32Next, xrefs: 6CF669E9
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\dso\dso_win32.c, xrefs: 6CF66997
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Library$Free$AddressCloseHandleProc$Loadmemcpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\dso\dso_win32.c$CreateToolhelp32Snapshot$KERNEL32.DLL$Module32First$Module32Next
                                                • API String ID: 3784454856-1517652985
                                                • Opcode ID: 0444d7138ff3b03b185df6e9eb029d2075d0115d6c79a28ad03d746defc16ff2
                                                • Instruction ID: 2313a0be28f055855695cb793a0a547f9998e2e5d524263ae916604d2a46f9fd
                                                • Opcode Fuzzy Hash: 0444d7138ff3b03b185df6e9eb029d2075d0115d6c79a28ad03d746defc16ff2
                                                • Instruction Fuzzy Hash: 6C41D532B40119ABCB109B65DC8CBDF77B4EF4A314F0442A9F90AD7A80DB359A46CB91
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strlen$strncpy$Err_HomeInitializeNameOccurredProgramPythonfreestrncat
                                                • String ID: .zip$_lib$base$rary
                                                • API String ID: 4172513644-23906921
                                                • Opcode ID: b55798043e5a0df401c4117ddb03c2adf06e6b3e64bdd6c2b2d945946a7d70bf
                                                • Instruction ID: 14274933dd56787fdb82c6a91d81d47f866d2d9f51aee60e5476c2917c75af4e
                                                • Opcode Fuzzy Hash: b55798043e5a0df401c4117ddb03c2adf06e6b3e64bdd6c2b2d945946a7d70bf
                                                • Instruction Fuzzy Hash: FE7148B05083019AD700BF65C54526ABAE4AF84345F04CA7EE9D8AB3D1DB7C8885CB9F
                                                APIs
                                                • LoadLibraryA.KERNEL32(KERNEL32.DLL), ref: 6CF66B22
                                                • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 6CF66B67
                                                • FreeLibrary.KERNEL32(00000000), ref: 6CF66B70
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Library$AddressFreeLoadProc
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\dso\dso_win32.c$CreateToolhelp32Snapshot$KERNEL32.DLL$Module32First$Module32Next
                                                • API String ID: 145871493-1517652985
                                                • Opcode ID: 3d529d73e07a81694cb2b32d1aa62562e7bfe2823f3e64fc3412af5d0f1123ca
                                                • Instruction ID: c676347fb0f0f3e4a2e1690a0013458ace850f00d92c70d7aca287ca924522b6
                                                • Opcode Fuzzy Hash: 3d529d73e07a81694cb2b32d1aa62562e7bfe2823f3e64fc3412af5d0f1123ca
                                                • Instruction Fuzzy Hash: B541A232B41118ABCB10EBB5EC4CBDF73B8EF49315F10419AF90997680DB359A05CB95
                                                APIs
                                                • memcpy.MSVCR90(00001FE0,?,00000020,?,?), ref: 6CF7C4F4
                                                • memcpy.MSVCR90(00000000,?,?), ref: 6CF7C630
                                                • _time64.MSVCR90 ref: 6CF7C6E2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy$_time64
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\s23_srvr.c$CONNECT$GET $HEAD $POST $PUT $s->version <= TLS_MAX_VERSION
                                                • API String ID: 2936696573-3503775687
                                                • Opcode ID: 50380f34bcf8f023f873a3f96cc0225b37369dc807416db8c9df1d002e0f81d7
                                                • Instruction ID: 54beca7d4c47ffa490d82bbefca4a4b46fed02606c48827fe8003b80a2e4714a
                                                • Opcode Fuzzy Hash: 50380f34bcf8f023f873a3f96cc0225b37369dc807416db8c9df1d002e0f81d7
                                                • Instruction Fuzzy Hash: 85020670A043429BE7309F69E89079ABBB1FF05308F18416BD8999BF81D375E554CBB1
                                                APIs
                                                • fseek.MSVCR90 ref: 6CED5D7A
                                                • feof.MSVCR90 ref: 6CED5D8E
                                                • ftell.MSVCR90 ref: 6CED5DA2
                                                • _fileno.MSVCR90 ref: 6CED5DCF
                                                • _setmode.MSVCR90 ref: 6CED5DE3
                                                • GetLastError.KERNEL32(C:\build27\cpython\externals\openssl-1.0.2t\crypto\bio\bss_file.c,0000019D), ref: 6CED5F52
                                                • fflush.MSVCR90 ref: 6CED601E
                                                • GetLastError.KERNEL32(C:\build27\cpython\externals\openssl-1.0.2t\crypto\bio\bss_file.c,000001B9), ref: 6CED603A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_fileno_setmodefeoffflushfseekftell
                                                • String ID: ','$C:\build27\cpython\externals\openssl-1.0.2t\crypto\bio\bss_file.c$fflush()$fopen('
                                                • API String ID: 1079641532-2199427359
                                                • Opcode ID: bbb60f31226001cf9dfc2de213ad7d752c496ed9ad9f068bf75425f725f8927b
                                                • Instruction ID: b45c05c0bcd7d2ba9e36d4b342f6012f2e19a200f91ec2fa75f42d97da5d85ca
                                                • Opcode Fuzzy Hash: bbb60f31226001cf9dfc2de213ad7d752c496ed9ad9f068bf75425f725f8927b
                                                • Instruction Fuzzy Hash: CEA16BB17062049BD700DF5CE841BEAB7F9EF8631DF75456AED088BB40D732AA068791
                                                APIs
                                                • _PyArg_ParseTupleAndKeywords_SizeT.PYTHON27(?,?,s:enum_certificates,?,?), ref: 6CEC617E
                                                • PyList_New.PYTHON27(00000000), ref: 6CEC6192
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Arg_Keywords_List_ParseSizeTuple
                                                • String ID: s:enum_certificates
                                                • API String ID: 2451796958-680348632
                                                • Opcode ID: a56000db18b62cfcdf01cf13e346b1983e2dc3d7a4ff9d6088b7be81d972570f
                                                • Instruction ID: af3046ddef135e1069cb2eaeb569dd32d3a8bbc9ac31197a8ce425a69e485c07
                                                • Opcode Fuzzy Hash: a56000db18b62cfcdf01cf13e346b1983e2dc3d7a4ff9d6088b7be81d972570f
                                                • Instruction Fuzzy Hash: 85815FB1F002059BDB04CFA8D944AAF77B9EF85328B254269E935D7780D735ED02CB92
                                                APIs
                                                • _PyArg_ParseTupleAndKeywords_SizeT.PYTHON27(?,?,s:enum_crls,?,?), ref: 6CEC63EB
                                                • PyList_New.PYTHON27(00000000), ref: 6CEC63FF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Arg_Keywords_List_ParseSizeTuple
                                                • String ID: s:enum_crls
                                                • API String ID: 2451796958-1859697249
                                                • Opcode ID: 1826bace73fff675a5729086033495c92c2d29d7307d9821767e4755b27f193f
                                                • Instruction ID: cd785272889e1ebd98cc32a2a5e8a309193e2779b996969592da98103866aa85
                                                • Opcode Fuzzy Hash: 1826bace73fff675a5729086033495c92c2d29d7307d9821767e4755b27f193f
                                                • Instruction Fuzzy Hash: 4F618DB1F002059BCB04CFA8D9489AF77B9EF85328B344659E929D7744D735DE02CB92
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: strncmp$memcpy
                                                • String ID: $-----$-----BEGIN $-----END $C:\build27\cpython\externals\openssl-1.0.2t\crypto\pem\pem_lib.c
                                                • API String ID: 2549481713-920802336
                                                • Opcode ID: 2f8d34425f716b827fd6faf9207555b01a8f14dff36c312f20862fa73b87862f
                                                • Instruction ID: 8278ec851163f4419f501b5369139a5f2115563a7affa55e2c62c1183de9b7ce
                                                • Opcode Fuzzy Hash: 2f8d34425f716b827fd6faf9207555b01a8f14dff36c312f20862fa73b87862f
                                                • Instruction Fuzzy Hash: 59F1D671A042599BDB20CFA8CC807D977B4AF0D348F2481E8D90DA7B41E775AE89CF91
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: signal$_fileno_get_osfhandle$Process$ByteCharCodeCommandCreateExitInfoLineMessageMultiObjectSingleStartupWaitWide
                                                • String ID:
                                                • API String ID: 2917712702-0
                                                • Opcode ID: 04f97da4b6471231529615fe277737a2d960c5eeca71b3878ce8ae2f7f18ba33
                                                • Instruction ID: c039b241e3be979fe19aad14a7bb84f350d9c54bc61ae4a3153f7adda5648e3d
                                                • Opcode Fuzzy Hash: 04f97da4b6471231529615fe277737a2d960c5eeca71b3878ce8ae2f7f18ba33
                                                • Instruction Fuzzy Hash: D04183B45093409FD710AF69D54939EBBF0BF84308F418D2EE8D897391D7BA94898B87
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: pyi-
                                                • API String ID: 0-3770392772
                                                • Opcode ID: 3991ea21385366fad50a3174c8101d38cc614240c90f5204e2e8c51596cf13b5
                                                • Instruction ID: de32975ff2c34a0d384c2c2b91ec4d8f43b36af93b0298a640d216871d4c163f
                                                • Opcode Fuzzy Hash: 3991ea21385366fad50a3174c8101d38cc614240c90f5204e2e8c51596cf13b5
                                                • Instruction Fuzzy Hash: 1B513CF46083048FD710DF29D98475ABBE4BB48305F01897AE8859B3E2D3B8D995CF5A
                                                APIs
                                                • GetStdHandle.KERNEL32(000000F4,?), ref: 6CEDCC86
                                                • GetFileType.KERNEL32(00000000), ref: 6CEDCC93
                                                • _vsnprintf.MSVCR90 ref: 6CEDCCB1
                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 6CEDCCD5
                                                • _vsnprintf.MSVCR90 ref: 6CEDCCFE
                                                • GetVersion.KERNEL32 ref: 6CEDCD0B
                                                • RegisterEventSourceA.ADVAPI32(00000000,OpenSSL), ref: 6CEDCD28
                                                • ReportEventA.ADVAPI32(00000000,00000001,00000000,00000000,00000000,00000001,00000000,?,00000000), ref: 6CEDCD56
                                                • DeregisterEventSource.ADVAPI32(00000000), ref: 6CEDCD5D
                                                • MessageBoxA.USER32(00000000,?,OpenSSL: FATAL,00000010), ref: 6CEDCD82
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Event$FileSource_vsnprintf$DeregisterHandleMessageRegisterReportTypeVersionWrite
                                                • String ID: OpenSSL$OpenSSL: FATAL
                                                • API String ID: 3842704995-4224901669
                                                • Opcode ID: 47a2ffe74ec53d3e2f295241e23f2c2c3a21ca24a65f2d0fb95972c42fb5f3ec
                                                • Instruction ID: e29d7a854b5ff8aeb991ca2c1b2bffa8c439a96f492f42b02eea2ad48a0fd1c3
                                                • Opcode Fuzzy Hash: 47a2ffe74ec53d3e2f295241e23f2c2c3a21ca24a65f2d0fb95972c42fb5f3ec
                                                • Instruction Fuzzy Hash: 1131B471B50218ABEB149B64CC49FEE7778EF09704F104189FA0A9A2C0DBB16B85CB91
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: Err_$Clear$CallDictDict_FunctionImport_ItemLongLong_ModuleModule_Object_OccurredPrintString
                                                • String ID:
                                                • API String ID: 925224682-0
                                                • Opcode ID: 8284304efd43d9ab4285c5a8999a048a53c7a993873e65a3ce520b895afff7f8
                                                • Instruction ID: 6e3fe36d3e398bcb121eacd201e11187e14c0780b5c0b7dddb2c741b5b09a4ce
                                                • Opcode Fuzzy Hash: 8284304efd43d9ab4285c5a8999a048a53c7a993873e65a3ce520b895afff7f8
                                                • Instruction Fuzzy Hash: 522150755046108FC7106F74AA4C15A7FE1FB88321B158B3DEA9AD32E0CBB48951CB9A
                                                APIs
                                                • GetVersion.KERNEL32 ref: 6CF07D30
                                                • GetDC.USER32(00000000), ref: 6CF07D50
                                                • GetDeviceCaps.GDI32(00000000,00000008), ref: 6CF07D64
                                                • GetDeviceCaps.GDI32(00000000,0000000A), ref: 6CF07D6C
                                                • CreateCompatibleBitmap.GDI32(00000000,?,00000010), ref: 6CF07D78
                                                • GetObjectA.GDI32(00000000,00000018,?), ref: 6CF07D88
                                                • GetDIBits.GDI32(?,?,00000000,00000010,00000000,00000028,00000000), ref: 6CF07E12
                                                  • Part of subcall function 6CEDCB30: GetModuleHandleA.KERNEL32(FFFFFFFF,00000074,00000000,C:\build27\cpython\externals\openssl-1.0.2t\crypto\user\eng_lib.c,?,6CEDCD1D), ref: 6CEDCB51
                                                  • Part of subcall function 6CEDCB30: GetProcAddress.KERNEL32(00000000,_OPENSSL_isservice), ref: 6CEDCB61
                                                  • Part of subcall function 6CEDCB30: GetProcessWindowStation.USER32(00000074,00000000,C:\build27\cpython\externals\openssl-1.0.2t\crypto\user\eng_lib.c,?,6CEDCD1D), ref: 6CEDCB85
                                                  • Part of subcall function 6CEDCB30: GetUserObjectInformationW.USER32(00000000,00000002,00000000,00000000,?,?,6CEDCD1D), ref: 6CEDCBA0
                                                  • Part of subcall function 6CEDCB30: GetLastError.KERNEL32(?,6CEDCD1D), ref: 6CEDCBAE
                                                  • Part of subcall function 6CEDCB30: GetUserObjectInformationW.USER32(00000000,00000002,?,?,?,?,6CEDCD1D), ref: 6CEDCBE7
                                                  • Part of subcall function 6CEDCB30: wcsstr.MSVCR90 ref: 6CEDCC09
                                                • DeleteObject.GDI32(?), ref: 6CF07EC2
                                                • ReleaseDC.USER32(00000000,?), ref: 6CF07ECE
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\rand\rand_win.c, xrefs: 6CF07DC1
                                                • (, xrefs: 6CF07DC6
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Object$CapsDeviceInformationUser$AddressBitmapBitsCompatibleCreateDeleteErrorHandleLastModuleProcProcessReleaseStationVersionWindowwcsstr
                                                • String ID: ($C:\build27\cpython\externals\openssl-1.0.2t\crypto\rand\rand_win.c
                                                • API String ID: 1521540791-3691025673
                                                • Opcode ID: 06c8589362f09e10e7dd9604da4361c8cdd298199e0a7ef150720d667619f93d
                                                • Instruction ID: edb628b473fc798c3b21406f3e09bc51cd45077fdfe0896b37ff88c9ff3f40f3
                                                • Opcode Fuzzy Hash: 06c8589362f09e10e7dd9604da4361c8cdd298199e0a7ef150720d667619f93d
                                                • Instruction Fuzzy Hash: 31518B70F51209ABEB04DFA9CC95BEFB7B8EF49704F10401AE915A7380DB759905CBA1
                                                APIs
                                                Strings
                                                • failure in sk_push, xrefs: 6CFA0983
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\txt_db\txt_db.c, xrefs: 6CFA07B5, 6CFA0906
                                                • wrong number of fields on line %ld (looking for field %d, got %d, '%s' left), xrefs: 6CFA09C4
                                                • OPENSSL_malloc failure, xrefs: 6CFA0A01
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: __iob_funcfprintf$memset
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\txt_db\txt_db.c$OPENSSL_malloc failure$failure in sk_push$wrong number of fields on line %ld (looking for field %d, got %d, '%s' left)
                                                • API String ID: 886766458-710548800
                                                • Opcode ID: edd3fa465533fbd32986b395da7352e681db99d0984d237e5ae85d95dd706247
                                                • Instruction ID: 9978048156e67474dc7d3df3a28e869e13666b702ce0aeadb42b114ccac5833a
                                                • Opcode Fuzzy Hash: edd3fa465533fbd32986b395da7352e681db99d0984d237e5ae85d95dd706247
                                                • Instruction Fuzzy Hash: 50919071E04246CFEB04CFA5D88475AFBB0EF49318F2981ADC8599B702D7B1E946CB94
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: isspace$strtoul
                                                • String ID: ,Reason=$C:\build27\cpython\externals\openssl-1.0.2t\crypto\ocsp\ocsp_ht.c$Code=
                                                • API String ID: 3910935903-2238531526
                                                • Opcode ID: 5f5ae01b198f54159126243a184171bac4523204e49383933636ffbe65addc2a
                                                • Instruction ID: 4522a8a0feae9e451f20e23a5314bf7ec18b9e9d12b17898be76a4d4be81502c
                                                • Opcode Fuzzy Hash: 5f5ae01b198f54159126243a184171bac4523204e49383933636ffbe65addc2a
                                                • Instruction Fuzzy Hash: 14518671B092C16AF7108F75AC61BD67BF4CF41708F1841BAECC8C7681E696E605E3A2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: /usr/local/ssl/lib/users$C:\build27\cpython\externals\openssl-1.0.2t\crypto\user\eng_list.c$DIR_ADD$DIR_LOAD$LIST_ADD$LOAD$OPENSSL_userS$dynamic$id=
                                                • API String ID: 0-1966498346
                                                • Opcode ID: 26d6fcb7d0ece6ca63083e54e80e208b88525b5239175db28a2b9b5917cf849d
                                                • Instruction ID: 6a63081bc98a998a89f06a38133aae7dd64e5523d4e5e215ee698e933705a4c3
                                                • Opcode Fuzzy Hash: 26d6fcb7d0ece6ca63083e54e80e208b88525b5239175db28a2b9b5917cf849d
                                                • Instruction Fuzzy Hash: 9A416A2274668126E70105796C727AB21A20F56F5CF2C4A37EC50DFFC2EB13CD0992D2
                                                APIs
                                                • PyUnicodeUCS2_AsEncodedString.PYTHON27(?,00000000,00000000), ref: 6CEC434B
                                                • PyErr_Format.PYTHON27(6D38C2D8,password cannot be longer than %d bytes,7FFFFFFF), ref: 6CEC43DA
                                                • PyMem_Free.PYTHON27(?), ref: 6CEC43EC
                                                • PyMem_Malloc.PYTHON27(?), ref: 6CEC43F3
                                                • PyErr_SetString.PYTHON27(00000000,unable to allocate password buffer), ref: 6CEC4414
                                                • memcpy.MSVCR90(00000000,6D3C2788,?), ref: 6CEC443C
                                                Strings
                                                • unable to allocate password buffer, xrefs: 6CEC440E
                                                • password cannot be longer than %d bytes, xrefs: 6CEC43D4
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Err_Mem_String$EncodedFormatFreeMallocUnicodememcpy
                                                • String ID: password cannot be longer than %d bytes$unable to allocate password buffer
                                                • API String ID: 3034729608-2395793021
                                                • Opcode ID: 533b4b519f251915035109b276029afdfc309925b0f6fa794e2e5a8b6ab2c323
                                                • Instruction ID: 4fb3b164fcc8bf40ca57279963bed7326462152cc0d4c4c4ae3d18a8d2d60925
                                                • Opcode Fuzzy Hash: 533b4b519f251915035109b276029afdfc309925b0f6fa794e2e5a8b6ab2c323
                                                • Instruction Fuzzy Hash: 2941A235B012019BD704CF58D984AAB73B8FBC63287344719E93987B40D736E956CBA2
                                                APIs
                                                • GetModuleHandleA.KERNEL32(FFFFFFFF,00000074,00000000,C:\build27\cpython\externals\openssl-1.0.2t\crypto\user\eng_lib.c,?,6CEDCD1D), ref: 6CEDCB51
                                                • GetProcAddress.KERNEL32(00000000,_OPENSSL_isservice), ref: 6CEDCB61
                                                • GetProcessWindowStation.USER32(00000074,00000000,C:\build27\cpython\externals\openssl-1.0.2t\crypto\user\eng_lib.c,?,6CEDCD1D), ref: 6CEDCB85
                                                • GetUserObjectInformationW.USER32(00000000,00000002,00000000,00000000,?,?,6CEDCD1D), ref: 6CEDCBA0
                                                • GetLastError.KERNEL32(?,6CEDCD1D), ref: 6CEDCBAE
                                                • GetUserObjectInformationW.USER32(00000000,00000002,?,?,?,?,6CEDCD1D), ref: 6CEDCBE7
                                                • wcsstr.MSVCR90 ref: 6CEDCC09
                                                Strings
                                                • _OPENSSL_isservice, xrefs: 6CEDCB5B
                                                • Service-0x, xrefs: 6CEDCBFF
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\user\eng_lib.c, xrefs: 6CEDCB45
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: InformationObjectUser$AddressErrorHandleLastModuleProcProcessStationWindowwcsstr
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\user\eng_lib.c$Service-0x$_OPENSSL_isservice
                                                • API String ID: 459917433-1028230771
                                                • Opcode ID: 2c11ac9bf8a078835ddbf05a274a4f2fa3089d4648a59733f5df506446be939e
                                                • Instruction ID: 1bc25cd4de2834f76b0e4a850f405512654d47f158088b7b81495dc6da7f5592
                                                • Opcode Fuzzy Hash: 2c11ac9bf8a078835ddbf05a274a4f2fa3089d4648a59733f5df506446be939e
                                                • Instruction Fuzzy Hash: 0C310731B00205ABDB00DBB9DC89B9F7778EB463A5F204225E926D32C0DB31AA15C795
                                                APIs
                                                • PyString_FromString.PYTHON27(SSL_CERT_FILE), ref: 6CEC5C99
                                                • PyString_FromString.PYTHON27(/usr/local/ssl/cert.pem), ref: 6CEC5CAD
                                                • PyString_FromString.PYTHON27(SSL_CERT_DIR), ref: 6CEC5CBE
                                                • PyString_FromString.PYTHON27(/usr/local/ssl/certs), ref: 6CEC5CCE
                                                • _Py_BuildValue_SizeT.PYTHON27(NNNN,00000000,?,00000000,00000000), ref: 6CEC5CE5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: FromStringString_$BuildSizeValue_
                                                • String ID: /usr/local/ssl/cert.pem$/usr/local/ssl/certs$NNNN$SSL_CERT_DIR$SSL_CERT_FILE
                                                • API String ID: 640227754-3399985264
                                                • Opcode ID: 5b5126d6643e33065d6331dddde1b11f718bb3c5577b56b621d72eca43e25052
                                                • Instruction ID: 1b9ceebb8e1eb7aad12f80ecd1db0827ab1168024e38f09304688b7478cacca1
                                                • Opcode Fuzzy Hash: 5b5126d6643e33065d6331dddde1b11f718bb3c5577b56b621d72eca43e25052
                                                • Instruction Fuzzy Hash: 4621F671B022016BD7009AA99E8494B77F4AE49338B350364DD3987751D625DD02DBD3
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: atoi
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\pmeth_lib.c$dh_paramgen_generator$dh_paramgen_prime_len$dh_paramgen_subprime_len$dh_paramgen_type$dh_rfc5114
                                                • API String ID: 657269090-2095898903
                                                • Opcode ID: 4fa62db877ffef529aa997a33cde8345df9021cb09a10cf2c091e764098b535e
                                                • Instruction ID: a9e72af6f9532959764c98dfd4c59823396dbc512d595b086f47a0f800542737
                                                • Opcode Fuzzy Hash: 4fa62db877ffef529aa997a33cde8345df9021cb09a10cf2c091e764098b535e
                                                • Instruction Fuzzy Hash: 6B81E7327082616BDF018E7788917A337A7AF92B5CF2C6258D95D8FAD2D627C845C3C0
                                                APIs
                                                • strcpy.MSVCRT(?,?,?,?,?,004023FF), ref: 00401F73
                                                • strtok.MSVCRT(?,?,?,?,?), ref: 00401F83
                                                • strcpy.MSVCRT(?,?,?,?,?), ref: 00401F8F
                                                • strtok.MSVCRT(?,?,?,?,?), ref: 00401FA3
                                                • strcpy.MSVCRT(?,?,?,?,?), ref: 00401FAF
                                                  • Part of subcall function 00402A90: strlen.MSVCRT ref: 00402AA0
                                                  • Part of subcall function 00402A90: strncpy.MSVCRT ref: 00402AB3
                                                  • Part of subcall function 00402A90: strlen.MSVCRT ref: 00402ABB
                                                  • Part of subcall function 00402A90: strrchr.MSVCRT ref: 00402AD2
                                                • malloc.MSVCRT ref: 0040222B
                                                • strcpy.MSVCRT ref: 0040224C
                                                • strcpy.MSVCRT ref: 0040226A
                                                • strcpy.MSVCRT ref: 00402282
                                                  • Part of subcall function 00404B00: feof.MSVCRT ref: 00404B63
                                                  • Part of subcall function 00404B00: fread.MSVCRT ref: 00404B87
                                                  • Part of subcall function 00404B00: fwrite.MSVCRT ref: 00404BA8
                                                  • Part of subcall function 00404B00: ferror.MSVCRT ref: 00404BB0
                                                  • Part of subcall function 00404B00: clearerr.MSVCRT(?,?,?,00402048), ref: 00404BC1
                                                  • Part of subcall function 00404B00: fclose.MSVCRT ref: 00404BC9
                                                  • Part of subcall function 00404B00: fclose.MSVCRT ref: 00404BD1
                                                • free.MSVCRT ref: 004022DD
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strcpy$fclosestrlenstrtok$clearerrfeofferrorfreadfreefwritemallocstrncpystrrchr
                                                • String ID:
                                                • API String ID: 3828028293-0
                                                • Opcode ID: 7c8148c38fa369b09270c99f24db186f6cb578f64c8fc15fa937ef474bbc09d3
                                                • Instruction ID: a4d73d656237814dcd04340808e77ce35a8a995e884b39acc9a19a7b3963f51e
                                                • Opcode Fuzzy Hash: 7c8148c38fa369b09270c99f24db186f6cb578f64c8fc15fa937ef474bbc09d3
                                                • Instruction Fuzzy Hash: 1FA114B1408701DAC710AF25C58815EFBE4BF84354F018A2FF598AB391E7B89599DF8B
                                                APIs
                                                • calloc.MSVCRT ref: 0040279F
                                                  • Part of subcall function 00402D90: GetModuleFileNameW.KERNEL32(00000000,004027CE), ref: 00402DB4
                                                  • Part of subcall function 00402E40: strcpy.MSVCRT(004027E1), ref: 00402E53
                                                  • Part of subcall function 00402E40: strlen.MSVCRT ref: 00402E5B
                                                  • Part of subcall function 00404560: GetEnvironmentVariableW.KERNEL32(00000000,004027F9), ref: 0040459F
                                                  • Part of subcall function 00404680: SetEnvironmentVariableW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00409EFD), ref: 004046AE
                                                  • Part of subcall function 00404680: free.MSVCRT ref: 004046BC
                                                • SetDllDirectoryW.KERNEL32 ref: 00402892
                                                • free.MSVCRT ref: 0040289E
                                                • strcmp.MSVCRT ref: 004028AA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: EnvironmentVariablefree$DirectoryFileModuleNamecallocstrcmpstrcpystrlen
                                                • String ID: x@
                                                • API String ID: 3249012681-3504578705
                                                • Opcode ID: d486fdd31f4afe26102c53015cf556989d09d3e5a7663a3437f51184b6a64bce
                                                • Instruction ID: e104b7bf5c1657f9fcfcb026d7b3760e70e9bc9fefb3156e1469a83aead3bb76
                                                • Opcode Fuzzy Hash: d486fdd31f4afe26102c53015cf556989d09d3e5a7663a3437f51184b6a64bce
                                                • Instruction Fuzzy Hash: AF714FB19097008BD710BF65C58925EBBE4EF80744F05897EE8C4A72D1DBBC9585CB4B
                                                APIs
                                                • _PyArg_ParseTuple_SizeT.PYTHON27(?,s:test_decode_certificate,?), ref: 6CEC2BEC
                                                • PyErr_SetString.PYTHON27(028CB208,Can't malloc memory to read file), ref: 6CEC2C1E
                                                Strings
                                                • s:test_decode_certificate, xrefs: 6CEC2BE0
                                                • Can't open file, xrefs: 6CEC2C49
                                                • Error decoding PEM-encoded file, xrefs: 6CEC2C8E
                                                • Can't malloc memory to read file, xrefs: 6CEC2C18
                                                • TRUSTED CERTIFICATE, xrefs: 6CEC2C6A
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Arg_Err_ParseSizeStringTuple_
                                                • String ID: Can't malloc memory to read file$Can't open file$Error decoding PEM-encoded file$TRUSTED CERTIFICATE$s:test_decode_certificate
                                                • API String ID: 4247878537-2384835699
                                                • Opcode ID: 85a723014dfef4a62d23bb54c353892621ca3872d2b8f2d73f520a51ea91ba50
                                                • Instruction ID: f5a20d287cd1ed15874d8f91a1585e4ef6e33528e7ff7e3c34980a179ebb0305
                                                • Opcode Fuzzy Hash: 85a723014dfef4a62d23bb54c353892621ca3872d2b8f2d73f520a51ea91ba50
                                                • Instruction Fuzzy Hash: 5121EA33F0410467DB10DBA9BD459DFBB78DB8512AF24426AED08D3B01DB329A1547D7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\bio_b64.c$VUUU$ctx->buf_len <= (int)sizeof(ctx->buf)$ctx->buf_len >= ctx->buf_off$ctx->buf_off < (int)sizeof(ctx->buf)$ctx->buf_off <= (int)sizeof(ctx->buf)$ctx->tmp_len <= 3$i <= n
                                                • API String ID: 0-3721295489
                                                • Opcode ID: e5d4827558bc07b18a2d68ca3dab8efbb4a1737e5c96742748d40ba32876de22
                                                • Instruction ID: 009424f063b02daab2c287c05aa4663a3b6f46d311898ff1dcf85df56f6596e2
                                                • Opcode Fuzzy Hash: e5d4827558bc07b18a2d68ca3dab8efbb4a1737e5c96742748d40ba32876de22
                                                • Instruction Fuzzy Hash: A6F1CF717116069BEB14CF19D980696B7A1FB85308F20863EE8298BF90D731FD5ACBD1
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strlen$mallocmemsetstrcatstrncpy
                                                • String ID:
                                                • API String ID: 2372556553-0
                                                • Opcode ID: 1f05f27f7ca53c699f76451239f9410ff7a63fb7e991746bd5680e8f30aa2687
                                                • Instruction ID: 4e5b45eb7927c94f1d22b83f789647f1df1ceb98ced22de3d3d6df2cb3644ce9
                                                • Opcode Fuzzy Hash: 1f05f27f7ca53c699f76451239f9410ff7a63fb7e991746bd5680e8f30aa2687
                                                • Instruction Fuzzy Hash: AB2171B16187409FD710BF29C58932EBBE0EF84344F058C7EE889573C2C67994558B57
                                                APIs
                                                • _errno.MSVCR90 ref: 6CF80FA3
                                                • GetLastError.KERNEL32(C:\build27\cpython\externals\openssl-1.0.2t\ssl\ssl_cert.c,0000040E), ref: 6CF80FB8
                                                • FindClose.KERNEL32(?), ref: 6CF81036
                                                • free.MSVCR90 ref: 6CF8103D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: CloseErrorFindLast_errnofree
                                                • String ID: %s/%s$C:\build27\cpython\externals\openssl-1.0.2t\ssl\ssl_cert.c$N;Zn$OPENSSL_DIR_read(&ctx, '
                                                • API String ID: 1454177507-1907821825
                                                • Opcode ID: 57c67857496e3ea6c59d0bdd7eaad5180209b766bd42cd270a281354564cb073
                                                • Instruction ID: 3b6738596075ddc718be9dbbe3e7fcd7dc1d9ac1e337204bb8d59633796f7134
                                                • Opcode Fuzzy Hash: 57c67857496e3ea6c59d0bdd7eaad5180209b766bd42cd270a281354564cb073
                                                • Instruction Fuzzy Hash: 39419EB0B011449BEB008B64DD81BDE7774DB0470CF0081A8FB28BBA81DBB2DF4A8795
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: strtoul$getenvsscanfstrchr
                                                • String ID: %I64i$OPENSSL_ia32cap$gl
                                                • API String ID: 3016710027-1490722825
                                                • Opcode ID: b635b40fd4c5acef23771e6d0515d9cdaa27b43fb7697d8a2cc864155bfea77a
                                                • Instruction ID: 3a6c4d125cbb9855eaddaf3d0f7f1cee1f3add036d067f662fb1eaa787253e28
                                                • Opcode Fuzzy Hash: b635b40fd4c5acef23771e6d0515d9cdaa27b43fb7697d8a2cc864155bfea77a
                                                • Instruction Fuzzy Hash: D83138B5F04344EFEB00DBE0CC0576A7BB5EB067CCF2A00A5D905A3B40E7756646C652
                                                APIs
                                                • PyEval_RestoreThread.PYTHON27 ref: 6CEC4484
                                                • PyObject_CallFunctionObjArgs.PYTHON27(?,00000000), ref: 6CEC4497
                                                • PyErr_Format.PYTHON27(?,password cannot be longer than %d bytes,?), ref: 6CEC44DF
                                                • PyEval_SaveThread.PYTHON27 ref: 6CEC4504
                                                • PyEval_SaveThread.PYTHON27 ref: 6CEC4523
                                                • memcpy.MSVCR90(?,?,?), ref: 6CEC4537
                                                Strings
                                                • password callback must return a string, xrefs: 6CEC44A6
                                                • password cannot be longer than %d bytes, xrefs: 6CEC44D9
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Eval_Thread$Save$ArgsCallErr_FormatFunctionObject_Restorememcpy
                                                • String ID: password callback must return a string$password cannot be longer than %d bytes
                                                • API String ID: 3573400504-1265974473
                                                • Opcode ID: ca1cf761d24fb741a628c84e17031d1e5f90be9fd05d0461a917f32151fdb315
                                                • Instruction ID: 1160d84291a159cfbc452bd68e8342d20712073f766e1f2c67b5fffc1b019bed
                                                • Opcode Fuzzy Hash: ca1cf761d24fb741a628c84e17031d1e5f90be9fd05d0461a917f32151fdb315
                                                • Instruction Fuzzy Hash: AC218375B006029BD704CF64D948B96B3B8FB46329F308726E87987B40D735E955CB92
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID: $*$*$*$C:\build27\cpython\externals\openssl-1.0.2t\ssl\t1_lib.c$t
                                                • API String ID: 3510742995-3981208282
                                                • Opcode ID: 4050f6857913e1108b869dea76f1271193801c2ae73e9ee19069a7067d3f3c7a
                                                • Instruction ID: 8a5fd241a1b878b636f73f661aecff3355f66b971dad6886a7a803d07ac5a437
                                                • Opcode Fuzzy Hash: 4050f6857913e1108b869dea76f1271193801c2ae73e9ee19069a7067d3f3c7a
                                                • Instruction Fuzzy Hash: D202B370A09395DFDB11CF68E8847DDBFB1AF12308F1881A9E495AF782C7755508C7A2
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: atoi
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\ec\ec_pmeth.c$C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\pmeth_lib.c$ec_param_enc$ec_paramgen_curve$ecdh_cofactor_mode$ecdh_kdf_md$explicit$named_curve
                                                • API String ID: 657269090-145990856
                                                • Opcode ID: e0a7b486dcf881d6e4991201c3919b9c0f5e777dd1f650a7daca9c43764b67c5
                                                • Instruction ID: 7922707423fac1bc052ed48dbbd17eb8924b567ac10156b255894dfacef76c2c
                                                • Opcode Fuzzy Hash: e0a7b486dcf881d6e4991201c3919b9c0f5e777dd1f650a7daca9c43764b67c5
                                                • Instruction Fuzzy Hash: 09A1E422B4927126E7006E398C91BA637769B4275CF2963A8DDADDFAD1E713C90583C0
                                                APIs
                                                  • Part of subcall function 00402E70: _wfopen.MSVCRT ref: 00402EBD
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 004049FC
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 00404A0F
                                                  • Part of subcall function 004049D0: strtok.MSVCRT(?,?,00000000), ref: 00404A1F
                                                  • Part of subcall function 004049D0: strcpy.MSVCRT(?,?,00000000), ref: 00404A73
                                                  • Part of subcall function 004049D0: strtok.MSVCRT(?,?,00000000), ref: 00404A87
                                                  • Part of subcall function 004049D0: _mkdir.MSVCRT ref: 00404AA5
                                                • feof.MSVCRT ref: 00404B63
                                                • fread.MSVCRT ref: 00404B87
                                                • fwrite.MSVCRT ref: 00404BA8
                                                • ferror.MSVCRT ref: 00404BB0
                                                • clearerr.MSVCRT(?,?,?,00402048), ref: 00404BC1
                                                • fclose.MSVCRT ref: 00404BC9
                                                • fclose.MSVCRT ref: 00404BD1
                                                • ferror.MSVCRT ref: 00404BE5
                                                • clearerr.MSVCRT(?,?,?,00402048), ref: 00404BFA
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strcpy$clearerrfcloseferrorstrtok$_mkdir_wfopenfeoffreadfwrite
                                                • String ID:
                                                • API String ID: 1950404359-0
                                                • Opcode ID: 7e0219a60a49a5dd7f3ffa8bcdbafe2af77f66fe998823d77456da3f0b2ce4b5
                                                • Instruction ID: 26d6a4cf61ebdb6355e6ceb81002ce2c87545b0f6dcfc6701eb30fc9d8599a57
                                                • Opcode Fuzzy Hash: 7e0219a60a49a5dd7f3ffa8bcdbafe2af77f66fe998823d77456da3f0b2ce4b5
                                                • Instruction Fuzzy Hash: FD21FFB15087409BD310BF36848525FB7E4AF84364F068A3EE9D4A73C1D77C98958B4B
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: setbuf$_fileno_setmodefflush
                                                • String ID:
                                                • API String ID: 1650367497-0
                                                • Opcode ID: 89f21892b56f0ebe04f8f4ab3193396831d21f4360e53e8cf01e6c508885f887
                                                • Instruction ID: cc43520b513ba5077f312cde79b293d2698d7df8d1e11f86a6c566b79f11c99e
                                                • Opcode Fuzzy Hash: 89f21892b56f0ebe04f8f4ab3193396831d21f4360e53e8cf01e6c508885f887
                                                • Instruction Fuzzy Hash: EB1166F66047048BD710AF75E88565AB7E0BB44309F428C3EF8D89B352D638D8598B4A
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: __iob_funcfprintfmemmove
                                                • String ID: %s:%d: rec->data != rec->input$C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_lib.c$C:\build27\cpython\externals\openssl-1.0.2t\ssl\t1_enc.c$n >= 0
                                                • API String ID: 654915848-3493170495
                                                • Opcode ID: 107a1c8b66efc64f5f3195a79e4e77bf2b46cc577456cf07379cbdc23aee369e
                                                • Instruction ID: 261ce3f9a130a2260b3af57a0687fc0d1106239fd025e5db7bd3cd687cce0cbe
                                                • Opcode Fuzzy Hash: 107a1c8b66efc64f5f3195a79e4e77bf2b46cc577456cf07379cbdc23aee369e
                                                • Instruction Fuzzy Hash: AED1B2317093819FEB14CF29C48075AB7F1EF89318F14896DE85A8BB91D7B1E845CB92
                                                Strings
                                                • len <= SSL3_RT_MAX_PLAIN_LENGTH, xrefs: 6CF8E774
                                                • s->d1->mtu >= dtls1_min_mtu(s), xrefs: 6CF8E788
                                                • s->init_num == (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH, xrefs: 6CF8E435
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\d1_pkt.c, xrefs: 6CF8E77E
                                                • len == (unsigned int)ret, xrefs: 6CF8E760
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\d1_both.c, xrefs: 6CF8E43F, 6CF8E76A, 6CF8E792, 6CF8E889
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\d1_both.c$C:\build27\cpython\externals\openssl-1.0.2t\ssl\d1_pkt.c$len <= SSL3_RT_MAX_PLAIN_LENGTH$len == (unsigned int)ret$s->d1->mtu >= dtls1_min_mtu(s)$s->init_num == (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH
                                                • API String ID: 0-2834953434
                                                • Opcode ID: d93db4933272c71a140b3066c45409f8d511d58d97663efb9ac0505df0af726e
                                                • Instruction ID: 8661d7072d81568c8aff0a83518a978238c1af616afecc8493b67bb742a1e00e
                                                • Opcode Fuzzy Hash: d93db4933272c71a140b3066c45409f8d511d58d97663efb9ac0505df0af726e
                                                • Instruction Fuzzy Hash: 22020835706206DFD710CF69C884B99BBB1FF45318F2881AAD9588BB82D371E855CBD1
                                                APIs
                                                Strings
                                                • failure in sk_push, xrefs: 6CFA0983
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\txt_db\txt_db.c, xrefs: 6CFA0906
                                                • OPENSSL_malloc failure, xrefs: 6CFA0A01
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: __iob_funcfprintf$memset
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\txt_db\txt_db.c$OPENSSL_malloc failure$failure in sk_push
                                                • API String ID: 886766458-1988972625
                                                • Opcode ID: 29b91dbc3fa678ddc031c1ece00b2e0592fbaecf96fa70e235469ec471a10417
                                                • Instruction ID: 97aac304fabf554055ec2a8c337c8fb30d7d6a0471d1fd7fc91dfa6c96cf6fbe
                                                • Opcode Fuzzy Hash: 29b91dbc3fa678ddc031c1ece00b2e0592fbaecf96fa70e235469ec471a10417
                                                • Instruction Fuzzy Hash: A451F571E04285CFEB04CFA5D88479EFBB0AF09308F29419DC856A7702DBB1E906CB95
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: strncmpstrtoul
                                                • String ID: MASK:$default$nombstr$pkix$utf8only
                                                • API String ID: 3007069910-3483942737
                                                • Opcode ID: b9625521aa3b3c5871f4fd78f3b2db3e6753d2c7a5142439e6107817c65a401d
                                                • Instruction ID: 53a0e1943ace75275eadeeaa8107c420067261c511deae5827b44e4df6b4c8f0
                                                • Opcode Fuzzy Hash: b9625521aa3b3c5871f4fd78f3b2db3e6753d2c7a5142439e6107817c65a401d
                                                • Instruction Fuzzy Hash: C441A32161C1841AC7214F3A5C927A23BB79B1736CF6C0796E9B8CFB91E713C90AC391
                                                APIs
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\e_aes.c, xrefs: 6CF26648, 6CF2693C
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\e_aes.c
                                                • API String ID: 3510742995-2525042098
                                                • Opcode ID: 4f196298d92239470c0378332cf59b1641a045551f1f13706411697ba4ffd88b
                                                • Instruction ID: c082ae92d2ce38a7d96486caf7c2f814acdce17f71d18e76bc5334425782e31e
                                                • Opcode Fuzzy Hash: 4f196298d92239470c0378332cf59b1641a045551f1f13706411697ba4ffd88b
                                                • Instruction Fuzzy Hash: E1B190717056069BDB04CEB8E884B95F7A4FB84229F2443AAE82CCB740D735A865CBD1
                                                APIs
                                                • PyUnicodeUCS2_FromObject.PYTHON27(?), ref: 6CEC4EAD
                                                • PyUnicodeUCS2_AsEncodedString.PYTHON27(00000000,?,00000000), ref: 6CEC4EC8
                                                • PyErr_SetFromErrnoWithFilenameObject.PYTHON27(?,?), ref: 6CEC4F1B
                                                • _errno.MSVCR90 ref: 6CEC4F2D
                                                • PyEval_SaveThread.PYTHON27 ref: 6CEC4F49
                                                  • Part of subcall function 6CEC10E0: _Py_BuildValue_SizeT.PYTHON27(6CFC4B68,00000000,00000000,?,?,00000000,?,?,6CEC219D,028CB208,00000000,00000000,0000041F), ref: 6CEC1107
                                                  • Part of subcall function 6CEC10E0: PyDict_GetItem.PYTHON27(028C78A0,00000000,00000000,00000000,0000041F), ref: 6CEC1122
                                                  • Part of subcall function 6CEC10E0: PyErr_Clear.PYTHON27 ref: 6CEC1145
                                                  • Part of subcall function 6CEC10E0: PyLong_FromLong.PYTHON27(00000000), ref: 6CEC114C
                                                  • Part of subcall function 6CEC10E0: PyDict_GetItem.PYTHON27(028C7D20,00000000), ref: 6CEC1167
                                                  • Part of subcall function 6CEC10E0: PyErr_Clear.PYTHON27 ref: 6CEC1187
                                                  • Part of subcall function 6CEC10E0: PyUnicodeUCS2_FromFormat.PYTHON27([%S: %S] %s (_ssl.c:%d),00000000,0000041F,00000000,6CEC219D,?,?,00000000,?,?,6CEC219D), ref: 6CEC11C5
                                                  • Part of subcall function 6CEC10E0: _Py_BuildValue_SizeT.PYTHON27(6CFC4BB8,00000000,00000000,00000000,00000000,0000041F), ref: 6CEC120F
                                                  • Part of subcall function 6CEC10E0: PyObject_CallObject.PYTHON27(?,00000000), ref: 6CEC1227
                                                • PyEval_RestoreThread.PYTHON27(00000000), ref: 6CEC4F87
                                                • _errno.MSVCR90 ref: 6CEC4F94
                                                • PyErr_SetFromErrnoWithFilenameObject.PYTHON27(?,?), ref: 6CEC4FB0
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: From$Err_Object$Unicode$BuildClearDict_ErrnoEval_FilenameItemSizeThreadValue_With_errno$CallEncodedFormatLongLong_Object_RestoreSaveString
                                                • String ID:
                                                • API String ID: 921413074-0
                                                • Opcode ID: 67ee5921a6b8606d507b09179f64609a5f3865d89ecf736304adc8cd55ca0642
                                                • Instruction ID: 39b4f902b1617e0028c7e20d8a13bfd9afab0ecff3f6f9a54956f10a25921799
                                                • Opcode Fuzzy Hash: 67ee5921a6b8606d507b09179f64609a5f3865d89ecf736304adc8cd55ca0642
                                                • Instruction Fuzzy Hash: A4511971B002009FD704DFA4DD86B6B7379EB85329F314259E9258B741DB36E905CB92
                                                APIs
                                                • GetTempPathW.KERNEL32(?,00000000,00000000,?,004047C2), ref: 004046F6
                                                  • Part of subcall function 00405070: WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,004051C2), ref: 004050B9
                                                • _getpid.MSVCRT ref: 0040471C
                                                • sprintf.MSVCRT ref: 00404730
                                                • _tempnam.MSVCRT ref: 0040473C
                                                • _mkdir.MSVCRT ref: 00404747
                                                • free.MSVCRT ref: 00404753
                                                • strcpy.MSVCRT ref: 00404777
                                                • free.MSVCRT ref: 0040477F
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: free$ByteCharMultiPathTempWide_getpid_mkdir_tempnamsprintfstrcpy
                                                • String ID:
                                                • API String ID: 4026032204-0
                                                • Opcode ID: bfb661e26455249228b8b0a51985220d4e7b1b1ba0b227356fb7795986ffe2f5
                                                • Instruction ID: 8af45b2eb4d8999d0f30d607f7cb0d6f007660f1bfc7651df242240114390b61
                                                • Opcode Fuzzy Hash: bfb661e26455249228b8b0a51985220d4e7b1b1ba0b227356fb7795986ffe2f5
                                                • Instruction Fuzzy Hash: 07113AB25083009BD311BF65D58925EBBE4EF84354F01883FF9C8A3282D7798459CB97
                                                APIs
                                                • PyErr_SetString.PYTHON27(?,Empty certificate data), ref: 6CEC48D5
                                                • PyErr_SetString.PYTHON27(?,Certificate data is too long.), ref: 6CEC48FD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Err_String
                                                • String ID: CERTIFICATE$Can't allocate buffer$Certificate data is too long.$Empty certificate data
                                                • API String ID: 1450464846-1470385116
                                                • Opcode ID: 1b32d1aba1668f85573705b5e5d2ba0e015aceefec5f09fe7fecb915c277ef52
                                                • Instruction ID: 608f2f0a369ff2369162a8e3718894ec170a4fefab4bc6e17dc38a2a32f88d9c
                                                • Opcode Fuzzy Hash: 1b32d1aba1668f85573705b5e5d2ba0e015aceefec5f09fe7fecb915c277ef52
                                                • Instruction Fuzzy Hash: EB51D433B046015BC7109AA99981B6FB3B5DBC427CF38472EF92887B80EB35D8458697
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: strncmp
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\pem\pem_lib.c$DEK-Info: $ENCRYPTED$Proc-Type:
                                                • API String ID: 1114863663-1788503653
                                                • Opcode ID: fc51348d01d2f25f0b644a39f7f77960c0c01efaae39b1cb7fab01faf546eaf0
                                                • Instruction ID: 3f8171a9797e116ead4773e2233e50011f637f86af4f8ea5f8a7ccb4505e349b
                                                • Opcode Fuzzy Hash: fc51348d01d2f25f0b644a39f7f77960c0c01efaae39b1cb7fab01faf546eaf0
                                                • Instruction Fuzzy Hash: 81415A727892992EF7108E69AC01BD5B7A4D7847ACF340437ED8CCBB81EA6795068394
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: isspace$isalnumisdigit
                                                • String ID:
                                                • API String ID: 2198966314-0
                                                • Opcode ID: 1b6f7ea116eba00357383984092ac0cdbb4488411dc0f9460423a801f717609d
                                                • Instruction ID: 0d49bedc401d7e190ff75dd5755958f96fffdfb017a8cbc0e751965ded6bedb2
                                                • Opcode Fuzzy Hash: 1b6f7ea116eba00357383984092ac0cdbb4488411dc0f9460423a801f717609d
                                                • Instruction Fuzzy Hash: FE4106E0E483A95AEB218B358E847977BB49F0230CF2841E5DCB946742F635DA54CB93
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: strstr$sprintf
                                                • String ID: %s.dll$C:\build27\cpython\externals\openssl-1.0.2t\crypto\dso\dso_win32.c
                                                • API String ID: 1893147179-298671333
                                                • Opcode ID: 86914afcfc62f17d4df0f58e9aa870f09c739a517aa5c23f5000fca7aac5172f
                                                • Instruction ID: ad3de79486f5774722f736ff406fbdab383edb8351f779bad173429ea4313414
                                                • Opcode Fuzzy Hash: 86914afcfc62f17d4df0f58e9aa870f09c739a517aa5c23f5000fca7aac5172f
                                                • Instruction Fuzzy Hash: DC21D832B052146BDB00DA699C09BDA7378DF46319F1A41B5FD08EBB00E677AF1987D1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: isspacestrncmp
                                                • String ID: ASN1:$DER:
                                                • API String ID: 1160233906-1445514312
                                                • Opcode ID: 2ae188263acf7e899d559d9b3ce496afd3bc3c13e7c08caf550f482714ebda9c
                                                • Instruction ID: a3decf515267b884fcc121268a88133747b7cd8db4bea9ca78049ed048513bd1
                                                • Opcode Fuzzy Hash: 2ae188263acf7e899d559d9b3ce496afd3bc3c13e7c08caf550f482714ebda9c
                                                • Instruction Fuzzy Hash: 32112B317082245FD3019E299C55BD737BDDF4235CB2A4161EC58CBB11F623E509C6E1
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: setlocale$free$_strdupmalloc
                                                • String ID:
                                                • API String ID: 622151147-0
                                                • Opcode ID: fe528c372a3c8d173d729cf9cb558beef77a9bc97ea738a27b0864ff348611af
                                                • Instruction ID: 68c60b90b3b600dc1113df833d63427205b546dfef12d4db0e67074f200f9145
                                                • Opcode Fuzzy Hash: fe528c372a3c8d173d729cf9cb558beef77a9bc97ea738a27b0864ff348611af
                                                • Instruction Fuzzy Hash: 8021F6B19083018FD700BF65D54532EBFE4AF84359F058C3EE9C8A7291E37D99558B8A
                                                APIs
                                                • strcpy.MSVCRT(00000000,00000000,?,00000000,00402A75), ref: 00404825
                                                • strlen.MSVCRT ref: 0040482D
                                                • _findfirst.MSVCRT(00000000,00000000,?,00000000,00402A75), ref: 00404869
                                                • _findnext.MSVCRT ref: 004048C7
                                                • _findclose.MSVCRT ref: 004048DB
                                                • _rmdir.MSVCRT ref: 004048EB
                                                • strlen.MSVCRT ref: 00404917
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strlen$_findclose_findfirst_findnext_rmdirstrcpy
                                                • String ID:
                                                • API String ID: 3562715594-0
                                                • Opcode ID: 2dbbbe8cf3e2b3a7e0de0e1cce5bdd052717f65bdb620466f24c1fb4e7b5b20e
                                                • Instruction ID: a9f9e793eeeb33f534e218ca316462fb85fcee30f47b237a2dfaca896a0b628e
                                                • Opcode Fuzzy Hash: 2dbbbe8cf3e2b3a7e0de0e1cce5bdd052717f65bdb620466f24c1fb4e7b5b20e
                                                • Instruction Fuzzy Hash: D5216BB56087448BC720BF3AD48469FB7E5FF85310F50893EE588D3381DA3998558B8B
                                                APIs
                                                • _PyArg_ParseTuple_SizeT.PYTHON27(?,|O:peer_certificate,?), ref: 6CEC2CF9
                                                • PyErr_SetString.PYTHON27(?,handshake not done yet), ref: 6CEC2D21
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Arg_Err_ParseSizeStringTuple_
                                                • String ID: handshake not done yet$|O:peer_certificate
                                                • API String ID: 4247878537-4228739425
                                                • Opcode ID: 01add861bb238b31728277b8138ce83b2eb058a92955ef8782353143e38a975c
                                                • Instruction ID: 25477d7b0d6647a98e1e94c68a9a4b4104cd734f14d7d862ca656ae7ecfe7cb0
                                                • Opcode Fuzzy Hash: 01add861bb238b31728277b8138ce83b2eb058a92955ef8782353143e38a975c
                                                • Instruction Fuzzy Hash: C211E730B142089BDB10CF68D908BE677F8EB56319F14169EEC0D83B11D732AA54C7C2
                                                APIs
                                                  • Part of subcall function 6CEDCC70: GetStdHandle.KERNEL32(000000F4,?), ref: 6CEDCC86
                                                  • Part of subcall function 6CEDCC70: GetFileType.KERNEL32(00000000), ref: 6CEDCC93
                                                  • Part of subcall function 6CEDCC70: _vsnprintf.MSVCR90 ref: 6CEDCCB1
                                                  • Part of subcall function 6CEDCC70: WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 6CEDCCD5
                                                • raise.MSVCR90 ref: 6CEDCDAF
                                                • _exit.MSVCR90 ref: 6CEDCDBA
                                                • __iob_func.MSVCR90 ref: 6CEDCDD0
                                                Strings
                                                • pointer != NULL, xrefs: 6CEDCDA0
                                                • %s(%d): OpenSSL internal error, assertion failed: %s, xrefs: 6CEDCDA3
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\cryptlib.c, xrefs: 6CEDCDA2
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: File$HandleTypeWrite__iob_func_exit_vsnprintfraise
                                                • String ID: %s(%d): OpenSSL internal error, assertion failed: %s$C:\build27\cpython\externals\openssl-1.0.2t\crypto\cryptlib.c$pointer != NULL
                                                • API String ID: 4116638147-424108656
                                                • Opcode ID: 8bb15c07579166b745d7b9c83636e011bd25071c4d48e87fb7c1e4ae7f4b63d8
                                                • Instruction ID: fc30d99c809e164ad26c2a580f855d41cea5b7df1caaa164abbdd10b4f0905ac
                                                • Opcode Fuzzy Hash: 8bb15c07579166b745d7b9c83636e011bd25071c4d48e87fb7c1e4ae7f4b63d8
                                                • Instruction Fuzzy Hash: A6C012F0B101067FFA4427648C1EF3B3538EB42705F426408F30285581C9521A118579
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\dso\dso_win32.c
                                                • API String ID: 0-1432767543
                                                • Opcode ID: edb3f9e48338dc1832159277de928a03bce90058eebfa4a7e21e2e5d0e2e4bc8
                                                • Instruction ID: bd5f13cb057c3a3a9c9ac915b3eb86f97392e53e638d619b74165c4fbc70aa9f
                                                • Opcode Fuzzy Hash: edb3f9e48338dc1832159277de928a03bce90058eebfa4a7e21e2e5d0e2e4bc8
                                                • Instruction Fuzzy Hash: 5F918F71B00205AFDB04CF69D885B9A77B0FB48308F248269E908CBB45E771E996CBD1
                                                APIs
                                                • memcpy.MSVCR90(00000000,00000000,6CEC14B5,00000000,?,00000000,?,?,6CED753B,00000000,00000000), ref: 6CEE85E2
                                                • memcpy.MSVCR90(00000000,00000000,00000002,00000000,?,00000000,?,?,6CED753B,00000000,00000000), ref: 6CEE8643
                                                • memcpy.MSVCR90(00000000,?,00000002,00000000,?,00000000,?,?,6CED753B,00000000,00000000), ref: 6CEE8689
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID: ;ul$;ul$C:\build27\cpython\externals\openssl-1.0.2t\crypto\objects\obj_lib.c
                                                • API String ID: 3510742995-1877206298
                                                • Opcode ID: dea0525fcbb34da12e472a0cc9359848f392cf5724af39ada5a2e548f9e451d0
                                                • Instruction ID: c11007a52497bcfd113d4c22131c270fc6c991912a56a3e4b78e5cbb0a9a3909
                                                • Opcode Fuzzy Hash: dea0525fcbb34da12e472a0cc9359848f392cf5724af39ada5a2e548f9e451d0
                                                • Instruction Fuzzy Hash: EE51A572A002059BDB10DF5DD840A9AB7B5EF8925CF3585AEDC189BB01E771ED05CBC0
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: isdigit
                                                • String ID: :l$*$*
                                                • API String ID: 2326231117-3791800508
                                                • Opcode ID: 441c63f8a5c81aaa7c420d9394ddbffea7a51918d2dfd068417717b1cd7dbe9d
                                                • Instruction ID: bb60ed51218b32500f5da7ce55a31579d5e5acb3c69d3bcbed83510fe85f9128
                                                • Opcode Fuzzy Hash: 441c63f8a5c81aaa7c420d9394ddbffea7a51918d2dfd068417717b1cd7dbe9d
                                                • Instruction Fuzzy Hash: 72E19CB06482029FD314CF18C888A6BBBF5FB9E398F644A1DF99987760D331D941CB52
                                                APIs
                                                • _stat.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,00404ABC,?), ref: 0040A645
                                                • strlen.MSVCRT ref: 0040A6A7
                                                • malloc.MSVCRT ref: 0040A6ED
                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,00404ABC,?), ref: 0040A702
                                                • _stat.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,00404ABC,?), ref: 0040A717
                                                • free.MSVCRT ref: 0040A729
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: _stat$freemallocmemcpystrlen
                                                • String ID:
                                                • API String ID: 2821670080-0
                                                • Opcode ID: 288579020997fa0010920ee95a4426fe6108d227bef78f017b784bfb37d74e3a
                                                • Instruction ID: 2a6783eb98c8a97f91c7dab9c1c018cf784cb8e0381fd108a659056ea1bb8cf7
                                                • Opcode Fuzzy Hash: 288579020997fa0010920ee95a4426fe6108d227bef78f017b784bfb37d74e3a
                                                • Instruction Fuzzy Hash: 95516D715083458FD720DE288081767BBF1AB55354F58893BE8D8A73C1D33ED8A69B4B
                                                APIs
                                                • memset.MSVCR90 ref: 6CF28F1B
                                                • memset.MSVCR90 ref: 6CF28F36
                                                  • Part of subcall function 6CF1D400: memcpy.MSVCR90(?,?,?,?,?,?,?,?,6CEFA9C0,?), ref: 6CF1D444
                                                • memcpy.MSVCR90(?,?,?), ref: 6CF28F7F
                                                • memset.MSVCR90 ref: 6CF28FA6
                                                • memset.MSVCR90 ref: 6CF28FF6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memset$memcpy
                                                • String ID: j
                                                • API String ID: 368790112-2137352139
                                                • Opcode ID: 147fd61e64b373eadf639d8de8b66ff941f8b58b081b2f0a2d9ee6c377a576b4
                                                • Instruction ID: eac807a104faa3340fd91555184aeb068428eea295593e89debd05ed2e0bf254
                                                • Opcode Fuzzy Hash: 147fd61e64b373eadf639d8de8b66ff941f8b58b081b2f0a2d9ee6c377a576b4
                                                • Instruction Fuzzy Hash: 9751F5B2700304ABDB14CF6DD840BDEB7A5AF44308F10851DE95A9BA81DB79FA198BC1
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: signal
                                                • String ID:
                                                • API String ID: 1946981877-0
                                                • Opcode ID: 532ee5b54350ce70bdd1106a76f6d06ddd669e1cbb891edb7e2e0f643126e5aa
                                                • Instruction ID: 9d308533a8223dfef7a89781035b754c20cf20f4fabe4e2d4f00fdb0abfba49e
                                                • Opcode Fuzzy Hash: 532ee5b54350ce70bdd1106a76f6d06ddd669e1cbb891edb7e2e0f643126e5aa
                                                • Instruction Fuzzy Hash: A82153B25142009AE710BFA5C5403AF7694AB46354F12CC2BD594AB3C3C77D8C84879B
                                                APIs
                                                • strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 004049FC
                                                • strcpy.MSVCRT(?,?,00000000,0040188F,?,?,?,?,?,?,004023E6), ref: 00404A0F
                                                • strtok.MSVCRT(?,?,00000000), ref: 00404A1F
                                                • strcpy.MSVCRT(?,?,00000000), ref: 00404A73
                                                • strtok.MSVCRT(?,?,00000000), ref: 00404A87
                                                • _mkdir.MSVCRT ref: 00404AA5
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strcpy$strtok$_mkdir
                                                • String ID:
                                                • API String ID: 282790443-0
                                                • Opcode ID: 7974ecabf02546f031a8d0c50aa10801c90b2676b543c811c044bd71695961ef
                                                • Instruction ID: bc7f6ab74147c8da80bf5d81ea8fc10b92e5ddafd3e107eff54335975dc46d33
                                                • Opcode Fuzzy Hash: 7974ecabf02546f031a8d0c50aa10801c90b2676b543c811c044bd71695961ef
                                                • Instruction Fuzzy Hash: 482150B16497018BD700AF6AC58526EF7E4EF84304F45883FE6C4A7285E77C944A9B8B
                                                APIs
                                                • PyMem_Malloc.PYTHON27(000000A4,?,00000000,6CEC6807), ref: 6CEC665E
                                                • PyErr_NoMemory.PYTHON27(6CEC6807), ref: 6CEC6670
                                                • memset.MSVCR90 ref: 6CEC668C
                                                • PyThread_allocate_lock.PYTHON27(?,?,?,6CEC6807), ref: 6CEC66A0
                                                • PyThread_free_lock.PYTHON27(?,?,?,?,?,6CEC6807), ref: 6CEC6709
                                                • PyMem_Free.PYTHON27(0259DF10,?,?,?,6CEC6807), ref: 6CEC671B
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Mem_$Err_FreeMallocMemoryThread_allocate_lockThread_free_lockmemset
                                                • String ID:
                                                • API String ID: 102247521-0
                                                • Opcode ID: 0929f78c615008cbffae1ecea5f811db6ff1e6763c415cd90906250565fa1bc3
                                                • Instruction ID: 96c4c12bbdde37441ed522f6be04d902f7e5823d8f11b24059c8dd83377a375b
                                                • Opcode Fuzzy Hash: 0929f78c615008cbffae1ecea5f811db6ff1e6763c415cd90906250565fa1bc3
                                                • Instruction Fuzzy Hash: 99216DB1700311CBEF188FA5ED8A757B379EBA2318F250029D82587740D772E596CB93
                                                APIs
                                                  • Part of subcall function 004015D0: ntohl.WS2_32(?,?,00000000,?,0040235F), ref: 004015E2
                                                • PyObject_CallFunction.PYTHON27 ref: 004042BA
                                                • PyImport_ExecCodeModule.PYTHON27 ref: 004042CA
                                                • PyErr_Occurred.PYTHON27 ref: 004042D4
                                                • PyErr_Print.PYTHON27 ref: 004042DE
                                                • PyErr_Clear.PYTHON27 ref: 004042E4
                                                • free.MSVCRT ref: 004042ED
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: Err_$CallClearCodeExecFunctionImport_ModuleObject_OccurredPrintfreentohl
                                                • String ID:
                                                • API String ID: 3585998205-0
                                                • Opcode ID: 60baf2f9217d2f94e8eed3dd1223d0ee593e1622d4b4fe483cf9a75bc669b227
                                                • Instruction ID: d0628bf1265d13cb8c1340164ce23b724344fd6fb48e1b9d61b2c82ec203e44c
                                                • Opcode Fuzzy Hash: 60baf2f9217d2f94e8eed3dd1223d0ee593e1622d4b4fe483cf9a75bc669b227
                                                • Instruction Fuzzy Hash: 2311E9B1508705CFC710AF36D94425EBBE0AF84751F058A3EE999D7390DB38D841CB5A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\x509v3\v3_utl.c
                                                • API String ID: 0-4287803440
                                                • Opcode ID: 3555383d00592e2147176c81e3198b6d91d13e20df5a7218bc7f5d521a43c5d1
                                                • Instruction ID: 3ae89dd4aa2411e8265b2f31eba2acc444730800708b28a1181efa98edc0eb20
                                                • Opcode Fuzzy Hash: 3555383d00592e2147176c81e3198b6d91d13e20df5a7218bc7f5d521a43c5d1
                                                • Instruction Fuzzy Hash: F041AF32F051446FE7008A79EC75BDA77E5CB8275DF1900B9E848CB782E6239A0D93C1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: isuppertolower
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\asn1\asn_mime.c
                                                • API String ID: 2435887076-673838732
                                                • Opcode ID: f0b8a3d0ffa8f9417ac9616f0273e74bf973201aed7363b2130f41e5104469e7
                                                • Instruction ID: 89d6803cbe4e7865d7e29475891e8140925dfcc0c00af69d92a09af2d9e68e33
                                                • Opcode Fuzzy Hash: f0b8a3d0ffa8f9417ac9616f0273e74bf973201aed7363b2130f41e5104469e7
                                                • Instruction Fuzzy Hash: 9F415A72E042426BE711DF6A8C54B677FF8EB42708F280279ED55C7F41E662C50483A5
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: strerrorstrncpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\err\err.c$Operation not permitted$unknown
                                                • API String ID: 966412381-4110579380
                                                • Opcode ID: 08d1907831f86e556e6f697d18616af51fc9d4d9512e2d2a305d5fb06159720d
                                                • Instruction ID: 4fea387f7af9b8ffe7b57991ebd2186626121336218d08a1f5b4387df2cd585e
                                                • Opcode Fuzzy Hash: 08d1907831f86e556e6f697d18616af51fc9d4d9512e2d2a305d5fb06159720d
                                                • Instruction Fuzzy Hash: 6F21B730784341BBFF104B998C86F1175B5EB41B1CF290828FA68AA7C1D7F695968662
                                                APIs
                                                • _PyArg_ParseTupleAndKeywords_SizeT.PYTHON27(?,?,s|O:txt2obj,?,?,?), ref: 6CEC5E1C
                                                • PyObject_IsTrue.PYTHON27(?), ref: 6CEC5E33
                                                • PyErr_Format.PYTHON27(?,unknown object '%.100s',?), ref: 6CEC5E6B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Arg_Err_FormatKeywords_Object_ParseSizeTrueTuple
                                                • String ID: s|O:txt2obj$unknown object '%.100s'
                                                • API String ID: 9713115-1782767778
                                                • Opcode ID: 5c0d700438661f1395c183f99b1da49bdfcfbb1df9476d6d84a4e236237bd964
                                                • Instruction ID: 4a891ad97440ad01c6c9c14d3fa4c0010cb0c90928e532b8403a4acb8c0ecaa5
                                                • Opcode Fuzzy Hash: 5c0d700438661f1395c183f99b1da49bdfcfbb1df9476d6d84a4e236237bd964
                                                • Instruction Fuzzy Hash: 7F1193B1F15209ABDB00DBA8DD05AEF77B8DB85215F104569EC09D3700E7319B15A792
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strncpy$getenvstrchr
                                                • String ID: ;
                                                • API String ID: 3873711002-1661535913
                                                • Opcode ID: ce95854b577eb0fc7b5acb80eaf0a36448d1a3075479a920298e83c55b719eb2
                                                • Instruction ID: 87c5bb83796384b620ac70d2af4799a21704787c12b47bdc202f2420c99d8292
                                                • Opcode Fuzzy Hash: ce95854b577eb0fc7b5acb80eaf0a36448d1a3075479a920298e83c55b719eb2
                                                • Instruction Fuzzy Hash: B411FEB15083419BD310AF39C58829EBBE4EF84784F11882EF5C8E7281D3BD99819B47
                                                APIs
                                                • _PyArg_Parse_SizeT.PYTHON27(?,6CFC51C8,?), ref: 6CEC40D1
                                                • PyErr_SetString.PYTHON27(?,Cannot set verify_mode to CERT_NONE when check_hostname is enabled.), ref: 6CEC40FD
                                                • PyErr_SetString.PYTHON27(?,invalid value for verify_mode), ref: 6CEC4145
                                                Strings
                                                • invalid value for verify_mode, xrefs: 6CEC413F
                                                • Cannot set verify_mode to CERT_NONE when check_hostname is enabled., xrefs: 6CEC40F7
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Err_String$Arg_Parse_Size
                                                • String ID: Cannot set verify_mode to CERT_NONE when check_hostname is enabled.$invalid value for verify_mode
                                                • API String ID: 1619524773-3522815898
                                                • Opcode ID: f70172b2b4a857aaeb70328c2d7b0ee3f200ac1c53bec677f9f22936d21a140d
                                                • Instruction ID: 1884493ffb4593655f24c61d43f9c3e85686b6e04fb621722df6d4fd340bf5ec
                                                • Opcode Fuzzy Hash: f70172b2b4a857aaeb70328c2d7b0ee3f200ac1c53bec677f9f22936d21a140d
                                                • Instruction Fuzzy Hash: 2F11A170B102059BCB44CF24DC89A6A73B8EB0632DF2447A9F82DC7780EB32D954D752
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strlen$strncpystrrchr
                                                • String ID: \
                                                • API String ID: 4057206489-2967466578
                                                • Opcode ID: 3821e1f33afa086847be12ccc8347bff2b393beb44a30b85bb316eb0e4ebce14
                                                • Instruction ID: 0e2399b5ff7e40ea0bbb02d0b353f885c60a2e8f14f7b0118b964a3f0aa896c3
                                                • Opcode Fuzzy Hash: 3821e1f33afa086847be12ccc8347bff2b393beb44a30b85bb316eb0e4ebce14
                                                • Instruction Fuzzy Hash: 40F031F25087908EDB117F29998530ABFD0AF55308F0A48AEE4851B383D6B98441DB67
                                                APIs
                                                • PyErr_SetString.PYTHON27(028CB208,invalid return value from SSL_CTX_get_verify_mode), ref: 6CEC408A
                                                • PyLong_FromLong.PYTHON27(00000002), ref: 6CEC4099
                                                • PyLong_FromLong.PYTHON27(00000001), ref: 6CEC40A6
                                                • PyLong_FromLong.PYTHON27(00000000), ref: 6CEC40B3
                                                Strings
                                                • invalid return value from SSL_CTX_get_verify_mode, xrefs: 6CEC4084
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: FromLongLong_$Err_String
                                                • String ID: invalid return value from SSL_CTX_get_verify_mode
                                                • API String ID: 2389487510-2501269723
                                                • Opcode ID: 60a7df55dc1dc6dd0e5712835f6cbbf810a090a329c8b52a8ee414ce4c76d3f9
                                                • Instruction ID: c6289214169c69f414675f89f34c03f8da61f05d9b45bd490531ec9b56993739
                                                • Opcode Fuzzy Hash: 60a7df55dc1dc6dd0e5712835f6cbbf810a090a329c8b52a8ee414ce4c76d3f9
                                                • Instruction Fuzzy Hash: 57F0A7327901055BEB405BBCED0EBB63774EB4122EF144125F90D8BB42C663D664C547
                                                Strings
                                                • EVP_CIPHER_iv_length(cipher) <= 16, xrefs: 6CF54289
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\p5_crpt.c, xrefs: 6CF54293, 6CF542A7, 6CF542B8
                                                • EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp), xrefs: 6CF5429D
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\p5_crpt.c$EVP_CIPHER_iv_length(cipher) <= 16$EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)
                                                • API String ID: 0-125311407
                                                • Opcode ID: dfd2bdc1f6bd61acf5e588b263f5fa20ca7ecd95cc3d4e22ba51188cadf0f6d4
                                                • Instruction ID: efd6129478ab3101b3736ba6843b6db99b602b30078d1e7334599f11301bb4b0
                                                • Opcode Fuzzy Hash: dfd2bdc1f6bd61acf5e588b263f5fa20ca7ecd95cc3d4e22ba51188cadf0f6d4
                                                • Instruction Fuzzy Hash: 2E81A2726083419FD704CF64D880A9FB7E4BFD5308F504A1DFA9997A40EB31E929CB92
                                                APIs
                                                • memcpy.MSVCR90(00000010,?,?,00000000,?,?,?,?,6CEE07EF,?,?,00000000,?,00000000,00000000), ref: 6CF0A874
                                                • memcpy.MSVCR90(00000020,00000000,?,00000000,?,?,?,?,6CEE07EF), ref: 6CF0A8B3
                                                Strings
                                                • EVP_CIPHER_CTX_iv_length(ctx) <= (int)sizeof(ctx->iv), xrefs: 6CF0A886
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_enc.c, xrefs: 6CF0A6E3, 6CF0A728, 6CF0A78D, 6CF0A890
                                                • ctx->cipher->block_size == 1 || ctx->cipher->block_size == 8 || ctx->cipher->block_size == 16, xrefs: 6CF0A6D9
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_enc.c$EVP_CIPHER_CTX_iv_length(ctx) <= (int)sizeof(ctx->iv)$ctx->cipher->block_size == 1 || ctx->cipher->block_size == 8 || ctx->cipher->block_size == 16
                                                • API String ID: 3510742995-1378150733
                                                • Opcode ID: 83252ac324fbf83b1e8b51c5ebcaceba8245ed634f94ac5e7143ccc9a7d93fb9
                                                • Instruction ID: 2b0ca647d47bc8d83758e9a11be737fa42bfe0f0817c89b2403ba438d5280e84
                                                • Opcode Fuzzy Hash: 83252ac324fbf83b1e8b51c5ebcaceba8245ed634f94ac5e7143ccc9a7d93fb9
                                                • Instruction Fuzzy Hash: 1771AF71700606ABE704CF25C4A0BAAB3F5FF84B58F24C129E9158BB81E735E856DBD1
                                                APIs
                                                • PyList_New.PYTHON27(00000000), ref: 6CEC2311
                                                • PyList_Size.PYTHON27(00000000), ref: 6CEC234E
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: List_$Size
                                                • String ID:
                                                • API String ID: 303807810-0
                                                • Opcode ID: 27284c0cf17efb1e0218cfed243ddbccecc3f7785bd0bbcc5670956d770b79cb
                                                • Instruction ID: 6e0ecd36ff4f0525065f0ea9b2a1fb9bbc33955be2be16ddb9e4a24a4a8a521b
                                                • Opcode Fuzzy Hash: 27284c0cf17efb1e0218cfed243ddbccecc3f7785bd0bbcc5670956d770b79cb
                                                • Instruction Fuzzy Hash: 0B51E671B042028BD708CF58DA84A9AB3F4FF99318F20166DE97987740E735E906C793
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3bce34115e8590c18771822a77faf2c243882d7b456259c7085056b576e69c4c
                                                • Instruction ID: 2e81aefb67e15257b8cf49cb7e51caef7c017e0fe0c1c274bc07abe0d89e86cc
                                                • Opcode Fuzzy Hash: 3bce34115e8590c18771822a77faf2c243882d7b456259c7085056b576e69c4c
                                                • Instruction Fuzzy Hash: 214119B17047168BDB10CF6AD88066AB7B8EF43218B24456BEC65C7701E331EA17D790
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: lvl$lvl
                                                • API String ID: 0-3258107612
                                                • Opcode ID: c5625837917b9a4480d4024dd2349c0a636a6900450f2915633be6ef64e686e0
                                                • Instruction ID: b823837d38a06ab9fe3f7dd9c3810f6ea7f4d13f3342fb8c9cf39097ba360eb5
                                                • Opcode Fuzzy Hash: c5625837917b9a4480d4024dd2349c0a636a6900450f2915633be6ef64e686e0
                                                • Instruction Fuzzy Hash: 0D411A72F002099BDB14CFACE8906FFB7B5EF88614F20866EDC1597B80DB71A9049791
                                                APIs
                                                • memcpy.MSVCR90(?,6CEE0674,6CEE0674,6CEE0674,6CEE0674,?), ref: 6CF09D11
                                                • memcpy.MSVCR90(?,6CEE0674,?,6CEE0674,6CEE0674,?), ref: 6CF09D2F
                                                • memcpy.MSVCR90(?,6CEE0674,?,6CEE0674,6CEE0674,?), ref: 6CF09DBF
                                                Strings
                                                • ctx->length <= (int)sizeof(ctx->enc_data), xrefs: 6CF09DD7
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\encode.c, xrefs: 6CF09DE1
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\encode.c$ctx->length <= (int)sizeof(ctx->enc_data)
                                                • API String ID: 3510742995-2998765046
                                                • Opcode ID: 4f4337b7686c8dcd07afdcc48f946ba7c8d58083642ebc818daed8dcda146c01
                                                • Instruction ID: 50002692dab2f8debdaab14815a0b5cbeae208f9f8c1f59786d119f5be3ab5f6
                                                • Opcode Fuzzy Hash: 4f4337b7686c8dcd07afdcc48f946ba7c8d58083642ebc818daed8dcda146c01
                                                • Instruction Fuzzy Hash: B931A2B1701206EFCB04CF68D590B99B7E5EF44318F20826DE8698BB40EB75AA14CBD1
                                                APIs
                                                • GetSystemTimeAsFileTime.KERNEL32 ref: 00409F48
                                                • GetCurrentProcessId.KERNEL32 ref: 00409F59
                                                • GetCurrentThreadId.KERNEL32 ref: 00409F61
                                                • GetTickCount.KERNEL32 ref: 00409F6A
                                                • QueryPerformanceCounter.KERNEL32 ref: 00409F79
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                • String ID:
                                                • API String ID: 1445889803-0
                                                • Opcode ID: bf07b027104416ae5e153ab52a2392b0606540b33cc6aaa1f377dc49a5b247e6
                                                • Instruction ID: 753706d0f2432ae2e52699c1b63fcbad426ce9513c65138fb8e1d97fcb4c84e2
                                                • Opcode Fuzzy Hash: bf07b027104416ae5e153ab52a2392b0606540b33cc6aaa1f377dc49a5b247e6
                                                • Instruction Fuzzy Hash: 5B11167AD012188BCF10AFA8E9482CEFBB4FB0C664F454176E915F7210DB3569198BD9
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: _findclose_findfirst_findnext_rmdirstrlen
                                                • String ID:
                                                • API String ID: 4076562980-0
                                                • Opcode ID: 5db3324efa8d5a59e1ac116cce6dfcb7576e815c89ee10725f153e3bacf499f5
                                                • Instruction ID: 2720cdc07daff6db77de306d3cf3bc652a8836d630f878814009698f8ee34e24
                                                • Opcode Fuzzy Hash: 5db3324efa8d5a59e1ac116cce6dfcb7576e815c89ee10725f153e3bacf499f5
                                                • Instruction Fuzzy Hash: B4115BB96087408BC720AF39D48819EB7E1FF84310F108D3EE588D3381DA3998558B4A
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: _time64abortmemcpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\ssl_sess.c
                                                • API String ID: 2708634623-1237407967
                                                • Opcode ID: 74ac41fbf3fc4746f28d7c9144fea4d7778058722f34c035d028eedb92a8a4e6
                                                • Instruction ID: f6c2938e949f41d561f84bf9018bf1dea550e75b2708f896fb24e70867abfda1
                                                • Opcode Fuzzy Hash: 74ac41fbf3fc4746f28d7c9144fea4d7778058722f34c035d028eedb92a8a4e6
                                                • Instruction Fuzzy Hash: EBB10331F042199FEB25CB68E880BD9B7B0FF05318F1442ABD55997681D770AA85CFE2
                                                APIs
                                                • LoadLibraryA.KERNEL32(00000000), ref: 6CF65D70
                                                • FreeLibrary.KERNEL32(?), ref: 6CF65E76
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Library$FreeLoad
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\dso\dso_win32.c$filename(
                                                • API String ID: 534179979-1283850309
                                                • Opcode ID: aa8d396802cceca4fb9b70702f6915c333ae211d4bcee5183ac929c601e3adcb
                                                • Instruction ID: 351ee5c103051f0dde20ea44811a3f763d6b558b01973baf7b451a40e958598c
                                                • Opcode Fuzzy Hash: aa8d396802cceca4fb9b70702f6915c333ae211d4bcee5183ac929c601e3adcb
                                                • Instruction Fuzzy Hash: E7411535B842056BEB00DB99DC85BCB37B4EB55715F140025ED18FBB81EB72EA0683D2
                                                APIs
                                                Strings
                                                • /usr/local/ssl/cert.pem, xrefs: 6CF9E574
                                                • SSL_CERT_FILE, xrefs: 6CF9E556
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\x509\by_file.c, xrefs: 6CF9E58F
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: getenv
                                                • String ID: /usr/local/ssl/cert.pem$C:\build27\cpython\externals\openssl-1.0.2t\crypto\x509\by_file.c$SSL_CERT_FILE
                                                • API String ID: 498649692-3976001
                                                • Opcode ID: b6324719b0201222234170e7efa7b0a40cdda6a71e4c4db2f9af66cf86174517
                                                • Instruction ID: fbc1e1b79638c28dc689aa89a61cdbe151fcaa0720e92e0327d42ed13defb53b
                                                • Opcode Fuzzy Hash: b6324719b0201222234170e7efa7b0a40cdda6a71e4c4db2f9af66cf86174517
                                                • Instruction Fuzzy Hash: ED11DF71B50119ABDF10CEB4EC40DAA37A4BF44758F044A24F90ECBB80F621E918C7D1
                                                APIs
                                                • PyErr_Format.PYTHON27(?,Unknown object), ref: 6CEC5D8A
                                                • _Py_BuildValue_SizeT.PYTHON27(issN,00000000,?,?,00000000), ref: 6CEC5DCB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: BuildErr_FormatSizeValue_
                                                • String ID: Unknown object$issN
                                                • API String ID: 3112613300-847857892
                                                • Opcode ID: 124fd42cbe8fbafff1e813a60e8a4b8732672487a6f4f65df2012839c53ae262
                                                • Instruction ID: f67bf81330190407b62ccf50af840939cafe92ed0bb163372cfa15621a692d58
                                                • Opcode Fuzzy Hash: 124fd42cbe8fbafff1e813a60e8a4b8732672487a6f4f65df2012839c53ae262
                                                • Instruction Fuzzy Hash: FDF0F472B142116BD210EB69AC489AB77B8DB81269F100A79FD18C7700EB22CD1883E7
                                                APIs
                                                • fread.MSVCR90 ref: 6CED5C91
                                                • ferror.MSVCR90 ref: 6CED5C9D
                                                • GetLastError.KERNEL32(C:\build27\cpython\externals\openssl-1.0.2t\crypto\bio\bss_file.c,000000FF), ref: 6CED5CB4
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\bio\bss_file.c, xrefs: 6CED5CAF, 6CED5CCB
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: ErrorLastferrorfread
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\bio\bss_file.c
                                                • API String ID: 2845062543-3627588700
                                                • Opcode ID: 1bf425ffaf84e33cb103da13221b2fa2ddb29eeeae9d7a8cf9bc3a90a4cfc269
                                                • Instruction ID: 619f7a426799a691a3a172be5c387fc131506e4f24720b9218d1e398f862719c
                                                • Opcode Fuzzy Hash: 1bf425ffaf84e33cb103da13221b2fa2ddb29eeeae9d7a8cf9bc3a90a4cfc269
                                                • Instruction Fuzzy Hash: 9301F97175020467EB1056B9DC09F7B33B9FF88724F26442AFE59CBBC1DA62E90087A0
                                                APIs
                                                Strings
                                                • /usr/local/ssl/certs, xrefs: 6CF9EA81
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\x509\by_dir.c, xrefs: 6CF9EA99
                                                • SSL_CERT_DIR, xrefs: 6CF9EA6C
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: getenv
                                                • String ID: /usr/local/ssl/certs$C:\build27\cpython\externals\openssl-1.0.2t\crypto\x509\by_dir.c$SSL_CERT_DIR
                                                • API String ID: 498649692-2629981564
                                                • Opcode ID: c26c2234a8c3fbf4ef339ffbd68c52d876d3852dc69ea44607e0d3da2232e532
                                                • Instruction ID: d3dbf969d14d22bef585098e504ccecd9084c75cae0e401e8bf17481dd067919
                                                • Opcode Fuzzy Hash: c26c2234a8c3fbf4ef339ffbd68c52d876d3852dc69ea44607e0d3da2232e532
                                                • Instruction Fuzzy Hash: 2DF028317401155BEF14CAA8AC419C6B3A9BF05729F090925FD49DBB80E722EA1587D2
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: isspace$strncmp
                                                • String ID: critical,
                                                • API String ID: 1236840406-3963346253
                                                • Opcode ID: b3dca62362adf3b7c039acd94e60b32292b7a6e66309c963af61269dcdae9b4a
                                                • Instruction ID: ec92b1196479407811d6be6721c113c30282e8c7f2faac141e4766adcccd6c71
                                                • Opcode Fuzzy Hash: b3dca62362adf3b7c039acd94e60b32292b7a6e66309c963af61269dcdae9b4a
                                                • Instruction Fuzzy Hash: 17F024717086312BDB00272E6C257873BFCDF8230CB2A0861ECA5CBA16F563D602C6E1
                                                APIs
                                                • _PyArg_Parse_SizeT.PYTHON27(?,6CFC523C,?), ref: 6CEC42D1
                                                • PyObject_IsTrue.PYTHON27(?), ref: 6CEC42E2
                                                • PyErr_SetString.PYTHON27(?,check_hostname needs a SSL context with either CERT_OPTIONAL or CERT_REQUIRED), ref: 6CEC430D
                                                Strings
                                                • check_hostname needs a SSL context with either CERT_OPTIONAL or CERT_REQUIRED, xrefs: 6CEC4307
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Arg_Err_Object_Parse_SizeStringTrue
                                                • String ID: check_hostname needs a SSL context with either CERT_OPTIONAL or CERT_REQUIRED
                                                • API String ID: 3476433147-3746664152
                                                • Opcode ID: 454fbfbcf143f75e66bc8ac66d878c68504d528078c86270fbd8e48cbb8ea6c5
                                                • Instruction ID: 45ec8385516f9ffdd1debce0b052ce832ca76f023c1ba8bcc6cce762460e3db2
                                                • Opcode Fuzzy Hash: 454fbfbcf143f75e66bc8ac66d878c68504d528078c86270fbd8e48cbb8ea6c5
                                                • Instruction Fuzzy Hash: 02F04470B10108DBDB04CB64D944B6B77B9EB8131DF2447A9F82D87641E732EA55CB92
                                                APIs
                                                • GetSystemTime.KERNEL32(?,00000000,?,?,?,?,?,?,6CF8FD78,?,?,?,?), ref: 6CF966FF
                                                • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,6CF8FD78,?,?,?,?), ref: 6CF9670F
                                                • __aulldvrm.LIBCMT ref: 6CF96731
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Time$System$File__aulldvrm
                                                • String ID: gfff
                                                • API String ID: 239608527-1553575800
                                                • Opcode ID: 0a821d06eb931c6f779b42ae510a7c1fd99f3b2416339a64a184daf2c1ea8b93
                                                • Instruction ID: 51af86ec8d8d693745e0b8dfb4eaf9e02f4023eebe93d6d42d3d1b35293e18ac
                                                • Opcode Fuzzy Hash: 0a821d06eb931c6f779b42ae510a7c1fd99f3b2416339a64a184daf2c1ea8b93
                                                • Instruction Fuzzy Hash: 5FF0C2B2A043056BC308DF69EC49A5BB7E8EB88214F04CA1EF599C7680E630E104CB52
                                                APIs
                                                • _PyArg_ParseTuple_SizeT.PYTHON27(?,s:set_ciphers,?), ref: 6CEC3D51
                                                • PyErr_SetString.PYTHON27(028CB208,No cipher can be selected.), ref: 6CEC3D81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Arg_Err_ParseSizeStringTuple_
                                                • String ID: No cipher can be selected.$s:set_ciphers
                                                • API String ID: 4247878537-2686373895
                                                • Opcode ID: 328161d52a480ff30999bbe8c08cd71d221c99d78fedb6f3c6dd5d2d5068a7e5
                                                • Instruction ID: d50dd07b24743fb6d3836babed5f3400fd70ba3368f713f9c643d59471f53de0
                                                • Opcode Fuzzy Hash: 328161d52a480ff30999bbe8c08cd71d221c99d78fedb6f3c6dd5d2d5068a7e5
                                                • Instruction Fuzzy Hash: 72F05434710109ABDB44DF64DD48A9B37B8DB0621DB144299FD09C7711DB33EE10DB96
                                                APIs
                                                • PyErr_Format.PYTHON27(?,RAND_egd() expected string, found %s,?), ref: 6CEC5C54
                                                • PyErr_SetString.PYTHON27(028CB208,EGD connection failed or EGD did not return enough data to seed the PRNG), ref: 6CEC5C6B
                                                Strings
                                                • EGD connection failed or EGD did not return enough data to seed the PRNG, xrefs: 6CEC5C65
                                                • RAND_egd() expected string, found %s, xrefs: 6CEC5C4E
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Err_$FormatString
                                                • String ID: EGD connection failed or EGD did not return enough data to seed the PRNG$RAND_egd() expected string, found %s
                                                • API String ID: 4212644371-2904210411
                                                • Opcode ID: fee9f0591d09e8824d253cb052125b47879c2e7a346f2f5da5fc42cf8b8ecaf4
                                                • Instruction ID: bc0fe3bb48523ff54ff77715d067ddd01a9f71c90f92ac713bd3da7b902b81eb
                                                • Opcode Fuzzy Hash: fee9f0591d09e8824d253cb052125b47879c2e7a346f2f5da5fc42cf8b8ecaf4
                                                • Instruction Fuzzy Hash: 40E0DF30B202049FDB44DFA8D84CE07B3B9EB85229B048155F80C8B702E232E928FA19
                                                APIs
                                                • memset.MSVCR90 ref: 6CF903D9
                                                  • Part of subcall function 6CF0A590: memset.MSVCR90 ref: 6CF0A615
                                                • memcpy.MSVCR90(?,?,?), ref: 6CF90722
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memset$memcpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\t1_enc.c$IV block
                                                • API String ID: 368790112-1220425162
                                                • Opcode ID: 454f30cdc33983f317a660c08d3992db88fee7a2b04ae7c32b042685bdb96762
                                                • Instruction ID: c75b4ab38fabd9c30e2ee3380a1844b0a38c44b76cd2c992136383e1dc062d01
                                                • Opcode Fuzzy Hash: 454f30cdc33983f317a660c08d3992db88fee7a2b04ae7c32b042685bdb96762
                                                • Instruction Fuzzy Hash: F0124D71A002569BEB24CF55CC85FD9B3B4BF48308F1481A9D91DABB91DBB0AD85CF90
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memset
                                                • String ID: $%02x%c$%04x -
                                                • API String ID: 2221118986-38741901
                                                • Opcode ID: 2447985213b54f1d69a4ae5621e1ed8dfff67ef18435b30a00deaa3d40f0cd42
                                                • Instruction ID: c14ad3cf71fad294d70d18d938e490b4736a23056d2c30f2a7ebca330f8c8910
                                                • Opcode Fuzzy Hash: 2447985213b54f1d69a4ae5621e1ed8dfff67ef18435b30a00deaa3d40f0cd42
                                                • Instruction Fuzzy Hash: 9DB1EA31E091984FEB15CE28CA607E9B7B5EF4634CF2640EBC845ABE45DA32DE45CB50
                                                APIs
                                                • memcpy.MSVCR90(00000048,?,?), ref: 6CF78C50
                                                • memset.MSVCR90 ref: 6CF78977
                                                  • Part of subcall function 6CF0B090: memset.MSVCR90 ref: 6CF0B108
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\ssl\t1_lib.c, xrefs: 6CF78B5F
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_lib.c, xrefs: 6CF78A89
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memset$memcpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_lib.c$C:\build27\cpython\externals\openssl-1.0.2t\ssl\t1_lib.c
                                                • API String ID: 368790112-3263114269
                                                • Opcode ID: a0a8153b29912bbab6b158eecf1775bb84a7501934dd885cced0aef8b19c777b
                                                • Instruction ID: 5fd051f8b42950e1e6f2a83f10c6dc0b512b4120fd38d264f7c750cae707913f
                                                • Opcode Fuzzy Hash: a0a8153b29912bbab6b158eecf1775bb84a7501934dd885cced0aef8b19c777b
                                                • Instruction Fuzzy Hash: B5C19E72F012199FDB64DF28DC40BDEB3B5AF44314F0445EAD90DA7640EB30AA898FA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $$C:\build27\cpython\externals\openssl-1.0.2t\crypto\rsa\rsa_sign.c$r
                                                • API String ID: 0-1476069403
                                                • Opcode ID: 75dfc1ad57825bda3e1cd7a90fa3a3a4a0d29a54931f7fd76c6a1b96b35bca53
                                                • Instruction ID: f1441887e4a98ec1f72ad63714197c00ef98fe55c882e402418f7bb6e2255a6d
                                                • Opcode Fuzzy Hash: 75dfc1ad57825bda3e1cd7a90fa3a3a4a0d29a54931f7fd76c6a1b96b35bca53
                                                • Instruction Fuzzy Hash: A4A1D231748205AFEB10CF59C880BDA77F6AF85308F244169E9099BF81DB72EA49C7D1
                                                APIs
                                                • memset.MSVCR90 ref: 6CEE056B
                                                  • Part of subcall function 6CEDF790: memcpy.MSVCR90(?,6CEE015F,6CEE0160,?,?,?,6CEE0771,?,00000000,?), ref: 6CEDF7BB
                                                  • Part of subcall function 6CEDCDA0: raise.MSVCR90 ref: 6CEDCDAF
                                                  • Part of subcall function 6CEDCDA0: _exit.MSVCR90 ref: 6CEDCDBA
                                                  • Part of subcall function 6CEDCDA0: __iob_func.MSVCR90 ref: 6CEDCDD0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: __iob_func_exitmemcpymemsetraise
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\pem\pem_lib.c$enc->iv_len <= (int)sizeof(iv)$strlen(objstr) + 23 + 2 * enc->iv_len + 13 <= sizeof(buf)
                                                • API String ID: 2625025328-1503043936
                                                • Opcode ID: 81738146a475e2866bed58892868caf81ea9f783b9585f54efaa50d3c1bdb647
                                                • Instruction ID: 288b6d920e8955354d9acb8529e3af12ab07a7a679b8cfdf63a6edc7931faad5
                                                • Opcode Fuzzy Hash: 81738146a475e2866bed58892868caf81ea9f783b9585f54efaa50d3c1bdb647
                                                • Instruction Fuzzy Hash: F7C1ACB1E0025A9BDB24CF54CD40BDEB3B5BF88348F1440A9D618A7741EB74AE89CF95
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\ec\ec2_oct.c$C:\build27\cpython\externals\openssl-1.0.2t\crypto\ec\ec_lib.c
                                                • API String ID: 0-2835069463
                                                • Opcode ID: ca1cd095e2fe3b4634e1a1a27902bfc3b409860f6188502cccd7bee0e6149429
                                                • Instruction ID: 3d44ebe003719901d3f9b228795b3de0e066d1c4a4b25d59acce8987317b100d
                                                • Opcode Fuzzy Hash: ca1cd095e2fe3b4634e1a1a27902bfc3b409860f6188502cccd7bee0e6149429
                                                • Instruction Fuzzy Hash: C491E276B00219ABDB10CE64DC80B9E73A5EF84358F255565EC18EBB80E771EE14C7E1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\ssl_rsa.c$SERVERINFO FOR
                                                • API String ID: 0-2271718345
                                                • Opcode ID: a162833b1c692e614227a9c846014a3610a80ace785035da5c17f15eb452277e
                                                • Instruction ID: 93c207ba947f75bdb2d7b5b7700ba0cacb2297597aab12b904a930283631ca76
                                                • Opcode Fuzzy Hash: a162833b1c692e614227a9c846014a3610a80ace785035da5c17f15eb452277e
                                                • Instruction Fuzzy Hash: D9A1A2B1E002099BDB10CF98EC85BEEB7B5AF45304F14412AE914B7741E776EA15CBA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\ssl_lib.c$s->sid_ctx_length <= sizeof(s->sid_ctx)
                                                • API String ID: 0-543158492
                                                • Opcode ID: 11a2ad49eb7d388c96f32954ec5a98d498f84a90fb45b6e1779c3feb2689dfdd
                                                • Instruction ID: cc218da47bb3303df5a45458a634b38995d0a33c045b6d3d480c89f2c0d87beb
                                                • Opcode Fuzzy Hash: 11a2ad49eb7d388c96f32954ec5a98d498f84a90fb45b6e1779c3feb2689dfdd
                                                • Instruction Fuzzy Hash: 1CA146B0A017019FEB10CF29C881BDAB7E4EF48304F1585B9ED5D9BB91EB31A905CB91
                                                Strings
                                                • ctx->digest->md_size <= EVP_MAX_MD_SIZE, xrefs: 6CF5C7BD
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_lib.c, xrefs: 6CF5C63A
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\digest.c, xrefs: 6CF5C7C7
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\digest.c$C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_lib.c$ctx->digest->md_size <= EVP_MAX_MD_SIZE
                                                • API String ID: 0-2315790322
                                                • Opcode ID: dfa8cbe47f1f32c606f3c4f3f6e6ea844e3b2c27ece13aa592b1b10863eba640
                                                • Instruction ID: a380ba0bd6ebf7fae6d67eeedcdaaedf401762b4bf876c5e8a7ec72de16eb8c3
                                                • Opcode Fuzzy Hash: dfa8cbe47f1f32c606f3c4f3f6e6ea844e3b2c27ece13aa592b1b10863eba640
                                                • Instruction Fuzzy Hash: 9A819DB16083019FC304DF68D880A9BB7F5AFD8204F54892DF99AC7741E771E919CBA2
                                                APIs
                                                • memset.MSVCR90 ref: 6CF9A0C5
                                                  • Part of subcall function 6CEDCDA0: raise.MSVCR90 ref: 6CEDCDAF
                                                  • Part of subcall function 6CEDCDA0: _exit.MSVCR90 ref: 6CEDCDBA
                                                  • Part of subcall function 6CEDCDA0: __iob_func.MSVCR90 ref: 6CEDCDD0
                                                Strings
                                                • ctx->digest->md_size <= EVP_MAX_MD_SIZE, xrefs: 6CF9A241
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\srp\srp_lib.c, xrefs: 6CF9A06C
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\digest.c, xrefs: 6CF9A24B
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: __iob_func_exitmemsetraise
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\digest.c$C:\build27\cpython\externals\openssl-1.0.2t\crypto\srp\srp_lib.c$ctx->digest->md_size <= EVP_MAX_MD_SIZE
                                                • API String ID: 1335598159-1357769393
                                                • Opcode ID: ad8c510f265e79515c825931a595a14f71ec8cf9d22411fd0de2dfddada2a5a4
                                                • Instruction ID: f546bf9af6b925e407af8dc7f9e8a3f2c84340dfd583fe9b44dd6169d4774dd1
                                                • Opcode Fuzzy Hash: ad8c510f265e79515c825931a595a14f71ec8cf9d22411fd0de2dfddada2a5a4
                                                • Instruction Fuzzy Hash: 9171A071E00209ABEB00DFA9DC81BDEB7F5EF84318F154229E815A7750EB35E909CB91
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: strchrstrncpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\x509v3\v3_info.c$value=
                                                • API String ID: 3824778938-1365197443
                                                • Opcode ID: b581f21dcec4c176ef47d748371b35709a14b4608172653abeff48ddff8592b1
                                                • Instruction ID: 15a3c63735b36d02fb1027514b301d9063d4d39928cd00d9eb3311cab617179f
                                                • Opcode Fuzzy Hash: b581f21dcec4c176ef47d748371b35709a14b4608172653abeff48ddff8592b1
                                                • Instruction Fuzzy Hash: 6451C771A00205ABDB20CF54CC81B9EB7B5EB44308F36556EE949ABB81D771F906C7D2
                                                APIs
                                                Strings
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_key.c, xrefs: 6CF0A54F, 6CF0A563
                                                • nkey <= EVP_MAX_KEY_LENGTH, xrefs: 6CF0A559
                                                • niv <= EVP_MAX_IV_LENGTH, xrefs: 6CF0A545
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memset
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_key.c$niv <= EVP_MAX_IV_LENGTH$nkey <= EVP_MAX_KEY_LENGTH
                                                • API String ID: 2221118986-2789405989
                                                • Opcode ID: 9dc77d9e606763fd2c6aa9f5deb72516e45e1de07613b217f55cf5e1e54b78db
                                                • Instruction ID: 2fa992674190244ea24b358fd4d210a46fbd1f9cec68e6c868605e6d2650a9ee
                                                • Opcode Fuzzy Hash: 9dc77d9e606763fd2c6aa9f5deb72516e45e1de07613b217f55cf5e1e54b78db
                                                • Instruction Fuzzy Hash: 25518E79F012098BDB10CFA998946AEB7B5BF44708F20412ED859EBB45DB31E905CB90
                                                APIs
                                                Strings
                                                • ctx->digest->md_size <= EVP_MAX_MD_SIZE, xrefs: 6CF45EB9
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_lib.c, xrefs: 6CF45D3E
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\digest.c, xrefs: 6CF45EC3
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\digest.c$C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_lib.c$ctx->digest->md_size <= EVP_MAX_MD_SIZE
                                                • API String ID: 3510742995-2315790322
                                                • Opcode ID: 5ca56ba8b062f71e5be564abc1fea64cb51e7661379c4abce513e536823c35ee
                                                • Instruction ID: ebcb58a1546d8ac0cd8724574ff472c29b4585c47b77a9d0b7111d6504cabfc4
                                                • Opcode Fuzzy Hash: 5ca56ba8b062f71e5be564abc1fea64cb51e7661379c4abce513e536823c35ee
                                                • Instruction Fuzzy Hash: 23514E75E003089BDB14DFE9C884ADEBBF5AF45304F25812DD819AB746E730E90ACB91
                                                APIs
                                                Strings
                                                • j <= (int)sizeof(ctx->key), xrefs: 6CF5E691
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\hmac\hmac.c, xrefs: 6CF5E69B
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpymemset
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\hmac\hmac.c$j <= (int)sizeof(ctx->key)
                                                • API String ID: 1297977491-3336659946
                                                • Opcode ID: 8a11277eb889734b2deaa399fca4630f0ffbec7f945f2146ceddfd9c1993697e
                                                • Instruction ID: 9727884d69278fdfc964dd28a46d4da20384fcd4e06ffa18f8721e7e175ee649
                                                • Opcode Fuzzy Hash: 8a11277eb889734b2deaa399fca4630f0ffbec7f945f2146ceddfd9c1993697e
                                                • Instruction Fuzzy Hash: 9451C5716011059BEF08CF24DC80BAA7779EF55318F5040A8EE49DB786EB39E959CBE0
                                                APIs
                                                • PyList_New.PYTHON27(00000000), ref: 6CEC24F8
                                                • PyUnicodeUCS2_FromStringAndSize.PYTHON27(?), ref: 6CEC2579
                                                • PyList_Append.PYTHON27(00000000,00000000), ref: 6CEC258A
                                                • PyList_AsTuple.PYTHON27(00000000), ref: 6CEC25E1
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: List_$AppendFromSizeStringTupleUnicode
                                                • String ID:
                                                • API String ID: 1097641754-0
                                                • Opcode ID: 3cfb1aef0b621fa8a4c12daec12d6a89c77ceb8cbaba4dc85b4f3c13c17f2403
                                                • Instruction ID: 8c99448cf85cf4da5aa9546128e435f44ebcce9c191612da45ad8c48716392be
                                                • Opcode Fuzzy Hash: 3cfb1aef0b621fa8a4c12daec12d6a89c77ceb8cbaba4dc85b4f3c13c17f2403
                                                • Instruction Fuzzy Hash: 8E51D171B042128BD710CF29CA88A4BB3F0FF95328F24966DE86487750E735E806CB93
                                                Strings
                                                • b <= sizeof(ctx->final), xrefs: 6CF0AE91
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_enc.c, xrefs: 6CF0AD5D, 6CF0AE9B
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\evp\evp_enc.c$b <= sizeof(ctx->final)
                                                • API String ID: 0-2581419725
                                                • Opcode ID: d28882f5c57eb689c3da945ac94c6314836e1861823fa971ff471aab7407644b
                                                • Instruction ID: 7bdae4c0ff8c0ff029becb0c46b2c7cfb22ac56faf6021fa5855b6f5a3f9ad91
                                                • Opcode Fuzzy Hash: d28882f5c57eb689c3da945ac94c6314836e1861823fa971ff471aab7407644b
                                                • Instruction Fuzzy Hash: 4741E372701204AFE710CE59EC91BEA73E8EB85729F10416AFC0C8BB40E776E956D791
                                                Strings
                                                • issuer, xrefs: 6CED8EF1
                                                • C:\build27\cpython\externals\openssl-1.0.2t\crypto\x509v3\v3_alt.c, xrefs: 6CED8E9F
                                                • copy, xrefs: 6CED8F23
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\x509v3\v3_alt.c$copy$issuer
                                                • API String ID: 0-1358652360
                                                • Opcode ID: 014b79873ea4c8be605afa90d6dbc4ff4d6a543d2c59f2bf9e035370ec80cf1d
                                                • Instruction ID: cb676acf76075f76935949847e1c25a5028b10f3d49ade69a8f05431d2f82a5c
                                                • Opcode Fuzzy Hash: 014b79873ea4c8be605afa90d6dbc4ff4d6a543d2c59f2bf9e035370ec80cf1d
                                                • Instruction Fuzzy Hash: B3412A717042099BD720CF699C81B9A73B69B4121CF3A15ABEC148BB41E732F90BC7D2
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memset
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\buffer\buffer.c
                                                • API String ID: 2221118986-430455864
                                                • Opcode ID: 1e460318f64d2cf2fcc185724b2238e16db54aa4ee609cfda6a66efdb9b573bb
                                                • Instruction ID: 68a96fddde758167a22df85d915411d1608dd76a37ae69484553102370e5076a
                                                • Opcode Fuzzy Hash: 1e460318f64d2cf2fcc185724b2238e16db54aa4ee609cfda6a66efdb9b573bb
                                                • Instruction Fuzzy Hash: B83198727442016FE7049E18ECC1B99B7A5EB84368F24823EF90CCBB80E775AD198794
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: af19fd6e9a074f58dc7ec58e8567cdd99bbf101001199f3e4f13cb5a9b02238a
                                                • Instruction ID: 458106fd2a47de040c503b1f14a6f9308b6175d3667fa9fdc5b9884f9e3c2c15
                                                • Opcode Fuzzy Hash: af19fd6e9a074f58dc7ec58e8567cdd99bbf101001199f3e4f13cb5a9b02238a
                                                • Instruction Fuzzy Hash: 2F219E31B006018FE705CF69EA88A9733F8FB59329B14113AE929C7B10E722E901DB56
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$mallocwcslen
                                                • String ID:
                                                • API String ID: 173459892-0
                                                • Opcode ID: b8f3b471f5fe2ad09f2d1377ec18e4edcebd2fdfdbb0d7f6aa1095d11fa209f3
                                                • Instruction ID: 9744097a12f8b822ab610269ec99efc9aea7c821b864e54a547139bda5badfde
                                                • Opcode Fuzzy Hash: b8f3b471f5fe2ad09f2d1377ec18e4edcebd2fdfdbb0d7f6aa1095d11fa209f3
                                                • Instruction Fuzzy Hash: 2321F7B15083019FD300EF66D48431BBBE4AB84368F01893EE9985B2C1D7B985498BD7
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: __dllonexit_lock_onexit_unlock
                                                • String ID:
                                                • API String ID: 209411981-0
                                                • Opcode ID: e72dbf5e36769850f66dedf14dbdfcd0cf83797c3aff72795d0b5d1688932a61
                                                • Instruction ID: 94322562d448f61ab5e389db5415b64235926ac514306a4d16e9030116057e7b
                                                • Opcode Fuzzy Hash: e72dbf5e36769850f66dedf14dbdfcd0cf83797c3aff72795d0b5d1688932a61
                                                • Instruction Fuzzy Hash: C91183F49197018FC700EF76D48555EBBE0AB98314F818D3EF8D497392E63998948B86
                                                APIs
                                                • strncpy.MSVCRT ref: 00402D00
                                                  • Part of subcall function 00402B60: strlen.MSVCRT ref: 00402BA5
                                                  • Part of subcall function 00402B60: strncpy.MSVCRT ref: 00402BB5
                                                  • Part of subcall function 00402B60: strlen.MSVCRT ref: 00402BBD
                                                  • Part of subcall function 00402B60: strlen.MSVCRT ref: 00402BD5
                                                  • Part of subcall function 00402B60: strcat.MSVCRT(?,?,?,00002068,00000000,00000000,004026D6), ref: 00402BE8
                                                • strchr.MSVCRT ref: 00402D33
                                                • strncpy.MSVCRT ref: 00402D4D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strlenstrncpy$strcatstrchr
                                                • String ID: ;
                                                • API String ID: 1837988602-1661535913
                                                • Opcode ID: 8fc9b7576c0a419203d23bf9b58d9aab0d32351923dc3836b5ccfaade7827991
                                                • Instruction ID: cafbc012400062e9836ad638cb34517f3ac44faff61307575af338ded75cce7e
                                                • Opcode Fuzzy Hash: 8fc9b7576c0a419203d23bf9b58d9aab0d32351923dc3836b5ccfaade7827991
                                                • Instruction Fuzzy Hash: EB11DEB16083419FD710AF69C1C429EBBE0EF84784F008C2EF5C8D7341D3B999818B46
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: Err_$ClearPrint
                                                • String ID:
                                                • API String ID: 2841865782-0
                                                • Opcode ID: c8a4119b7f5f103bff413d06edf0b36ad86028411efbad5513ac0c91e0875dc0
                                                • Instruction ID: d1536409d56c44e0e682c25b7688d9f7611cd5652ed609ed71c29ab179a6128f
                                                • Opcode Fuzzy Hash: c8a4119b7f5f103bff413d06edf0b36ad86028411efbad5513ac0c91e0875dc0
                                                • Instruction Fuzzy Hash: EFD0C2361045108FC3102F38FD4C289BF61FB88321F05473DE65AD21B0C6700556CB8A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: Err_$ClearPrint
                                                • String ID:
                                                • API String ID: 2841865782-0
                                                • Opcode ID: c8da6cc03c9e6287cfd1277d6b72ccdf8d55770795fdabe836d4b21bb57a759e
                                                • Instruction ID: 181f7cc08fe0b32babf9f34fdf93a5d565f36803c1d22e9caf565b6c92bb6d29
                                                • Opcode Fuzzy Hash: c8da6cc03c9e6287cfd1277d6b72ccdf8d55770795fdabe836d4b21bb57a759e
                                                • Instruction Fuzzy Hash: 6CD012765045108FC2502F28FD4C0997F61FA882257154739E65AD21B0C6715556CB8A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: Err_$ClearPrint
                                                • String ID:
                                                • API String ID: 2841865782-0
                                                • Opcode ID: cf52dce186dfb3fb698a26fa1dcd9770811d94c250a69313f54f9de9a22c5693
                                                • Instruction ID: 72ddaba1c59c873d25fe0bf91ec31d4e9daf0aed9a0c842b1247e831217dccea
                                                • Opcode Fuzzy Hash: cf52dce186dfb3fb698a26fa1dcd9770811d94c250a69313f54f9de9a22c5693
                                                • Instruction Fuzzy Hash: EAD012791045108FC2502F28FD482987F21FB84321F154739E65AD21B0C6715556CA4A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: %s%c%08lx.%s%d$C:\build27\cpython\externals\openssl-1.0.2t\crypto\x509\by_dir.c
                                                • API String ID: 0-3102404680
                                                • Opcode ID: 13bedda219724dc8d29ed042ab73016fc54196af1ea017775f2dfd5f9ebaf7bb
                                                • Instruction ID: 871c7e8cbc872994097155e28de4cd9462fad98813e425bdb14862fb29623127
                                                • Opcode Fuzzy Hash: 13bedda219724dc8d29ed042ab73016fc54196af1ea017775f2dfd5f9ebaf7bb
                                                • Instruction Fuzzy Hash: E3E1AD346083029BEB14CF25C881B5BB7F0BB89718F148A1DF9689B790D771E9068B92
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: __aullrem_time64
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\bn\bn_rand.c
                                                • API String ID: 3772048222-1199490170
                                                • Opcode ID: d6f39e09649616a2af2f723d36ec16a4303db20ceda17b1a7e9be1d419529e09
                                                • Instruction ID: 88e017dff731fc9e273b55aba455c3a6ac1c278c277279332b79c39a2515a700
                                                • Opcode Fuzzy Hash: d6f39e09649616a2af2f723d36ec16a4303db20ceda17b1a7e9be1d419529e09
                                                • Instruction Fuzzy Hash: F791E071B49221ABDB148B28D881B6B77B4BF86348F04523DF859CBB80D735D505CBE6
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f9cd25a472d7b6cbcba056ef5eee9ba53387e4f10d971ac1bdc4995a95e59ad0
                                                • Instruction ID: 9aac520717d1b6dad4bcc118e452eaa075f4db1f274a75cdcb3ce240fa9fc172
                                                • Opcode Fuzzy Hash: f9cd25a472d7b6cbcba056ef5eee9ba53387e4f10d971ac1bdc4995a95e59ad0
                                                • Instruction Fuzzy Hash: DDE149B5A00119BFDB14CFA8CC94EEF7BB9EF88304F148518F90997744E631AE158BA0
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: isuppertolower
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\asn1\asn_mime.c
                                                • API String ID: 2435887076-673838732
                                                • Opcode ID: 8aff5350c9729c227c4589b08797aa9b691ee0fdfdf65cff613a1c77f21dda7b
                                                • Instruction ID: 2b45b452a0f6976ad362656fbf71ce0fd7fee3c65d812a5fc1269e4ff36ccbe7
                                                • Opcode Fuzzy Hash: 8aff5350c9729c227c4589b08797aa9b691ee0fdfdf65cff613a1c77f21dda7b
                                                • Instruction Fuzzy Hash: 1D316B72A00241AFEB10DF9A9CD07AA7BF8EB55318F24817DFD9497E00D6335E4987A1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: strtoul
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\asn1\asn1_gen.c$Char=
                                                • API String ID: 3805803174-1255923820
                                                • Opcode ID: 41ada6117fd1bd9b1698f7d6f71661beade58ca1472fdbd0b2726ba95e30b2ea
                                                • Instruction ID: e64624735ccf74f3425bde932348684732c7ec448f237b6b058e352a4698e4e4
                                                • Opcode Fuzzy Hash: 41ada6117fd1bd9b1698f7d6f71661beade58ca1472fdbd0b2726ba95e30b2ea
                                                • Instruction Fuzzy Hash: 6F21283670A2545BEB108A58EC657ED77A8CB42715F1401FBED08CBBC1E7E69905C3D2
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: _time64memset
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\ssl\ssl_sess.c
                                                • API String ID: 899224009-1237407967
                                                • Opcode ID: cfd498967c2b4ee96007dafd8a5a23faa6fdfd16890985c99e104df66cddb4ba
                                                • Instruction ID: 7d71fa9b889b23784576bcfd7d7f69ce181d25792abd4738285b84a923c35cd0
                                                • Opcode Fuzzy Hash: cfd498967c2b4ee96007dafd8a5a23faa6fdfd16890985c99e104df66cddb4ba
                                                • Instruction Fuzzy Hash: B931EDB0A01701AEE2319F69DC02F93BAF4FB81718F10052FE66A97680DBB110058B62
                                                APIs
                                                • __aulldvrm.LIBCMT ref: 6CEF24DF
                                                  • Part of subcall function 6CF1B330: _gmtime64_s.MSVCR90 ref: 6CF1B35F
                                                • __aullrem.LIBCMT ref: 6CEF2518
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: __aulldvrm__aullrem_gmtime64_s
                                                • String ID: %.14s.%03dZ
                                                • API String ID: 1602601563-1077646249
                                                • Opcode ID: ebbd8f9ceaa8bce513b2fbfdde52f28e257c0ae1d37b446332c4717f86568590
                                                • Instruction ID: b40b0d24a21e6cefd23e24c599adb01d1add86ce785b2e239fcebc1e4e69dcb0
                                                • Opcode Fuzzy Hash: ebbd8f9ceaa8bce513b2fbfdde52f28e257c0ae1d37b446332c4717f86568590
                                                • Instruction Fuzzy Hash: B92181B1B002086BDB04DF69DC41BEF77B8AF88304F448419F508A7781DB75AD198B91
                                                APIs
                                                • GetProcAddress.KERNEL32(?,?), ref: 6CF660B4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: AddressProc
                                                • String ID: C:\build27\cpython\externals\openssl-1.0.2t\crypto\dso\dso_win32.c$symname(
                                                • API String ID: 190572456-2663281677
                                                • Opcode ID: bdf1b6902297763f36eac808177feb1e6d5fb567dd8ed6875c2add481b77ab56
                                                • Instruction ID: 399ce3debc0b08c176ea681db53ee66d3fc2caa250709fe5f44e3e425c51d0ba
                                                • Opcode Fuzzy Hash: bdf1b6902297763f36eac808177feb1e6d5fb567dd8ed6875c2add481b77ab56
                                                • Instruction Fuzzy Hash: 0F11E3713492057BEB149A1ACC55F873364DF01754F144278FE59DBED2DB32E9018681
                                                APIs
                                                • PyType_IsSubtype.PYTHON27(?,6D00E8B8), ref: 6CEC2FD7
                                                • PyErr_SetString.PYTHON27(?,The value must be a SSLContext), ref: 6CEC2FF1
                                                Strings
                                                • The value must be a SSLContext, xrefs: 6CEC2FEB
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: Err_StringSubtypeType_
                                                • String ID: The value must be a SSLContext
                                                • API String ID: 468607378-677980480
                                                • Opcode ID: 1e31c02df83b4ba7f6c2a489b933e369c7e69daede52d41b569a46321b9cf003
                                                • Instruction ID: 3958297560e79bf680c0a67ba4353021932b063108392f08cfd7c18ce6fe61d2
                                                • Opcode Fuzzy Hash: 1e31c02df83b4ba7f6c2a489b933e369c7e69daede52d41b569a46321b9cf003
                                                • Instruction Fuzzy Hash: 26017175700501ABE700DF59E984992B7B9EF452393144625E828C7781D332F951CBA2
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: setbuf$_fileno_setmodefflush$OptionSys_Warnmbstowcsntohl
                                                • String ID: pyi-
                                                • API String ID: 4193053745-3770392772
                                                • Opcode ID: 11cbf90a08825acd13ace0c03f197a080f4ab3790cf3c7c2105d72725abef362
                                                • Instruction ID: e36c829b6a0d97d2367c992e2002adacd36deb20f16e6952a0cc159506fc5f2c
                                                • Opcode Fuzzy Hash: 11cbf90a08825acd13ace0c03f197a080f4ab3790cf3c7c2105d72725abef362
                                                • Instruction Fuzzy Hash: CB0171B44086458ACB14CF24C68026B7FE4AB44315F4189BBE986AB3D1D3BCDA55DB4A
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strrchr
                                                • String ID: /
                                                • API String ID: 3418686817-2043925204
                                                • Opcode ID: 0cfd4f32b849586b70a7353986d77b0206b4deb400bbcf53468c15147e581287
                                                • Instruction ID: d17ca4ae87394f5675dde1efdaccee299bc168ef5c4884823c421eedceabe6da
                                                • Opcode Fuzzy Hash: 0cfd4f32b849586b70a7353986d77b0206b4deb400bbcf53468c15147e581287
                                                • Instruction Fuzzy Hash: C8E039B04083008BD300AF158A8855BFBF4BF48348F45497EA98927382D379D908CB6B
                                                APIs
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00405155), ref: 00404E73
                                                • FormatMessageA.KERNEL32 ref: 00404EB4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: ErrorFormatLastMessage
                                                • String ID: FormatMessage failed.
                                                • API String ID: 3479602957-2374551320
                                                • Opcode ID: e3e88c1ca8d9d908ac7fb40ebe42d6c5ba71c6a0b71db535dbf4255836295caf
                                                • Instruction ID: 95bcd40d16130ee153334ec2c51760062741ad72a3ca2a6fd624054d12426a6e
                                                • Opcode Fuzzy Hash: e3e88c1ca8d9d908ac7fb40ebe42d6c5ba71c6a0b71db535dbf4255836295caf
                                                • Instruction Fuzzy Hash: 69F045B45083018FD300EF69C55934BBBE0BF88349F40C96DE8989B254D3B9864A8F97
                                                APIs
                                                • memcpy.MSVCR90(?,?,?,?,?,?,?,?,6CF2A175,?), ref: 6CF507DC
                                                • memcpy.MSVCR90(?,?,00000040,?,?,?,?,?,6CF2A175,?), ref: 6CF50801
                                                • memset.MSVCR90 ref: 6CF5082C
                                                • memcpy.MSVCR90(?,?,?,?,?,?,?,?,6CF2A175,?), ref: 6CF50863
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy$memset
                                                • String ID:
                                                • API String ID: 438689982-0
                                                • Opcode ID: 316610f0ad9a54ae572b68d4a84eac42c8a2284bb7c4cd8ab728122eff8e51ad
                                                • Instruction ID: 40a410b3b92147822b40f7fe813726a6c300b9e6fa498cbebd8a3e844cbb5c89
                                                • Opcode Fuzzy Hash: 316610f0ad9a54ae572b68d4a84eac42c8a2284bb7c4cd8ab728122eff8e51ad
                                                • Instruction Fuzzy Hash: A221DCB2A007056FD720CE59D880E9BB7FDEB9431CF10426DE90587B04EBB5EA1987D1
                                                APIs
                                                • memcpy.MSVCR90(?,?,?,?,?,?,?,?,6CF2A205,?), ref: 6CF50A6C
                                                • memcpy.MSVCR90(?,?,00000040,?,?,?,?,?,6CF2A205,?), ref: 6CF50A91
                                                • memset.MSVCR90 ref: 6CF50ABB
                                                • memcpy.MSVCR90(?,?,?,?,?,?,?,?,6CF2A205,?), ref: 6CF50AF1
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2195703679.000000006CEC1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CEC0000, based on PE: true
                                                • Associated: 00000002.00000002.2195688110.000000006CEC0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195799500.000000006CFC2000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195846572.000000006D004000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195867613.000000006D005000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195896581.000000006D008000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195910917.000000006D009000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195925707.000000006D00B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195941931.000000006D00D000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195958730.000000006D00E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000002.00000002.2195974841.000000006D012000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_6cec0000_main.jbxd
                                                Similarity
                                                • API ID: memcpy$memset
                                                • String ID:
                                                • API String ID: 438689982-0
                                                • Opcode ID: 85263cbe145a771239ca3c8e3c8903dcc60e255da38b66339311f01e6a4a5465
                                                • Instruction ID: a93dbb9ac59ff84e0dd52da17728a8021c6c376fd11c976e0651eabac9befa74
                                                • Opcode Fuzzy Hash: 85263cbe145a771239ca3c8e3c8903dcc60e255da38b66339311f01e6a4a5465
                                                • Instruction Fuzzy Hash: D021F5B6600705ABD334CE59D880E9BB3FDEFA031CF50062EE90587A00E7B1EA198791
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: CriticalSection$EnterLeavefree
                                                • String ID:
                                                • API String ID: 4020351045-0
                                                • Opcode ID: 5a6a9aecb08d4dbab69b272cecf5a8e366ddeead7f89e3dbb92cf09a74704c7f
                                                • Instruction ID: 205ad730fa9d849b6dcd85aca9a8edb478e236a23f6659a9e29df5da5504daa6
                                                • Opcode Fuzzy Hash: 5a6a9aecb08d4dbab69b272cecf5a8e366ddeead7f89e3dbb92cf09a74704c7f
                                                • Instruction Fuzzy Hash: 79015B747002028FD700EF79D98545ABBE0BB64304B988A7AE845DB351E738EC95CB4B
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                • String ID:
                                                • API String ID: 682475483-0
                                                • Opcode ID: deaaa24b9fa4b4d1e7b522dcaef3998b3bbfd73c4541e91bdd6be517b23479c5
                                                • Instruction ID: 1d3ce6b71eab003d7cf42bd7384e75d6cbe8db24f84eea3f059a5883f4db0426
                                                • Opcode Fuzzy Hash: deaaa24b9fa4b4d1e7b522dcaef3998b3bbfd73c4541e91bdd6be517b23479c5
                                                • Instruction Fuzzy Hash: 08F0DC7A5007048BCB00BFBAE94828ABBF4FB94310F454539DC9893310D739A829CACB
                                                APIs
                                                • strcpy.MSVCRT(?,?,?,00401CB0,0040284B), ref: 00401C38
                                                • strcat.MSVCRT(?,?,?,00401CB0,0040284B), ref: 00401C54
                                                • strcpy.MSVCRT(?,?,?,00401CB0,0040284B), ref: 00401C60
                                                • strcpy.MSVCRT ref: 00401C76
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.2194757293.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000002.00000002.2194743246.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194773005.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194787099.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000422000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000562000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000564000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000566000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000002.00000002.2194816278.0000000000568000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_400000_main.jbxd
                                                Similarity
                                                • API ID: strcpy$strcat
                                                • String ID:
                                                • API String ID: 3927648046-0
                                                • Opcode ID: 6c814ddd8a824b4bd2636785863bacbba6574ce59f97f3a803a5a9257da0b1bd
                                                • Instruction ID: 9c2cac98e7d877e8ae7db83d823dbc52851c1e70b87a1bb4017c5684ab7af4db
                                                • Opcode Fuzzy Hash: 6c814ddd8a824b4bd2636785863bacbba6574ce59f97f3a803a5a9257da0b1bd
                                                • Instruction Fuzzy Hash: 7FF01DB28193109BD700BF29D98114EBBE8EF84758F41896EF8C867346C3749556CB97