Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lvXRlexBnb.exe

Overview

General Information

Sample name:lvXRlexBnb.exe
renamed because original name is a hash value
Original sample name:88300378266b63b920d5a064c201100f.exe
Analysis ID:1538244
MD5:88300378266b63b920d5a064c201100f
SHA1:3cd39d22f2eebc57b00e1780d6e9e13688be6efc
SHA256:e84ca1288f8a7b2e5fd2a57c8896e0125566cd56b718ddbd1b5bdc7e56161faa
Tags:64exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • lvXRlexBnb.exe (PID: 7652 cmdline: "C:\Users\user\Desktop\lvXRlexBnb.exe" MD5: 88300378266B63B920D5A064C201100F)
    • conhost.exe (PID: 7660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7712 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7728 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7800 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7816 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7844 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7860 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7892 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7908 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7924 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7940 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7956 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7972 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7988 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 8016 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 8032 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 8076 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 8092 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 8140 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 8156 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 8172 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 8188 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7180 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 3340 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7332 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1840 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 7376 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1984 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 3116 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3284 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 4124 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 2288 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7424 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 2352 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • WerFault.exe (PID: 3040 cmdline: C:\Windows\system32\WerFault.exe -u -p 7652 -s 944 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: lvXRlexBnb.exeReversingLabs: Detection: 28%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
Source: lvXRlexBnb.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B719F3D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF79B719F3D
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B735AD0 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF79B735AD0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B73EF30 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF79B73EF30
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B73CE40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF79B73CE40
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7363F0 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF79B7363F0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B719300 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF79B719300
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B71C220 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF79B71C220
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B719230 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF79B719230
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B71C1C0 CryptAcquireContextA,CryptCreateHash,0_2_00007FF79B71C1C0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B71C210 CryptHashData,0_2_00007FF79B71C210
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF79B6FF0E0
Source: lvXRlexBnb.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF79B728B00
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.8:49708 version: TLS 1.2
Source: lvXRlexBnb.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant Plus\x64\Release\EpicGames.pdb source: lvXRlexBnb.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 172.67.72.57 172.67.72.57
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B705CF0 recv,WSAGetLastError,0_2_00007FF79B705CF0
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 58Content-Type: application/x-www-form-urlencoded
Source: lvXRlexBnb.exeString found in binary or memory: http://185.101.104.122/plushvciforabronkz.exe
Source: lvXRlexBnb.exeString found in binary or memory: http://185.101.104.122/plushvciforabronkz.exeC:
Source: lvXRlexBnb.exeString found in binary or memory: http://185.101.104.122/plushvcionbronkz.exe
Source: lvXRlexBnb.exeString found in binary or memory: http://185.101.104.122/plushvcionbronkz.exeC:
Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD41570.38.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
Source: Amcache.hve.38.drString found in binary or memory: http://upx.sf.net
Source: lvXRlexBnb.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: lvXRlexBnb.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: lvXRlexBnb.exe, 00000000.00000002.2032024162.00000234D6BBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: lvXRlexBnb.exe, 00000000.00000002.2032024162.00000234D6BBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/ace
Source: lvXRlexBnb.exe, 00000000.00000002.2032024162.00000234D6BBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/pace
Source: lvXRlexBnb.exe, 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: lvXRlexBnb.exe, 00000000.00000002.2032024162.00000234D6BBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/FILE_W
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.8:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B73CE40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF79B73CE40
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B707CC00_2_00007FF79B707CC0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7069800_2_00007FF79B706980
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7089800_2_00007FF79B708980
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B719F3D0_2_00007FF79B719F3D
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B6F15300_2_00007FF79B6F1530
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B70F5900_2_00007FF79B70F590
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B717CC00_2_00007FF79B717CC0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B6EEB700_2_00007FF79B6EEB70
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B6EABFD0_2_00007FF79B6EABFD
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B735AD00_2_00007FF79B735AD0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B6F89900_2_00007FF79B6F8990
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7249F00_2_00007FF79B7249F0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B719FFC0_2_00007FF79B719FFC
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B71A0050_2_00007FF79B71A005
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B6E10000_2_00007FF79B6E1000
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B73EEC00_2_00007FF79B73EEC0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B73CE400_2_00007FF79B73CE40
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B6EDDE00_2_00007FF79B6EDDE0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7153E00_2_00007FF79B7153E0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7033300_2_00007FF79B703330
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B6ED2500_2_00007FF79B6ED250
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B72D2200_2_00007FF79B72D220
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7098400_2_00007FF79B709840
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7128900_2_00007FF79B712890
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B6E973B0_2_00007FF79B6E973B
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7315B00_2_00007FF79B7315B0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B71C5D00_2_00007FF79B71C5D0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B6E955D0_2_00007FF79B6E955D
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7295200_2_00007FF79B729520
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7006000_2_00007FF79B700600
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7305800_2_00007FF79B730580
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: String function: 00007FF79B6F3030 appears 49 times
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: String function: 00007FF79B70A410 appears 34 times
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: String function: 00007FF79B705970 appears 378 times
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: String function: 00007FF79B708E80 appears 35 times
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: String function: 00007FF79B700240 appears 70 times
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: String function: 00007FF79B70A330 appears 33 times
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: String function: 00007FF79B70A2A0 appears 37 times
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: String function: 00007FF79B705AF0 appears 323 times
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: String function: 00007FF79B708DB0 appears 46 times
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: String function: 00007FF79B740236 appears 47 times
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7652 -s 944
Source: classification engineClassification label: mal56.winEXE@69/24@1/2
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B6F1D10 GetLastError,_errno,FormatMessageA,strchr,strncpy,_errno,_errno,GetLastError,SetLastError,0_2_00007FF79B6F1D10
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7652
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7660:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d68c1825-9002-4f02-848d-2a0ace68fe99Jump to behavior
Source: lvXRlexBnb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\lvXRlexBnb.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: lvXRlexBnb.exeReversingLabs: Detection: 28%
Source: lvXRlexBnb.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\lvXRlexBnb.exe "C:\Users\user\Desktop\lvXRlexBnb.exe"
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7652 -s 944
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: lvXRlexBnb.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: lvXRlexBnb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: lvXRlexBnb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: lvXRlexBnb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: lvXRlexBnb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: lvXRlexBnb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: lvXRlexBnb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: lvXRlexBnb.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: lvXRlexBnb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Loader Valorant Plus\x64\Release\EpicGames.pdb source: lvXRlexBnb.exe
Source: lvXRlexBnb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: lvXRlexBnb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: lvXRlexBnb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: lvXRlexBnb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: lvXRlexBnb.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B708980 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF79B708980
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-48666
Source: C:\Users\user\Desktop\lvXRlexBnb.exeAPI coverage: 4.3 %
Source: Amcache.hve.38.drBinary or memory string: VMware
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.38.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.38.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
Source: Amcache.hve.38.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.38.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.38.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.38.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.38.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.38.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: lvXRlexBnb.exe, 00000000.00000002.2032024162.00000234D6BBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll,
Source: Amcache.hve.38.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.38.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.38.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.38.drBinary or memory string: vmci.sys
Source: Amcache.hve.38.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.38.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.38.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.38.drBinary or memory string: VMware20,1
Source: Amcache.hve.38.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.38.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.38.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.38.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.38.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.38.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.38.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.38.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.38.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.38.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7400E8 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF79B7400E8
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7400E8 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF79B7400E8
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B708980 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF79B708980
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B73F9F4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF79B73F9F4
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B73FEF4 SetUnhandledExceptionFilter,0_2_00007FF79B73FEF4
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B73FD4C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF79B73FD4C
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\lvXRlexBnb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B73FF64 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF79B73FF64
Source: Amcache.hve.38.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.38.drBinary or memory string: MsMpEng.exe
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B714A60 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF79B714A60
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B7249F0 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF79B7249F0
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B72B4F1 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF79B72B4F1
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B72B750 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF79B72B750
Source: C:\Users\user\Desktop\lvXRlexBnb.exeCode function: 0_2_00007FF79B707630 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF79B707630
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538244 Sample: lvXRlexBnb.exe Startdate: 20/10/2024 Architecture: WINDOWS Score: 56 34 keyauth.win 2->34 36 edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com 2->36 38 2 other IPs or domains 2->38 44 Multi AV Scanner detection for submitted file 2->44 46 Machine Learning detection for sample 2->46 48 AI detected suspicious sample 2->48 8 lvXRlexBnb.exe 1 2->8         started        signatures3 process4 dnsIp5 40 keyauth.win 172.67.72.57, 443, 49708 CLOUDFLARENETUS United States 8->40 42 127.0.0.1 unknown unknown 8->42 11 WerFault.exe 19 16 8->11         started        14 cmd.exe 1 8->14         started        16 cmd.exe 1 8->16         started        18 17 other processes 8->18 process6 file7 32 C:\ProgramData\Microsoft\...\Report.wer, Unicode 11->32 dropped 20 taskkill.exe 1 14->20         started        22 taskkill.exe 1 16->22         started        24 taskkill.exe 1 18->24         started        26 taskkill.exe 1 18->26         started        28 taskkill.exe 1 18->28         started        30 10 other processes 18->30 process8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
lvXRlexBnb.exe29%ReversingLabsWin32.Trojan.Generic
lvXRlexBnb.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    unknown
    keyauth.win
    172.67.72.57
    truefalse
      unknown
      default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
      217.20.57.34
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://keyauth.win/api/1.1/false
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://185.101.104.122/plushvcionbronkz.exelvXRlexBnb.exefalse
            unknown
            https://keyauth.win/api/1.2/FILE_WlvXRlexBnb.exe, 00000000.00000002.2032024162.00000234D6BBC000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://upx.sf.netAmcache.hve.38.drfalse
              • URL Reputation: safe
              unknown
              http://185.101.104.122/plushvciforabronkz.exeC:lvXRlexBnb.exefalse
                unknown
                https://keyauth.win/api/1.1/acelvXRlexBnb.exe, 00000000.00000002.2032024162.00000234D6BBC000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://keyauth.win/api/1.1/pacelvXRlexBnb.exe, 00000000.00000002.2032024162.00000234D6BBC000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://185.101.104.122/plushvciforabronkz.exelvXRlexBnb.exefalse
                      unknown
                      https://curl.haxx.se/docs/http-cookies.htmllvXRlexBnb.exefalse
                      • URL Reputation: safe
                      unknown
                      https://curl.haxx.se/docs/http-cookies.html#lvXRlexBnb.exefalse
                        unknown
                        https://keyauth.win/api/1.2/lvXRlexBnb.exe, 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpfalse
                          unknown
                          http://185.101.104.122/plushvcionbronkz.exeC:lvXRlexBnb.exefalse
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            172.67.72.57
                            keyauth.winUnited States
                            13335CLOUDFLARENETUSfalse
                            IP
                            127.0.0.1
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1538244
                            Start date and time:2024-10-20 21:27:46 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 47s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Run name:Run with higher sleep bypass
                            Number of analysed new started processes analysed:44
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:lvXRlexBnb.exe
                            renamed because original name is a hash value
                            Original Sample Name:88300378266b63b920d5a064c201100f.exe
                            Detection:MAL
                            Classification:mal56.winEXE@69/24@1/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 98%
                            • Number of executed functions: 42
                            • Number of non-executed functions: 250
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 52.168.117.173, 2.19.126.163, 2.19.126.137, 2.16.100.168
                            • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, ocsp.digicert.com, login.live.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • VT rate limit hit for: lvXRlexBnb.exe
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            172.67.72.57flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                              Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Variant.Tedy.640280.26081.14300.exeGet hashmaliciousUnknownBrowse
                                    fox vanguard bypass.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.W64.GenKryptik.GHEK.tr.28454.21428.exeGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.Trojan.MulDrop28.40.18458.1049.exeGet hashmaliciousUnknownBrowse
                                              aj.exeGet hashmaliciousUnknownBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                keyauth.winJ1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                bC7vK74a5a.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                SecuriteInfo.com.Trojan.GenericKD.74313215.18321.7540.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                bg.microsoft.map.fastly.netflX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                sims-4-updater-v1.3.4.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                SecuriteInfo.com.PUA.Tool.RemoteControl.20.28594.18180.exeGet hashmaliciousRMSRemoteAdminBrowse
                                                • 199.232.210.172
                                                file.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                file.exeGet hashmaliciousLummaCBrowse
                                                • 199.232.214.172
                                                http://kongtuke.comGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                76Kobq8opu.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                76Kobq8opu.exeGet hashmaliciousUnknownBrowse
                                                • 199.232.214.172
                                                file.exeGet hashmaliciousLummaCBrowse
                                                • 199.232.210.172
                                                https://sub.investorscabirigroup.com/4WQbos10596ktJI775idiwtbqpkk1528WGTFCWTFRKDXPVO305927/749609o14Get hashmaliciousPhisherBrowse
                                                • 199.232.214.172
                                                default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comSecuriteInfo.com.Win64.Evo-gen.14681.29745.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                                • 217.20.57.20
                                                SecuriteInfo.com.Win64.ExploitX-gen.15584.28498.exeGet hashmaliciousUnknownBrowse
                                                • 217.20.57.22
                                                lGuWJB0nnP.exeGet hashmaliciousUnknownBrowse
                                                • 84.201.210.34
                                                SCV.cmdGet hashmaliciousUnknownBrowse
                                                • 217.20.57.18
                                                https://www.marketbeat.com/instant-alerts/nasdaq-meta-initiated-coverage-2024-10-11/Get hashmaliciousUnknownBrowse
                                                • 217.20.57.34
                                                http://juupl.alferdaws-center.com/4BuQTp17639YaIh368htsqzgjcla31568MKNWHUCVCNUEJJP15035DSYB17331f12Get hashmaliciousUnknownBrowse
                                                • 217.20.57.18
                                                https://click.pstmrk.it/3s/app.markup.io%2Finvite%2Faccept%2FGAelUtD0/OI9N/z2q4AQ/AQ/914fb818-2548-4566-aa09-a2d85ddc613b/2/KJFV2S8GzwGet hashmaliciousUnknownBrowse
                                                • 217.20.57.19
                                                Review_and_Approve25534.pdfGet hashmaliciousUnknownBrowse
                                                • 217.20.57.18
                                                Demande de proposition du Service d'aide aux N#U00e9o-Canadiens.pdfGet hashmaliciousUnknownBrowse
                                                • 217.20.57.34
                                                https://www.cognitoforms.com/f/Bj0I4KTKbkCO-wVp9VSRWQ/1Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                • 217.20.57.34
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CLOUDFLARENETUSJ1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                bC7vK74a5a.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                file.exeGet hashmaliciousLummaCBrowse
                                                • 104.21.53.8
                                                G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.1.5
                                                oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.0.5
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                3b5074b1b5d032e5620f69f9f700ff0eJ1un7vGf29.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                bC7vK74a5a.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                                                • 172.67.72.57
                                                gtIVRm5dHl.htmGet hashmaliciousUnknownBrowse
                                                • 172.67.72.57
                                                No context
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):65536
                                                Entropy (8bit):0.9991865584947253
                                                Encrypted:false
                                                SSDEEP:192:C4ywUg707q+I3EjXVmUzuiFRZ24lO8eA:RywUgI7jI3EjRzuiFRY4lO8e
                                                MD5:ED92580E0029BD6758442EBD922CD38A
                                                SHA1:EA76406CAE0004178C6AE7FB7A1A067095DC072C
                                                SHA-256:632B9AF4359DA635B36FC4BB3023861EA273F53AB415BFD9729EE2840A7CE271
                                                SHA-512:4603B2E5B097028F4F65884CF341DD95F46F15E25B0568566EA818EB333C2482E69FCB2CCE0169EBCABCE60326CCD5F63BE58D68F896B2C2A0361DAD73BE970A
                                                Malicious:true
                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.2.6.1.3.0.1.8.0.2.6.5.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.2.6.1.3.0.7.5.8.3.9.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.e.0.7.7.2.3.6.-.5.4.d.9.-.4.c.6.a.-.a.f.b.3.-.7.5.7.3.b.0.4.b.a.8.6.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.9.8.2.2.3.0.c.-.b.8.1.7.-.4.f.6.2.-.9.2.4.c.-.2.8.d.0.e.8.1.2.1.0.f.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.l.v.X.R.l.e.x.B.n.b...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.e.4.-.0.0.0.1.-.0.0.1.4.-.d.6.3.d.-.3.a.4.6.2.6.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.0.9.3.5.7.9.6.b.7.7.b.4.5.0.e.5.0.6.3.8.a.a.5.8.c.5.6.d.2.c.3.0.0.0.0.f.f.f.f.!.0.0.0.0.3.c.d.3.9.d.2.2.f.2.e.e.b.c.5.7.b.0.0.e.1.7.8.0.d.6.e.9.e.1.3.6.8.8.b.e.6.e.f.c.!.l.v.X.R.l.e.x.B.n.b...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.1.8.
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:Mini DuMP crash report, 14 streams, Sun Oct 20 19:28:50 2024, 0x1205a4 type
                                                Category:dropped
                                                Size (bytes):117012
                                                Entropy (8bit):1.5455148286243339
                                                Encrypted:false
                                                SSDEEP:384:8DCBe0ExkYRuKmszktBiX6wR5TBCadfOPLrd/DP3+cO2ASTUUUYuRkeIO6kjP/Ui:WCBe0yRuKmszhil/DOtAeIXkjPs
                                                MD5:35315DC875CFA59AB0D1EDD89E37B14E
                                                SHA1:26EB89BB198BB517F4257B5FAA649AD1FCC34270
                                                SHA-256:80067B26DED42C7FBF9BAC87179C1E07F6EBA4946643B41706D92DCB17DAAE6B
                                                SHA-512:5710B440D9960033FD4792B2D61888DE22573E3B99A11B8A2966C93EDFE1878F6634876E44F4561C6EA26C8079E1BFB4DAF27CE080CB4B4A37BA9F3E31541850
                                                Malicious:false
                                                Preview:MDMP..a..... ........Y.g............T...............\............O..........T.......8...........T...........p'............... ...........!..............................................................................eJ......."......Lw......................T............Y.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):10142
                                                Entropy (8bit):3.7135618500866534
                                                Encrypted:false
                                                SSDEEP:192:R6l7wVeJQUHmv6YS0iGHEgmfpy+QprH89baeOfCem:R6lXJrw6YBiGHEgmfprNa/fi
                                                MD5:B76AA3BA57BE38C556F7589208D29327
                                                SHA1:1AB687C1004F2C599193BCC50F0145E19C8C6D7C
                                                SHA-256:437AEDC8CF2449131C257E376BF83479B237B7FA5044DF3DD0A6E55D2A047B75
                                                SHA-512:79D3EDBD3460A01A434FEC1AC3FDB04EA7B02CCC74FCD0263EEEBB7C22405C2121CA5773467092B777FD002D0445C4FC8E4FF9D8093D2FE1875BE11FD9E8B6C8
                                                Malicious:false
                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.5.2.<./.P.i.
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):4645
                                                Entropy (8bit):4.456921251970737
                                                Encrypted:false
                                                SSDEEP:48:cvIwWl8zsjJg771I9PsWpW8VYwYm8M4J9UFXyq85ZgYK4yoEued:uIjf9I7gF7VEJkN4yHued
                                                MD5:A6DBB327898F2F7DFDA55CC8D5664F83
                                                SHA1:E0A37D9B9E62948E3C8D5C23EF2F41318C0A6627
                                                SHA-256:4DF2593BCF98ED8E12C052BB30F1FF45E874086C96B846A49F356D53D2CC7485
                                                SHA-512:627228126292497BCD744F9C575A01414870BA2B58CDED021F1ADA60519069150233B23459EC87E914BC49CAF8206D7DBDB8398AB77BE5A0C706239B1E7CDF0F
                                                Malicious:false
                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552151" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock, 0x1 compression
                                                Category:dropped
                                                Size (bytes):4770
                                                Entropy (8bit):7.946747821604857
                                                Encrypted:false
                                                SSDEEP:96:9/nBu64pydcvOHRUfu0xK1bQYMRSRNoYmxYvk56sHMZhh4m:9/nBuP2cGxUfu6K1bpWJ6vfh4m
                                                MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
                                                SHA1:719C37C320F518AC168C86723724891950911CEA
                                                SHA-256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
                                                SHA-512:02F88DA4B610678C31664609BCFA9D61DB8D0B0617649981AF948F670F41A6207B4EC19FECCE7385A24E0C609CBBF3F2B79A8ACAF09A03C2C432CC4DCE75E9DB
                                                Malicious:false
                                                Preview:MSCF............,...................O.................2Wqh .disallowedcert.stl....^K...CK.wTS...:.w.K'.C0T.....Bh.{....C.).*.....Y@...(..).R."E..D^6........u....|f~3...o.3. ..SPK.k.o#...."{-.U..P........:..aPr.@.d......Dy.h.....)..:...!./\A.....A<I_<$...q.h..........'.....7....H...@`T..K.S.%...Y4..R.....`.....-....D...(..b..-c."...G.=.dx..S+..2.a.E....d.L...77J...c.[..@..iT&..^78..g....NW6.Ek..FY.F........cNt.O.*..R....*......D...... k........J.y...z.d...;.9_t...].@....yw..}.x....d.t..`f\K..;|.*h.X...4/.;.xT......q>.0...<...3...X..L$.&.,b.....\V....\......G..O..@..H3.....t..J..).x.?.{[..G>.7...<...^Q..z..Gw9P..d....i].n%K}.*z..2.Py...A..s...z..@...4..........4.....*Y.d..._Z.5.s..fl.C..#.K{9^.E...k..z.Ma..G.(.....5g. ...}.t.#4....$;.,....S@fs....k......u .^2.#_...I........;.......w..P...UCY...$;.S._|.x..dK...[i..q..^.l..A.?.....'N.. .L.l......m.*.+f#]............A.;.....Z..rIt....RW....Kr1e=8.=.z:Oi.z.d..r..C_......o...]j.N;.s....3@3.dgrv.
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):338
                                                Entropy (8bit):3.1593394788691396
                                                Encrypted:false
                                                SSDEEP:6:kKpGW3AN+SkQlPlEGYRMY9z+s3Ql2DUevat:gW3/kPlE99SCQl2DUevat
                                                MD5:63CD0032644C028FB66AB8F671E52FD4
                                                SHA1:CA41D0DEEAF7B51ED8B28EB2888FDFCF8BD7B0F7
                                                SHA-256:D0D294E11D6BE0A4684E030891E6018641C3512176A8604ECECD97B53E3EF5B2
                                                SHA-512:B052A53589E68CE919536BA05E4F172FEFFB2FEAAF3B040D05797D0DE837336CC83F13E1DFEEA5C75C2CB66AE552F1E6A934737A6E0D35B2AA30CA58FE625998
                                                Malicious:false
                                                Preview:p...... .........n#Z&#..(....................................................... .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                                                Process:C:\Windows\System32\WerFault.exe
                                                File Type:MS Windows registry file, NT/2000 or above
                                                Category:dropped
                                                Size (bytes):1835008
                                                Entropy (8bit):4.372186801462375
                                                Encrypted:false
                                                SSDEEP:6144:pFVfpi6ceLP/9skLmb0RyWWSPtaJG8nAge35OlMMhA2AX4WABlguNuiL:/V1LyWWI/glMM6kF7Mq
                                                MD5:1C6274A8B4EBE73B315A106AC716428B
                                                SHA1:37453F35010A5C5A5CD5686F86EE9D071FAC1403
                                                SHA-256:51CAA5D60269B4DF14C4B596AB91C0F4D347118A508606C22082E942C3DCB1F4
                                                SHA-512:D3ED95AB6A45519B035391D5A4814113E95C80E4825444BF5CD8949AC2715E7F77CF3D80CF7A89FD47985086691FD28901FA7738E3AC35C2A77B329F7E9CF0DF
                                                Malicious:false
                                                Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..MJ&#..............................................................................................................................................................................................................................................................................................................................................J.Z~........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\System32\cmd.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):44
                                                Entropy (8bit):4.003997527334849
                                                Encrypted:false
                                                SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                                MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                                SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                                SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                                SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                                Malicious:false
                                                Preview:The system cannot find the file specified...
                                                File type:PE32+ executable (console) x86-64, for MS Windows
                                                Entropy (8bit):6.423105909371356
                                                TrID:
                                                • Win64 Executable Console (202006/5) 92.65%
                                                • Win64 Executable (generic) (12005/4) 5.51%
                                                • Generic Win/DOS Executable (2004/3) 0.92%
                                                • DOS Executable Generic (2002/1) 0.92%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:lvXRlexBnb.exe
                                                File size:506'368 bytes
                                                MD5:88300378266b63b920d5a064c201100f
                                                SHA1:3cd39d22f2eebc57b00e1780d6e9e13688be6efc
                                                SHA256:e84ca1288f8a7b2e5fd2a57c8896e0125566cd56b718ddbd1b5bdc7e56161faa
                                                SHA512:092887319f9949cf95c6c8db2b41bddc039450970834f396698ccd63930b9888905566d3aef85c24c6756d1efc8f22fc8be19036f81681d18fa79b755fec53e4
                                                SSDEEP:6144:ri8fZ/nLeOlMAiyTI+BS6oIC2Dbe/MZWdLpID+RMcA2dHDad2m29yFfCPaf1:rTfFOf8IyS4LDb6dlIDuzAIOb9fCif1
                                                TLSH:3DB46D56A7A807E9D1A7D03CC547C603E7B6B4991311DBDB43A0CA791F63BE12E3A720
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._.+.B...PHE.^...PH..v...PH..\...PH..R...PH..P.......A...V...s.......?...9H..T...9H..W...9HG.W...9H..W...RichV..
                                                Icon Hash:00928e8e8686b000
                                                Entrypoint:0x14005f9d8
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x140000000
                                                Subsystem:windows cui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x67128167 [Fri Oct 18 15:40:23 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:6
                                                OS Version Minor:0
                                                File Version Major:6
                                                File Version Minor:0
                                                Subsystem Version Major:6
                                                Subsystem Version Minor:0
                                                Import Hash:3dd1b7e6418973ac2798d88d33677d96
                                                Instruction
                                                dec eax
                                                sub esp, 28h
                                                call 00007FECC0780578h
                                                dec eax
                                                add esp, 28h
                                                jmp 00007FECC077FE67h
                                                int3
                                                int3
                                                jmp 00007FECC0780828h
                                                int3
                                                int3
                                                int3
                                                inc eax
                                                push ebx
                                                dec eax
                                                sub esp, 20h
                                                dec eax
                                                mov ebx, ecx
                                                xor ecx, ecx
                                                call dword ptr [0000178Bh]
                                                dec eax
                                                mov ecx, ebx
                                                call dword ptr [000016F2h]
                                                call dword ptr [00001774h]
                                                dec eax
                                                mov ecx, eax
                                                mov edx, C0000409h
                                                dec eax
                                                add esp, 20h
                                                pop ebx
                                                dec eax
                                                jmp dword ptr [00001770h]
                                                dec eax
                                                mov dword ptr [esp+08h], ecx
                                                dec eax
                                                sub esp, 38h
                                                mov ecx, 00000017h
                                                call dword ptr [00001764h]
                                                test eax, eax
                                                je 00007FECC077FFF9h
                                                mov ecx, 00000002h
                                                int 29h
                                                dec eax
                                                lea ecx, dword ptr [00018E12h]
                                                call 00007FECC07801BEh
                                                dec eax
                                                mov eax, dword ptr [esp+38h]
                                                dec eax
                                                mov dword ptr [00018EF9h], eax
                                                dec eax
                                                lea eax, dword ptr [esp+38h]
                                                dec eax
                                                add eax, 08h
                                                dec eax
                                                mov dword ptr [00018E89h], eax
                                                dec eax
                                                mov eax, dword ptr [00018EE2h]
                                                dec eax
                                                mov dword ptr [00018D53h], eax
                                                dec eax
                                                mov eax, dword ptr [esp+40h]
                                                dec eax
                                                mov dword ptr [00018E57h], eax
                                                mov dword ptr [00018D2Dh], C0000409h
                                                mov dword ptr [00018D27h], 00000001h
                                                mov dword ptr [00000031h], 00000000h
                                                Programming Language:
                                                • [IMP] VS2008 SP1 build 30729
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x760f00x1cc.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x7d0000x1e8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x790000x3f84.pdata
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x4e4.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x6ffd00x70.rdata
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x700800x28.rdata
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6fe900x140.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x610000x818.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x5fda80x5fe007aff1316ebc8f292682a7ae508a8a06eFalse0.5326912891134289data6.336112958608718IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x610000x16b920x16c0028661b9a68b3efca9ea7a5daaf233c49False0.3797540350274725data5.5777189277970605IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x780000xdf80x4003cfa1d3706d13e34002335316e18545cFalse0.212890625data2.4386708342051575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .pdata0x790000x3f840x400050e902fb009b515c9924ff6238b5e51dFalse0.48175048828125data5.776998787420237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0x7d0000x1e80x2007d03a0f9d3c3a10dec18b513161e66d8False0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x7e0000x4e40x6000fffa779ce3f96440fc92f1aa0c636a8False0.5123697916666666data4.824092949506385IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_MANIFEST0x7d0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                                DLLImport
                                                KERNEL32.dllWideCharToMultiByte, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, GetProcAddress, GetModuleHandleA, FreeLibrary, GetSystemDirectoryA, CreateFileA, VerSetConditionMask, SleepEx, LeaveCriticalSection, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileSizeEx, WaitForMultipleObjects, PeekNamedPipe, ReadFile, GetFileType, GetEnvironmentVariableA, MultiByteToWideChar, WaitForSingleObjectEx, QueryPerformanceFrequency, GetSystemTimeAsFileTime, MoveFileExA, DeleteCriticalSection, GetLastError, InitializeCriticalSectionEx, OutputDebugStringW, InitializeSListHead, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, Sleep, GetStdHandle
                                                USER32.dllGetWindowLongPtrA, SetWindowLongPtrA, MessageBoxA, SetLayeredWindowAttributes
                                                ADVAPI32.dllCryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt
                                                SHELL32.dllShellExecuteA
                                                MSVCP140.dll?_Xlength_error@std@@YAXPEBD@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                                urlmon.dllURLDownloadToFileA
                                                Normaliz.dllIdnToAscii
                                                WLDAP32.dll
                                                CRYPT32.dllCertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CertFreeCertificateChain, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore, CryptDecodeObjectEx
                                                WS2_32.dllgethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, ioctlsocket, listen, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, ntohl, __WSAFDIsSet
                                                VCRUNTIME140.dll__std_exception_copy, __std_exception_destroy, _CxxThrowException, memcpy, memset, __std_terminate, __C_specific_handler, __current_exception_context, __current_exception, memchr, memcmp, strchr, strstr, memmove, strrchr
                                                VCRUNTIME140_1.dll__CxxFrameHandler4
                                                api-ms-win-crt-runtime-l1-1-0.dll_invalid_parameter_noinfo_noreturn, _beginthreadex, _errno, __sys_nerr, _getpid, exit, system, terminate, _register_thread_local_exe_atexit_callback, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, strerror, _c_exit, _initterm, _initterm_e, _exit, __p___argv, __p___argc, _get_initial_narrow_environment
                                                api-ms-win-crt-heap-l1-1-0.dllrealloc, _callnewh, free, calloc, _set_new_mode, malloc
                                                api-ms-win-crt-utility-l1-1-0.dllrand, qsort
                                                api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, __acrt_iob_func, ftell, fputc, _lseeki64, _read, _write, _close, _open, fflush, __stdio_common_vsscanf, __stdio_common_vsprintf, fread, fputs, fopen, fwrite, fgets, fclose, _set_fmode
                                                api-ms-win-crt-convert-l1-1-0.dllstrtod, atoi, strtoul, strtoull, strtol, strtoll
                                                api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, localeconv
                                                api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                                api-ms-win-crt-string-l1-1-0.dllstrcmp, strncmp, isupper, strcspn, strspn, _strdup, strncpy, tolower, strpbrk
                                                api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _unlink, _access, _fstat64
                                                api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 20, 2024 21:28:46.856409073 CEST49708443192.168.2.8172.67.72.57
                                                Oct 20, 2024 21:28:46.856432915 CEST44349708172.67.72.57192.168.2.8
                                                Oct 20, 2024 21:28:46.856482029 CEST49708443192.168.2.8172.67.72.57
                                                Oct 20, 2024 21:28:46.865602016 CEST49708443192.168.2.8172.67.72.57
                                                Oct 20, 2024 21:28:46.865617037 CEST44349708172.67.72.57192.168.2.8
                                                Oct 20, 2024 21:28:47.644474030 CEST44349708172.67.72.57192.168.2.8
                                                Oct 20, 2024 21:28:47.644603014 CEST49708443192.168.2.8172.67.72.57
                                                Oct 20, 2024 21:28:47.648488998 CEST49708443192.168.2.8172.67.72.57
                                                Oct 20, 2024 21:28:47.648502111 CEST44349708172.67.72.57192.168.2.8
                                                Oct 20, 2024 21:28:47.648828983 CEST44349708172.67.72.57192.168.2.8
                                                Oct 20, 2024 21:28:47.651231050 CEST49708443192.168.2.8172.67.72.57
                                                Oct 20, 2024 21:28:47.695403099 CEST44349708172.67.72.57192.168.2.8
                                                Oct 20, 2024 21:28:48.009427071 CEST44349708172.67.72.57192.168.2.8
                                                Oct 20, 2024 21:28:48.009485006 CEST44349708172.67.72.57192.168.2.8
                                                Oct 20, 2024 21:28:48.010353088 CEST49708443192.168.2.8172.67.72.57
                                                Oct 20, 2024 21:29:44.734922886 CEST49708443192.168.2.8172.67.72.57
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 20, 2024 21:28:46.843395948 CEST6378453192.168.2.81.1.1.1
                                                Oct 20, 2024 21:28:46.850542068 CEST53637841.1.1.1192.168.2.8
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 20, 2024 21:28:46.843395948 CEST192.168.2.81.1.1.10xb55aStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 20, 2024 21:28:46.850542068 CEST1.1.1.1192.168.2.80xb55aNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                                Oct 20, 2024 21:28:46.850542068 CEST1.1.1.1192.168.2.80xb55aNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                                Oct 20, 2024 21:28:46.850542068 CEST1.1.1.1192.168.2.80xb55aNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                                Oct 20, 2024 21:28:53.962538004 CEST1.1.1.1192.168.2.80x6eb7No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
                                                Oct 20, 2024 21:28:53.962538004 CEST1.1.1.1192.168.2.80x6eb7No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.34A (IP address)IN (0x0001)false
                                                Oct 20, 2024 21:28:53.962538004 CEST1.1.1.1192.168.2.80x6eb7No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.18A (IP address)IN (0x0001)false
                                                Oct 20, 2024 21:30:11.571296930 CEST1.1.1.1192.168.2.80x60b3No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                Oct 20, 2024 21:30:11.571296930 CEST1.1.1.1192.168.2.80x60b3No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                • keyauth.win
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.849708172.67.72.574437652C:\Users\user\Desktop\lvXRlexBnb.exe
                                                TimestampBytes transferredDirectionData
                                                2024-10-20 19:28:47 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                                Host: keyauth.win
                                                Accept: */*
                                                Content-Length: 58
                                                Content-Type: application/x-www-form-urlencoded
                                                2024-10-20 19:28:47 UTC58OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 38 2e 32 26 6e 61 6d 65 3d 6c 6f 61 64 65 72 20 70 72 69 6e 63 69 70 61 6c 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                                Data Ascii: type=init&ver=8.2&name=loader principal&ownerid=9WIvTVJa9m


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Users\user\Desktop\lvXRlexBnb.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\lvXRlexBnb.exe"
                                                Imagebase:0x7ff79b6e0000
                                                File size:506'368 bytes
                                                MD5 hash:88300378266B63B920D5A064C201100F
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6ee680000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:2
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\taskkill.exe
                                                Wow64 process (32bit):false
                                                Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                Imagebase:0x7ff638780000
                                                File size:101'376 bytes
                                                MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:5
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:6
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\taskkill.exe
                                                Wow64 process (32bit):false
                                                Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                Imagebase:0x7ff638780000
                                                File size:101'376 bytes
                                                MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:7
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:8
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\taskkill.exe
                                                Wow64 process (32bit):false
                                                Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                Imagebase:0x7ff638780000
                                                File size:101'376 bytes
                                                MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:9
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:10
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:sc stop HTTPDebuggerPro
                                                Imagebase:0x7ff655a10000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:11
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:12
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:sc stop HTTPDebuggerProSdk
                                                Imagebase:0x7ff655a10000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:13
                                                Start time:15:28:43
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:14
                                                Start time:15:28:44
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:15
                                                Start time:15:28:44
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\taskkill.exe
                                                Wow64 process (32bit):false
                                                Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                Imagebase:0x7ff638780000
                                                File size:101'376 bytes
                                                MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:16
                                                Start time:15:28:44
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:17
                                                Start time:15:28:44
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\taskkill.exe
                                                Wow64 process (32bit):false
                                                Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                Imagebase:0x7ff638780000
                                                File size:101'376 bytes
                                                MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:18
                                                Start time:15:28:44
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:19
                                                Start time:15:28:44
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\taskkill.exe
                                                Wow64 process (32bit):false
                                                Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                Imagebase:0x7ff638780000
                                                File size:101'376 bytes
                                                MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:20
                                                Start time:15:28:45
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:21
                                                Start time:15:28:45
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:sc stop HTTPDebuggerPro
                                                Imagebase:0x7ff655a10000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:22
                                                Start time:15:28:45
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:23
                                                Start time:15:28:45
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:sc stop HTTPDebuggerProSdk
                                                Imagebase:0x7ff655a10000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:24
                                                Start time:15:28:45
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:25
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:26
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\taskkill.exe
                                                Wow64 process (32bit):false
                                                Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                                Imagebase:0x7ff638780000
                                                File size:101'376 bytes
                                                MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:27
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:28
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\taskkill.exe
                                                Wow64 process (32bit):false
                                                Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                                Imagebase:0x7ff638780000
                                                File size:101'376 bytes
                                                MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:29
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:30
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\taskkill.exe
                                                Wow64 process (32bit):false
                                                Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                                Imagebase:0x7ff638780000
                                                File size:101'376 bytes
                                                MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:31
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:32
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:sc stop HTTPDebuggerPro
                                                Imagebase:0x7ff655a10000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:33
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:34
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\sc.exe
                                                Wow64 process (32bit):false
                                                Commandline:sc stop HTTPDebuggerProSdk
                                                Imagebase:0x7ff655a10000
                                                File size:72'192 bytes
                                                MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:35
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                                Imagebase:0x7ff79c520000
                                                File size:289'792 bytes
                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Target ID:38
                                                Start time:15:28:49
                                                Start date:20/10/2024
                                                Path:C:\Windows\System32\WerFault.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\WerFault.exe -u -p 7652 -s 944
                                                Imagebase:0x7ff732eb0000
                                                File size:570'736 bytes
                                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:4.3%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:23.9%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:90
                                                  execution_graph 47032 7ff79b6f80b5 47033 7ff79b6f80c4 47032->47033 47034 7ff79b6f80e3 47032->47034 47035 7ff79b6f80d5 47033->47035 47093 7ff79b6f84a0 47033->47093 47050 7ff79b6f727b 47034->47050 47097 7ff79b6f5a20 15 API calls 47034->47097 47052 7ff79b6f6d00 47035->47052 47040 7ff79b6f8322 47041 7ff79b6f8313 47101 7ff79b705970 19 API calls 47041->47101 47042 7ff79b6f84a0 17 API calls 47042->47050 47047 7ff79b705970 19 API calls 47048 7ff79b6f731e 47047->47048 47048->47047 47048->47050 47050->47040 47050->47041 47050->47042 47050->47048 47051 7ff79b6f6d00 292 API calls 47050->47051 47086 7ff79b7071f0 47050->47086 47092 7ff79b705970 19 API calls 47050->47092 47098 7ff79b701430 90 API calls 47050->47098 47099 7ff79b6f5a20 15 API calls 47050->47099 47100 7ff79b7151e0 22 API calls 47050->47100 47051->47050 47053 7ff79b6f6e12 47052->47053 47054 7ff79b6f6d3c 47052->47054 47127 7ff79b73f580 47053->47127 47102 7ff79b6faf50 47054->47102 47057 7ff79b6f6d47 free free 47059 7ff79b6f6d77 47057->47059 47060 7ff79b6f6db5 47059->47060 47126 7ff79b714cc0 22 API calls 47059->47126 47062 7ff79b6f84a0 17 API calls 47060->47062 47064 7ff79b6f6dcf 47062->47064 47063 7ff79b6f6e7c 47120 7ff79b70e520 47063->47120 47064->47053 47064->47063 47136 7ff79b70eee0 free free free free 47064->47136 47068 7ff79b6f6eab 47069 7ff79b6f6eb0 free 47068->47069 47069->47069 47070 7ff79b6f6ece 47069->47070 47071 7ff79b6f6ffb 47070->47071 47073 7ff79b6f6f37 47070->47073 47153 7ff79b701430 90 API calls 47071->47153 47137 7ff79b708e80 47073->47137 47075 7ff79b6f702d 47154 7ff79b7015b0 292 API calls 47075->47154 47076 7ff79b6f6f96 47140 7ff79b6fe740 92 API calls 47076->47140 47079 7ff79b6f6fb7 47080 7ff79b6f6fe5 47079->47080 47081 7ff79b6f6fbb 47079->47081 47152 7ff79b7015b0 292 API calls 47080->47152 47141 7ff79b705af0 47081->47141 47087 7ff79b70723a 47086->47087 47089 7ff79b70725a 47087->47089 47163 7ff79b70d7b0 47087->47163 47090 7ff79b73f580 8 API calls 47089->47090 47091 7ff79b7072ee 47090->47091 47091->47050 47092->47050 47094 7ff79b6f84b7 47093->47094 47096 7ff79b6f84f0 47093->47096 47166 7ff79b6f57f0 17 API calls 47094->47166 47096->47035 47097->47050 47098->47050 47099->47050 47100->47050 47101->47040 47103 7ff79b6faf65 47102->47103 47104 7ff79b6faf77 47102->47104 47103->47104 47105 7ff79b6faf6b 47103->47105 47107 7ff79b6fb114 free 47104->47107 47108 7ff79b6fb088 EnterCriticalSection LeaveCriticalSection 47104->47108 47155 7ff79b718da0 WaitForSingleObjectEx CloseHandle 47105->47155 47107->47057 47110 7ff79b6fb0c1 CloseHandle 47108->47110 47111 7ff79b6fb0cb 47108->47111 47109 7ff79b6faf70 47109->47104 47112 7ff79b6fb0ec 47110->47112 47113 7ff79b6fb0d1 47111->47113 47114 7ff79b6fb0d9 47111->47114 47116 7ff79b6fb101 closesocket 47112->47116 47158 7ff79b6f5b00 free 47112->47158 47156 7ff79b718da0 WaitForSingleObjectEx CloseHandle 47113->47156 47157 7ff79b6fb130 7 API calls 47114->47157 47116->47107 47118 7ff79b6fb0e2 free 47118->47112 47121 7ff79b70e541 47120->47121 47125 7ff79b70e59a 47120->47125 47123 7ff79b70e563 _time64 47121->47123 47121->47125 47122 7ff79b73f580 8 API calls 47124 7ff79b6f6e8b free 47122->47124 47123->47125 47124->47068 47124->47070 47125->47122 47126->47060 47128 7ff79b73f589 47127->47128 47129 7ff79b6f6e47 47128->47129 47130 7ff79b73fa28 IsProcessorFeaturePresent 47128->47130 47129->47034 47131 7ff79b73fa40 47130->47131 47159 7ff79b73fc1c RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 47131->47159 47133 7ff79b73fa53 47160 7ff79b73f9f4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47133->47160 47136->47063 47161 7ff79b709840 13 API calls 47137->47161 47139 7ff79b708eb3 47139->47076 47140->47079 47142 7ff79b6f6fd6 47141->47142 47143 7ff79b705af9 47141->47143 47151 7ff79b7015b0 292 API calls 47142->47151 47150 7ff79b705bc9 47143->47150 47162 7ff79b708f80 13 API calls 47143->47162 47144 7ff79b73f580 8 API calls 47144->47142 47146 7ff79b705bb1 47148 7ff79b705bfe fwrite fwrite 47146->47148 47146->47150 47147 7ff79b705b4c 47147->47146 47149 7ff79b708e80 13 API calls 47147->47149 47148->47150 47149->47146 47150->47144 47153->47075 47155->47109 47156->47114 47157->47118 47158->47116 47159->47133 47161->47139 47162->47147 47164 7ff79b70d7fd GetTickCount 47163->47164 47165 7ff79b70d7c2 QueryPerformanceCounter 47163->47165 47164->47089 47165->47089 47166->47096 47167 7ff79b6fac10 47168 7ff79b6fac54 47167->47168 47169 7ff79b6fac64 47167->47169 47212 7ff79b70e0f0 47168->47212 47170 7ff79b70d7b0 2 API calls 47169->47170 47172 7ff79b6faca6 47170->47172 47178 7ff79b6fb2b0 calloc 47172->47178 47175 7ff79b6facc5 47176 7ff79b6facce 47219 7ff79b705970 19 API calls 47176->47219 47179 7ff79b6fb301 malloc 47178->47179 47180 7ff79b6fb43e _errno 47178->47180 47182 7ff79b6fb38c InitializeCriticalSectionEx 47179->47182 47183 7ff79b6fb3b7 47179->47183 47181 7ff79b6facc1 47180->47181 47181->47175 47181->47176 47220 7ff79b714a60 socket 47182->47220 47185 7ff79b6fb3e0 free 47183->47185 47186 7ff79b6fb3d0 DeleteCriticalSection free 47183->47186 47188 7ff79b6fb3f3 47185->47188 47189 7ff79b6fb3f8 47185->47189 47186->47185 47240 7ff79b718680 free free free 47188->47240 47192 7ff79b6fb402 closesocket 47189->47192 47193 7ff79b6fb408 free 47189->47193 47190 7ff79b6fb466 _strdup 47190->47183 47194 7ff79b6fb480 free _strdup 47190->47194 47192->47193 47193->47180 47195 7ff79b6fb4a2 47194->47195 47196 7ff79b6fb4ce 47194->47196 47239 7ff79b718d50 _beginthreadex 47195->47239 47198 7ff79b6fb551 free 47196->47198 47199 7ff79b6fb4da EnterCriticalSection LeaveCriticalSection 47196->47199 47198->47180 47201 7ff79b6fb515 47199->47201 47202 7ff79b6fb504 CloseHandle 47199->47202 47200 7ff79b6fb4b6 47200->47181 47203 7ff79b6fb4be _errno 47200->47203 47204 7ff79b6fb522 47201->47204 47205 7ff79b6fb51a 47201->47205 47207 7ff79b6fb538 47202->47207 47203->47196 47242 7ff79b6fb130 7 API calls 47204->47242 47241 7ff79b718da0 WaitForSingleObjectEx CloseHandle 47205->47241 47208 7ff79b6fb548 closesocket 47207->47208 47243 7ff79b6f5b00 free 47207->47243 47208->47198 47210 7ff79b6fb52b free 47210->47207 47213 7ff79b70e0f9 47212->47213 47214 7ff79b70e10f socket 47212->47214 47213->47169 47215 7ff79b70e12c 47214->47215 47216 7ff79b70e125 47214->47216 47244 7ff79b7065d0 47215->47244 47216->47169 47218 7ff79b70e136 47218->47169 47219->47175 47221 7ff79b714ab0 47220->47221 47222 7ff79b714ab5 htonl setsockopt 47220->47222 47225 7ff79b73f580 8 API calls 47221->47225 47223 7ff79b714c3b closesocket closesocket closesocket 47222->47223 47224 7ff79b714b14 bind 47222->47224 47223->47221 47224->47223 47226 7ff79b714b2f getsockname 47224->47226 47227 7ff79b6fb3af 47225->47227 47226->47223 47228 7ff79b714b4b listen 47226->47228 47227->47183 47227->47190 47228->47223 47229 7ff79b714b60 socket 47228->47229 47229->47223 47230 7ff79b714b7b connect 47229->47230 47230->47223 47231 7ff79b714b96 accept 47230->47231 47231->47223 47232 7ff79b714bb2 47231->47232 47233 7ff79b708e80 13 API calls 47232->47233 47234 7ff79b714bc9 send 47233->47234 47234->47223 47236 7ff79b714bfa recv 47234->47236 47236->47223 47237 7ff79b714c18 memcmp 47236->47237 47237->47223 47238 7ff79b714c2e closesocket 47237->47238 47238->47221 47239->47200 47240->47189 47241->47204 47242->47210 47243->47208 47245 7ff79b7065e5 47244->47245 47246 7ff79b706610 closesocket 47244->47246 47247 7ff79b706601 47245->47247 47249 7ff79b706626 47245->47249 47246->47218 47252 7ff79b6f5b00 free 47247->47252 47253 7ff79b6f5b00 free 47249->47253 47251 7ff79b70662e 47251->47218 47252->47246 47253->47251 47254 7ff79b73f85c 47255 7ff79b73f875 47254->47255 47256 7ff79b73f87d 47255->47256 47257 7ff79b73f9b3 47255->47257 47259 7ff79b73f9bd 47256->47259 47262 7ff79b73f89b __scrt_release_startup_lock 47256->47262 47340 7ff79b73fd4c 9 API calls 47257->47340 47341 7ff79b73fd4c 9 API calls 47259->47341 47261 7ff79b73f9c8 47264 7ff79b73f9d0 _exit 47261->47264 47263 7ff79b73f8c0 47262->47263 47265 7ff79b73f946 _get_initial_narrow_environment __p___argv __p___argc 47262->47265 47269 7ff79b73f93e _register_thread_local_exe_atexit_callback 47262->47269 47274 7ff79b6f1530 rand 47265->47274 47269->47265 47275 7ff79b6f1583 47274->47275 47275->47275 47342 7ff79b6f0580 47275->47342 47277 7ff79b6f1595 rand 47278 7ff79b6f1633 SetConsoleTitleA 47277->47278 47279 7ff79b6f15c0 47277->47279 47280 7ff79b6f1685 8 API calls 47278->47280 47281 7ff79b6f1651 47278->47281 47282 7ff79b6f15c2 rand 47279->47282 47288 7ff79b6f162f 47279->47288 47446 7ff79b6f0680 7 API calls Concurrency::cancel_current_task 47279->47446 47361 7ff79b6e2aa0 47280->47361 47283 7ff79b6f1680 47281->47283 47285 7ff79b6f1679 _invalid_parameter_noinfo_noreturn 47281->47285 47282->47279 47283->47280 47285->47283 47288->47278 47340->47259 47341->47261 47343 7ff79b6f05a6 47342->47343 47344 7ff79b6f0671 47342->47344 47345 7ff79b6f05b4 memcpy 47343->47345 47346 7ff79b6f05cc 47343->47346 47469 7ff79b6e1a90 ?_Xlength_error@std@@YAXPEBD 47344->47469 47345->47277 47348 7ff79b6f05dd 47346->47348 47349 7ff79b6f0676 47346->47349 47350 7ff79b6f0634 47346->47350 47467 7ff79b73f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47348->47467 47470 7ff79b6e19f0 __std_exception_copy Concurrency::cancel_current_task 47349->47470 47351 7ff79b6f0643 47350->47351 47352 7ff79b6f0639 47350->47352 47357 7ff79b6f0645 memcpy 47351->47357 47468 7ff79b73f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47352->47468 47355 7ff79b6f067c 47357->47277 47358 7ff79b6f05f3 47359 7ff79b6f062d _invalid_parameter_noinfo_noreturn 47358->47359 47360 7ff79b6f05f8 47358->47360 47359->47350 47360->47357 47471 7ff79b6e2840 47361->47471 47363 7ff79b6e2aea 47364 7ff79b6e30a8 47363->47364 47484 7ff79b6e3160 47363->47484 47546 7ff79b6e3120 7 API calls 47364->47546 47367 7ff79b6e3104 Sleep exit 47368 7ff79b6e3118 47367->47368 47547 7ff79b6e19f0 __std_exception_copy Concurrency::cancel_current_task 47368->47547 47369 7ff79b6e2b6f 47496 7ff79b6e3c30 47369->47496 47372 7ff79b6e311d 47373 7ff79b6e2b7c 47503 7ff79b6e32d0 47373->47503 47375 7ff79b6e2bac 47376 7ff79b6e3c30 10 API calls 47375->47376 47377 7ff79b6e2bb8 47376->47377 47511 7ff79b6e33d0 47377->47511 47379 7ff79b6e2beb 47380 7ff79b6e3c30 10 API calls 47379->47380 47381 7ff79b6e2bf8 47380->47381 47382 7ff79b6e2c4f 47381->47382 47384 7ff79b6e2c48 _invalid_parameter_noinfo_noreturn 47381->47384 47383 7ff79b6e2c9f 47382->47383 47387 7ff79b6e2c98 _invalid_parameter_noinfo_noreturn 47382->47387 47385 7ff79b6e2cde 47383->47385 47388 7ff79b6e2cd7 _invalid_parameter_noinfo_noreturn 47383->47388 47384->47382 47386 7ff79b6e2d2c 47385->47386 47391 7ff79b6e2d25 _invalid_parameter_noinfo_noreturn 47385->47391 47389 7ff79b6e2d6b 47386->47389 47393 7ff79b6e2d64 _invalid_parameter_noinfo_noreturn 47386->47393 47387->47383 47388->47385 47389->47368 47390 7ff79b6e2db9 47389->47390 47392 7ff79b6e2e1f 47389->47392 47395 7ff79b6e2dfa 47389->47395 47519 7ff79b6e3550 47390->47519 47391->47386 47396 7ff79b6e2e24 47392->47396 47397 7ff79b6e2e2b 47392->47397 47393->47389 47535 7ff79b73f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47395->47535 47536 7ff79b73f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47396->47536 47401 7ff79b6e2e2e memcpy 47397->47401 47401->47390 47402 7ff79b6e2840 6 API calls 47405 7ff79b6e2e60 47402->47405 47403 7ff79b6e2e02 47404 7ff79b6e2e0a 47403->47404 47406 7ff79b6e2e18 _invalid_parameter_noinfo_noreturn 47403->47406 47404->47401 47537 7ff79b6e4bd0 111 API calls 47405->47537 47406->47392 47408 7ff79b6e2e75 47538 7ff79b6e48c0 19 API calls 47408->47538 47446->47279 47467->47358 47468->47360 47470->47355 47472 7ff79b6e2890 47471->47472 47472->47472 47473 7ff79b6e28a0 system 47472->47473 47474 7ff79b6e2900 47473->47474 47474->47474 47475 7ff79b6e2910 system 47474->47475 47476 7ff79b6e2960 47475->47476 47476->47476 47477 7ff79b6e2970 system 47476->47477 47478 7ff79b6e29b0 47477->47478 47478->47478 47479 7ff79b6e29c0 system 47478->47479 47480 7ff79b6e2a00 47479->47480 47480->47480 47481 7ff79b6e2a10 system 47480->47481 47482 7ff79b6e2a70 47481->47482 47482->47482 47483 7ff79b6e2a80 system 47482->47483 47483->47363 47485 7ff79b6e317e 47484->47485 47486 7ff79b6e31c8 47485->47486 47575 7ff79b6e4310 7 API calls Concurrency::cancel_current_task 47485->47575 47488 7ff79b6e3227 47486->47488 47576 7ff79b6e4310 7 API calls Concurrency::cancel_current_task 47486->47576 47548 7ff79b6e5dd0 47488->47548 47492 7ff79b6e3276 47493 7ff79b6e32b7 47492->47493 47495 7ff79b6e32b0 _invalid_parameter_noinfo_noreturn 47492->47495 47493->47369 47494 7ff79b6e326f _invalid_parameter_noinfo_noreturn 47494->47492 47495->47493 47497 7ff79b6e3c4d 47496->47497 47498 7ff79b6e3c63 memcpy 47497->47498 47499 7ff79b6e3ca8 47497->47499 47498->47373 47581 7ff79b6e4eb0 9 API calls Concurrency::cancel_current_task 47499->47581 47502 7ff79b6e3cbb 47502->47373 47504 7ff79b6e32ee 47503->47504 47505 7ff79b6e3338 47504->47505 47588 7ff79b6e4310 7 API calls Concurrency::cancel_current_task 47504->47588 47582 7ff79b6e6dd0 47505->47582 47508 7ff79b6e3354 47509 7ff79b6e33b7 47508->47509 47510 7ff79b6e33b0 _invalid_parameter_noinfo_noreturn 47508->47510 47509->47375 47510->47509 47512 7ff79b6e33ee 47511->47512 47513 7ff79b6e3438 47512->47513 47590 7ff79b6e4310 7 API calls Concurrency::cancel_current_task 47512->47590 47515 7ff79b6e6dd0 12 API calls 47513->47515 47516 7ff79b6e3454 47515->47516 47517 7ff79b6e34b7 47516->47517 47518 7ff79b6e34b0 _invalid_parameter_noinfo_noreturn 47516->47518 47517->47379 47518->47517 47520 7ff79b6e2840 6 API calls 47519->47520 47521 7ff79b6e358c 47520->47521 47591 7ff79b6f1ad0 47521->47591 47523 7ff79b6e3591 47524 7ff79b6e359d 47523->47524 47529 7ff79b6e3632 47523->47529 47620 7ff79b6e4310 7 API calls Concurrency::cancel_current_task 47524->47620 47526 7ff79b73f580 8 API calls 47528 7ff79b6e2e5a 47526->47528 47527 7ff79b6e378a _invalid_parameter_noinfo_noreturn 47528->47402 47599 7ff79b6f1b90 47529->47599 47531 7ff79b6e370e 47532 7ff79b6e35c1 47531->47532 47533 7ff79b6e3719 MessageBoxA 47531->47533 47532->47527 47534 7ff79b6e35f4 47532->47534 47533->47532 47534->47526 47535->47403 47536->47404 47537->47408 47546->47367 47547->47372 47549 7ff79b6e5e6f 47548->47549 47550 7ff79b6e5e1a 47548->47550 47552 7ff79b6e5e77 memcpy 47549->47552 47557 7ff79b6e5ecb 47549->47557 47550->47549 47551 7ff79b6e5e1f memcpy 47550->47551 47555 7ff79b6e323a 47551->47555 47553 7ff79b6e5eb4 memcpy 47552->47553 47554 7ff79b6e5eb1 47552->47554 47553->47555 47554->47553 47555->47492 47555->47494 47558 7ff79b6e5f49 47557->47558 47561 7ff79b6e5fac 47557->47561 47562 7ff79b6e5f27 47557->47562 47571 7ff79b6e5fb1 47557->47571 47563 7ff79b6e5f56 memcpy 47558->47563 47564 7ff79b6e5f4e 47558->47564 47579 7ff79b6e19f0 __std_exception_copy Concurrency::cancel_current_task 47561->47579 47577 7ff79b73f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47562->47577 47569 7ff79b6e5f83 memcpy 47563->47569 47570 7ff79b6e5f80 47563->47570 47578 7ff79b73f1f0 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task 47564->47578 47569->47555 47570->47569 47580 7ff79b6e1a90 ?_Xlength_error@std@@YAXPEBD 47571->47580 47572 7ff79b6e5f2f 47573 7ff79b6e5f34 47572->47573 47574 7ff79b6e5f42 _invalid_parameter_noinfo_noreturn 47572->47574 47573->47563 47574->47558 47575->47486 47576->47488 47577->47572 47578->47573 47579->47571 47581->47502 47583 7ff79b6e6e95 47582->47583 47587 7ff79b6e6e00 memcpy memcpy memcpy 47582->47587 47589 7ff79b6ec600 9 API calls Concurrency::cancel_current_task 47583->47589 47585 7ff79b6e6eaa 47585->47508 47587->47508 47588->47505 47589->47585 47590->47513 47592 7ff79b6f1add calloc 47591->47592 47598 7ff79b6f1b40 47591->47598 47594 7ff79b6f1b32 47592->47594 47596 7ff79b6f1b6c 47594->47596 47621 7ff79b708980 47594->47621 47595 7ff79b6f1b61 47595->47523 47596->47523 47598->47596 47652 7ff79b7018b0 calloc 47598->47652 47600 7ff79b6f1b9f 47599->47600 47601 7ff79b6f1ba9 47599->47601 47600->47531 47602 7ff79b6f1bc2 47601->47602 47603 7ff79b6f1bda 47601->47603 47759 7ff79b705970 19 API calls 47602->47759 47608 7ff79b6f1bf6 47603->47608 47711 7ff79b6f5bc0 calloc 47603->47711 47605 7ff79b6f1bce 47605->47531 47607 7ff79b6f1bfe 47607->47531 47608->47607 47739 7ff79b6f6470 47608->47739 47610 7ff79b6f1c52 47611 7ff79b6f1c58 47610->47611 47618 7ff79b6f1c83 47610->47618 47760 7ff79b6f6620 292 API calls 47611->47760 47613 7ff79b6f1c60 47613->47531 47614 7ff79b6f1cd8 47761 7ff79b6f6930 292 API calls 47614->47761 47618->47614 47746 7ff79b6f6900 47618->47746 47749 7ff79b6f67f0 47618->47749 47620->47532 47622 7ff79b70899e WSAStartup 47621->47622 47623 7ff79b7089e6 47621->47623 47625 7ff79b7089c9 47622->47625 47626 7ff79b7089b2 47622->47626 47672 7ff79b732480 47623->47672 47627 7ff79b73f580 8 API calls 47625->47627 47626->47623 47629 7ff79b7089c3 WSACleanup 47626->47629 47630 7ff79b7089de 47627->47630 47629->47625 47630->47598 47631 7ff79b708caf 47633 7ff79b73f580 8 API calls 47631->47633 47632 7ff79b7089f3 GetModuleHandleA 47634 7ff79b708a2e GetProcAddress strpbrk 47632->47634 47635 7ff79b708a22 47632->47635 47636 7ff79b708cbf 47633->47636 47638 7ff79b708a8b 47634->47638 47639 7ff79b708a65 47634->47639 47637 7ff79b708bb3 7 API calls 47635->47637 47636->47598 47637->47631 47641 7ff79b708aba GetSystemDirectoryA 47638->47641 47642 7ff79b708a90 GetProcAddress 47638->47642 47640 7ff79b708a7d LoadLibraryA 47639->47640 47645 7ff79b708a6d 47639->47645 47640->47645 47644 7ff79b708ad7 malloc 47641->47644 47641->47645 47642->47641 47643 7ff79b708aa5 LoadLibraryExA 47642->47643 47643->47645 47646 7ff79b708b69 free 47644->47646 47647 7ff79b708aec GetSystemDirectoryA 47644->47647 47645->47637 47648 7ff79b708b8e GetProcAddress 47645->47648 47646->47645 47647->47646 47649 7ff79b708afc 47647->47649 47648->47637 47650 7ff79b708b60 LoadLibraryA 47649->47650 47651 7ff79b708b56 47649->47651 47650->47651 47651->47646 47653 7ff79b7018d6 47652->47653 47654 7ff79b7018e5 47652->47654 47653->47595 47706 7ff79b6fadd0 calloc 47654->47706 47656 7ff79b701908 47657 7ff79b70190e free 47656->47657 47658 7ff79b70191c malloc 47656->47658 47659 7ff79b701c44 47657->47659 47660 7ff79b701c08 47658->47660 47661 7ff79b701937 malloc 47658->47661 47659->47595 47664 7ff79b701c14 free free 47660->47664 47661->47660 47662 7ff79b701952 __acrt_iob_func __acrt_iob_func __acrt_iob_func 47661->47662 47707 7ff79b6fbd80 memset 47662->47707 47710 7ff79b701610 free free free 47664->47710 47665 7ff79b701a72 47708 7ff79b6ff850 free realloc GetEnvironmentVariableA realloc free 47665->47708 47669 7ff79b701b36 47709 7ff79b7056f0 free free free free free 47669->47709 47671 7ff79b701bea 47671->47659 47673 7ff79b73248e 47672->47673 47674 7ff79b7089eb 47672->47674 47680 7ff79b708800 47673->47680 47674->47631 47674->47632 47678 7ff79b7324ba 47678->47674 47681 7ff79b70882d 47680->47681 47682 7ff79b7088df VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 47681->47682 47685 7ff79b708845 47681->47685 47683 7ff79b708922 VerSetConditionMask 47682->47683 47684 7ff79b708934 VerifyVersionInfoA 47682->47684 47683->47684 47684->47685 47686 7ff79b73f580 8 API calls 47685->47686 47687 7ff79b70896b 47686->47687 47688 7ff79b708660 GetModuleHandleA 47687->47688 47689 7ff79b70868a GetProcAddress strpbrk 47688->47689 47690 7ff79b708682 47688->47690 47691 7ff79b7086b7 47689->47691 47692 7ff79b7086ee 47689->47692 47690->47678 47706->47656 47707->47665 47708->47669 47709->47671 47712 7ff79b6f5bfb 47711->47712 47713 7ff79b6f5beb 47711->47713 47762 7ff79b70eaf0 47712->47762 47713->47608 47716 7ff79b6f5d17 47781 7ff79b70ddd0 free 47716->47781 47740 7ff79b6f6489 47739->47740 47741 7ff79b6f64b8 47739->47741 47740->47741 47821 7ff79b6f57f0 17 API calls 47740->47821 47741->47610 47743 7ff79b6f658d 47822 7ff79b6f62c0 10 API calls 47743->47822 47823 7ff79b6f5dc0 47746->47823 47750 7ff79b70d7b0 2 API calls 47749->47750 47759->47605 47760->47613 47763 7ff79b70de40 malloc 47762->47763 47764 7ff79b6f5c12 47763->47764 47764->47716 47765 7ff79b70de40 47764->47765 47766 7ff79b70def6 47765->47766 47767 7ff79b70de57 47765->47767 47767->47766 47821->47743 47895 7ff79b6f7570 47896 7ff79b6f7581 47895->47896 47923 7ff79b70e420 47896->47923 47898 7ff79b6f75b5 47899 7ff79b6f75e7 47898->47899 47901 7ff79b705af0 15 API calls 47898->47901 47951 7ff79b70ee70 314 API calls 47899->47951 47902 7ff79b6f75e1 47901->47902 47902->47899 47904 7ff79b6f75f7 47902->47904 47903 7ff79b6f75f4 47903->47904 47927 7ff79b6f8520 47904->47927 47908 7ff79b6f84a0 17 API calls 47920 7ff79b6f727b 47908->47920 47912 7ff79b6f8322 47913 7ff79b6f8313 47955 7ff79b705970 19 API calls 47913->47955 47917 7ff79b7071f0 10 API calls 47917->47920 47918 7ff79b705970 19 API calls 47919 7ff79b6f731e 47918->47919 47919->47918 47919->47920 47920->47908 47920->47912 47920->47913 47920->47917 47920->47919 47922 7ff79b6f6d00 292 API calls 47920->47922 47949 7ff79b705970 19 API calls 47920->47949 47952 7ff79b701430 90 API calls 47920->47952 47953 7ff79b6f5a20 15 API calls 47920->47953 47954 7ff79b7151e0 22 API calls 47920->47954 47922->47920 47924 7ff79b70e44a 47923->47924 47956 7ff79b70ef50 47924->47956 47926 7ff79b70e469 47926->47898 47931 7ff79b6f8586 47927->47931 47928 7ff79b6f87fa 47929 7ff79b6f8908 memcpy memcpy 47928->47929 47935 7ff79b6f8904 47928->47935 47972 7ff79b70ddd0 free 47928->47972 47930 7ff79b6f87f0 47929->47930 47932 7ff79b73f580 8 API calls 47930->47932 47931->47928 47934 7ff79b6f86ce calloc 47931->47934 47939 7ff79b6f86e8 47931->47939 47933 7ff79b6f7602 47932->47933 47933->47920 47943 7ff79b70eb40 47933->47943 47934->47930 47934->47939 47935->47929 47936 7ff79b70de40 malloc 47936->47939 47937 7ff79b6f87e7 free 47937->47930 47938 7ff79b70db00 malloc memcpy 47938->47939 47939->47930 47939->47931 47939->47936 47939->47937 47939->47938 47940 7ff79b6f87df 47939->47940 47971 7ff79b70ddd0 free 47940->47971 47944 7ff79b70eb59 47943->47944 47973 7ff79b701e90 47944->47973 47946 7ff79b70eb70 47947 7ff79b6f750c 47946->47947 47997 7ff79b701430 90 API calls 47946->47997 47947->47920 47950 7ff79b70b580 free 47947->47950 47949->47920 47950->47920 47951->47903 47952->47920 47953->47920 47954->47920 47955->47912 47957 7ff79b70ef90 47956->47957 47958 7ff79b70efcb 47957->47958 47960 7ff79b70efb6 tolower 47957->47960 47959 7ff79b708e80 13 API calls 47958->47959 47961 7ff79b70efe2 47959->47961 47960->47958 47960->47960 47962 7ff79b70f028 tolower 47961->47962 47967 7ff79b70f04c 47961->47967 47970 7ff79b70f0c1 47961->47970 47965 7ff79b708e80 13 API calls 47962->47965 47963 7ff79b70f086 _time64 47964 7ff79b70f0a5 47963->47964 47963->47970 47969 7ff79b705af0 15 API calls 47964->47969 47964->47970 47965->47967 47966 7ff79b73f580 8 API calls 47968 7ff79b70f0ec 47966->47968 47967->47963 47967->47970 47968->47926 47969->47970 47970->47966 47971->47937 47972->47928 47998 7ff79b715090 47973->47998 47976 7ff79b701ec5 47976->47946 47977 7ff79b701eee free 48012 7ff79b708db0 15 API calls 47977->48012 47978 7ff79b701f19 47980 7ff79b70d7b0 2 API calls 47978->47980 47982 7ff79b701f25 47978->47982 47981 7ff79b701f4f 47980->47981 47983 7ff79b701f63 47981->47983 47984 7ff79b701f91 47981->47984 47982->47946 48001 7ff79b706780 47983->48001 47986 7ff79b715090 2 API calls 47984->47986 47988 7ff79b701f9e 47986->47988 47987 7ff79b701f79 47989 7ff79b701f81 47987->47989 47990 7ff79b70d7b0 2 API calls 47987->47990 47991 7ff79b701fc1 47988->47991 47992 7ff79b715090 2 API calls 47988->47992 47989->47946 47994 7ff79b702054 47990->47994 48013 7ff79b707300 47991->48013 47992->47991 47994->47946 47996 7ff79b705af0 15 API calls 47996->47987 47997->47947 47999 7ff79b70d7b0 2 API calls 47998->47999 48000 7ff79b701eb5 47999->48000 48000->47976 48000->47977 48000->47978 48002 7ff79b70d7b0 2 API calls 48001->48002 48003 7ff79b7067a3 48002->48003 48004 7ff79b70681b 48003->48004 48007 7ff79b706834 48003->48007 48108 7ff79b705970 19 API calls 48004->48108 48006 7ff79b70682a 48010 7ff79b706941 48006->48010 48009 7ff79b70693d 48007->48009 48043 7ff79b707cc0 48007->48043 48009->48010 48109 7ff79b6f57f0 17 API calls 48009->48109 48010->47987 48012->47978 48014 7ff79b707533 48013->48014 48015 7ff79b707337 48013->48015 48016 7ff79b73f580 8 API calls 48014->48016 48015->48014 48017 7ff79b707351 getpeername 48015->48017 48018 7ff79b701fda 48016->48018 48019 7ff79b707376 WSAGetLastError 48017->48019 48020 7ff79b7073ad getsockname 48017->48020 48018->47987 48018->47996 48138 7ff79b6f2500 27 API calls 48019->48138 48021 7ff79b707400 WSAGetLastError 48020->48021 48022 7ff79b707437 48020->48022 48140 7ff79b6f2500 27 API calls 48021->48140 48142 7ff79b706530 19 API calls 48022->48142 48026 7ff79b707393 48139 7ff79b705970 19 API calls 48026->48139 48027 7ff79b70741d 48141 7ff79b705970 19 API calls 48027->48141 48028 7ff79b707459 48031 7ff79b70749d 48028->48031 48032 7ff79b70745d _errno _errno 48028->48032 48145 7ff79b706530 19 API calls 48031->48145 48143 7ff79b6f2500 27 API calls 48032->48143 48033 7ff79b7073a8 48033->48014 48036 7ff79b707483 48144 7ff79b705970 19 API calls 48036->48144 48037 7ff79b7074ef 48037->48014 48038 7ff79b7074f3 _errno _errno 48037->48038 48146 7ff79b6f2500 27 API calls 48038->48146 48041 7ff79b707519 48147 7ff79b705970 19 API calls 48041->48147 48044 7ff79b707d2f memcpy 48043->48044 48046 7ff79b707d98 socket 48044->48046 48049 7ff79b707d6b 48044->48049 48046->48049 48048 7ff79b73f580 8 API calls 48050 7ff79b70826b 48048->48050 48051 7ff79b707dd7 48049->48051 48101 7ff79b7080f4 48049->48101 48130 7ff79b714c90 ioctlsocket 48049->48130 48050->48007 48052 7ff79b7081fa _errno _errno _errno 48051->48052 48110 7ff79b7311c0 48051->48110 48135 7ff79b6f2500 27 API calls 48052->48135 48055 7ff79b70822b 48136 7ff79b705970 19 API calls 48055->48136 48056 7ff79b707e24 48056->48052 48058 7ff79b707e2d htons 48056->48058 48060 7ff79b705af0 15 API calls 48058->48060 48059 7ff79b708240 48061 7ff79b7065d0 2 API calls 48059->48061 48062 7ff79b707e4e 48060->48062 48063 7ff79b7080d5 48061->48063 48064 7ff79b707ec9 48062->48064 48065 7ff79b707e6f setsockopt 48062->48065 48063->48101 48068 7ff79b708800 14 API calls 48064->48068 48076 7ff79b707f01 48064->48076 48065->48064 48066 7ff79b707e9d WSAGetLastError 48065->48066 48131 7ff79b6f2500 27 API calls 48066->48131 48068->48076 48069 7ff79b707f05 48074 7ff79b707f8a setsockopt 48069->48074 48092 7ff79b707fc9 48069->48092 48070 7ff79b707f22 getsockopt 48072 7ff79b707f53 setsockopt 48070->48072 48073 7ff79b707f49 48070->48073 48071 7ff79b707eb7 48075 7ff79b705af0 15 API calls 48071->48075 48072->48069 48073->48069 48073->48072 48078 7ff79b707fb7 48074->48078 48084 7ff79b707fce 48074->48084 48075->48064 48076->48069 48076->48070 48077 7ff79b708097 48079 7ff79b7080a8 48077->48079 48081 7ff79b7080fe 48077->48081 48080 7ff79b705af0 15 API calls 48078->48080 48132 7ff79b707630 647 API calls 48079->48132 48080->48092 48129 7ff79b714c90 ioctlsocket 48081->48129 48083 7ff79b70810b 48086 7ff79b70d7b0 2 API calls 48083->48086 48087 7ff79b707ffc WSAIoctl 48084->48087 48089 7ff79b708115 48086->48089 48090 7ff79b708044 WSAGetLastError 48087->48090 48087->48092 48088 7ff79b7080c4 48088->48081 48091 7ff79b7080ca 48088->48091 48093 7ff79b70813f 48089->48093 48133 7ff79b6f57f0 17 API calls 48089->48133 48094 7ff79b705af0 15 API calls 48090->48094 48095 7ff79b7065d0 2 API calls 48091->48095 48092->48077 48096 7ff79b7080e9 48092->48096 48099 7ff79b708188 WSAGetLastError 48093->48099 48100 7ff79b70815f connect 48093->48100 48093->48101 48094->48092 48095->48063 48098 7ff79b7065d0 2 API calls 48096->48098 48098->48101 48099->48101 48102 7ff79b708195 48099->48102 48100->48099 48100->48101 48101->48048 48102->48101 48134 7ff79b6f2500 27 API calls 48102->48134 48104 7ff79b7081b1 48105 7ff79b705af0 15 API calls 48104->48105 48106 7ff79b7081c7 48105->48106 48107 7ff79b7065d0 2 API calls 48106->48107 48107->48101 48108->48006 48109->48010 48111 7ff79b7311f9 48110->48111 48112 7ff79b7311cf 48110->48112 48114 7ff79b708e80 13 API calls 48111->48114 48113 7ff79b7311d4 _errno 48112->48113 48120 7ff79b7311e7 48112->48120 48113->48056 48115 7ff79b731268 48114->48115 48116 7ff79b7312b4 _errno 48115->48116 48117 7ff79b731287 48115->48117 48116->48117 48118 7ff79b73f580 8 API calls 48117->48118 48119 7ff79b7312cf 48118->48119 48119->48056 48121 7ff79b708e80 13 API calls 48120->48121 48122 7ff79b73155a 48120->48122 48126 7ff79b7314e0 48120->48126 48121->48120 48137 7ff79b731210 14 API calls 48122->48137 48124 7ff79b731509 48127 7ff79b73f580 8 API calls 48124->48127 48125 7ff79b731573 _errno 48125->48124 48126->48124 48126->48125 48128 7ff79b731547 48127->48128 48128->48056 48129->48083 48130->48051 48131->48071 48132->48088 48133->48093 48134->48104 48135->48055 48136->48059 48137->48126 48138->48026 48139->48033 48140->48027 48141->48033 48142->48028 48143->48036 48144->48033 48145->48037 48146->48041 48147->48033 48148 7ff79b7191e0 48149 7ff79b732480 26 API calls 48148->48149 48150 7ff79b7191e9 48149->48150 48151 7ff79b70ebe0 48152 7ff79b70ec2e 48151->48152 48153 7ff79b70ef50 18 API calls 48152->48153 48154 7ff79b70ec4b 48153->48154 48155 7ff79b705af0 15 API calls 48154->48155 48165 7ff79b70ec67 48154->48165 48155->48165 48156 7ff79b70edb5 48158 7ff79b73f580 8 API calls 48156->48158 48160 7ff79b70ede2 48158->48160 48159 7ff79b70ece6 48161 7ff79b70ecea 48159->48161 48162 7ff79b70ed0b 48159->48162 48199 7ff79b7188b0 15 API calls 48161->48199 48164 7ff79b717900 13 API calls 48162->48164 48167 7ff79b70ed1d 48164->48167 48165->48156 48185 7ff79b717900 48165->48185 48166 7ff79b70ecff 48166->48162 48168 7ff79b70edfa 48166->48168 48169 7ff79b70ed21 48167->48169 48175 7ff79b70ed42 48167->48175 48170 7ff79b70ee04 48168->48170 48200 7ff79b7188b0 15 API calls 48169->48200 48204 7ff79b70e160 27 API calls 48170->48204 48173 7ff79b70ed36 48173->48168 48173->48175 48174 7ff79b70ee26 48176 7ff79b70edae 48174->48176 48205 7ff79b718680 free free free 48174->48205 48175->48156 48179 7ff79b70ed73 48175->48179 48201 7ff79b7329b0 585 API calls 48175->48201 48176->48156 48179->48168 48180 7ff79b70ed90 48179->48180 48180->48156 48181 7ff79b70eda9 48180->48181 48182 7ff79b70edb0 48180->48182 48202 7ff79b732bb0 314 API calls 48181->48202 48203 7ff79b6fae00 51 API calls 48182->48203 48186 7ff79b71790c 48185->48186 48192 7ff79b717936 48185->48192 48187 7ff79b717911 _errno 48186->48187 48195 7ff79b717927 48186->48195 48187->48159 48188 7ff79b7179f7 48188->48159 48189 7ff79b717990 strchr 48189->48192 48190 7ff79b717aa0 strchr 48191 7ff79b717ac0 strchr 48190->48191 48190->48195 48191->48195 48192->48188 48192->48189 48193 7ff79b73f580 8 API calls 48194 7ff79b717c06 48193->48194 48194->48159 48195->48190 48196 7ff79b717bb5 48195->48196 48198 7ff79b717b4d 48195->48198 48196->48198 48206 7ff79b717950 strchr 48196->48206 48198->48193 48199->48166 48200->48173 48201->48179 48202->48176 48203->48156 48204->48174 48205->48176 48206->48198 48207 7ff79b6f792b 48208 7ff79b6f7941 48207->48208 48209 7ff79b6f7972 48207->48209 48244 7ff79b70f590 48208->48244 48210 7ff79b6f7a1a 48209->48210 48215 7ff79b6f7970 48209->48215 48212 7ff79b6f7a34 48210->48212 48216 7ff79b6f7ad4 48210->48216 48491 7ff79b70c810 24 API calls 48212->48491 48213 7ff79b6f795a 48217 7ff79b715090 2 API calls 48213->48217 48218 7ff79b6f6d00 292 API calls 48215->48218 48241 7ff79b6f727b 48215->48241 48219 7ff79b6f6d00 292 API calls 48216->48219 48216->48241 48217->48215 48218->48241 48219->48241 48220 7ff79b6f7a41 48222 7ff79b6f6d00 292 API calls 48220->48222 48221 7ff79b6f84a0 17 API calls 48221->48241 48224 7ff79b6f7a61 48222->48224 48226 7ff79b6f7ac6 free 48224->48226 48227 7ff79b6f7a6a 48224->48227 48225 7ff79b6f8322 48226->48241 48230 7ff79b6f7a81 48227->48230 48231 7ff79b6f7a73 free 48227->48231 48228 7ff79b6f8313 48496 7ff79b705970 19 API calls 48228->48496 48492 7ff79b70bdd0 28 API calls 48230->48492 48231->48241 48235 7ff79b7071f0 10 API calls 48235->48241 48236 7ff79b6f7ab7 free 48236->48241 48237 7ff79b6f7a92 48237->48236 48238 7ff79b6f731e 48239 7ff79b705970 19 API calls 48238->48239 48238->48241 48239->48238 48241->48221 48241->48225 48241->48228 48241->48235 48241->48238 48242 7ff79b6f6d00 292 API calls 48241->48242 48490 7ff79b705970 19 API calls 48241->48490 48493 7ff79b701430 90 API calls 48241->48493 48494 7ff79b6f5a20 15 API calls 48241->48494 48495 7ff79b7151e0 22 API calls 48241->48495 48242->48241 48245 7ff79b70f628 48244->48245 48246 7ff79b70f661 free _strdup 48245->48246 48249 7ff79b70f68b 48245->48249 48477 7ff79b70f63e 48245->48477 48246->48249 48246->48477 48247 7ff79b73f580 8 API calls 48248 7ff79b6f794b 48247->48248 48248->48209 48248->48213 48250 7ff79b70f741 free 48249->48250 48251 7ff79b70f755 48249->48251 48250->48251 48252 7ff79b70f774 48251->48252 48537 7ff79b708db0 15 API calls 48251->48537 48254 7ff79b70f7bf free 48252->48254 48255 7ff79b70f81d 48252->48255 48252->48477 48257 7ff79b70f7d2 free 48254->48257 48264 7ff79b70f881 48255->48264 48538 7ff79b714480 388 API calls 48255->48538 48265 7ff79b70f923 48257->48265 48266 7ff79b70f94a 48257->48266 48259 7ff79b70f869 48262 7ff79b70f870 free 48259->48262 48259->48264 48261 7ff79b70f8be free 48261->48257 48261->48477 48262->48477 48264->48261 48539 7ff79b714480 388 API calls 48264->48539 48265->48266 48540 7ff79b708db0 15 API calls 48265->48540 48268 7ff79b70fa06 free 48266->48268 48269 7ff79b70f9ce free 48266->48269 48266->48477 48270 7ff79b70f9f5 48268->48270 48541 7ff79b708db0 15 API calls 48269->48541 48272 7ff79b70fa3d 48270->48272 48278 7ff79b70fa26 48270->48278 48270->48477 48542 7ff79b6fbc00 6 API calls 48272->48542 48274 7ff79b70fa49 48543 7ff79b733f20 59 API calls 48274->48543 48276 7ff79b70fa62 48276->48278 48276->48477 48277 7ff79b70fcac free 48287 7ff79b70fccf 48277->48287 48308 7ff79b70fa2b 48278->48308 48544 7ff79b6fcb70 free free 48278->48544 48280 7ff79b70fb38 48282 7ff79b70fb7f strchr 48280->48282 48300 7ff79b70fb51 48280->48300 48281 7ff79b70fad0 48545 7ff79b6fbe00 26 API calls 48281->48545 48284 7ff79b70fb94 strchr 48282->48284 48282->48300 48283 7ff79b70fdd7 48294 7ff79b70fe00 48283->48294 48297 7ff79b70fe3b 48283->48297 48289 7ff79b70fba7 strchr 48284->48289 48284->48300 48285 7ff79b70fc8c 48547 7ff79b705970 19 API calls 48285->48547 48287->48283 48288 7ff79b70fd05 48287->48288 48548 7ff79b712090 strchr strchr strchr malloc memcpy 48288->48548 48289->48300 48290 7ff79b70fc05 48290->48285 48290->48300 48292 7ff79b70fae5 48546 7ff79b6fcb70 free free 48292->48546 48550 7ff79b708db0 15 API calls 48294->48550 48295 7ff79b70fc9b 48295->48477 48551 7ff79b708db0 15 API calls 48297->48551 48300->48277 48301 7ff79b70fd0d 48302 7ff79b70fd2b 48301->48302 48303 7ff79b70fd20 free 48301->48303 48301->48477 48306 7ff79b70fd56 48302->48306 48312 7ff79b70fd40 memcpy 48302->48312 48305 7ff79b70fd7f 48303->48305 48304 7ff79b70fe39 48311 7ff79b70fda3 48304->48311 48331 7ff79b71005f 48304->48331 48304->48477 48305->48311 48549 7ff79b708db0 15 API calls 48305->48549 48307 7ff79b70fd5b strchr 48306->48307 48309 7ff79b70fd68 48307->48309 48310 7ff79b70fd6b free 48307->48310 48308->48280 48308->48290 48308->48477 48309->48310 48310->48305 48311->48295 48311->48304 48552 7ff79b72e540 23 API calls 48311->48552 48312->48307 48315 7ff79b710052 48320 7ff79b72e510 13 API calls 48315->48320 48316 7ff79b71009e 48323 7ff79b7100da free 48316->48323 48326 7ff79b71022e 48316->48326 48327 7ff79b7100fa 48316->48327 48317 7ff79b7102f0 calloc 48318 7ff79b71031f 48317->48318 48317->48477 48497 7ff79b711960 48318->48497 48319 7ff79b710158 48560 7ff79b705970 19 API calls 48319->48560 48320->48295 48559 7ff79b708db0 15 API calls 48323->48559 48324 7ff79b710333 48332 7ff79b7103a0 48324->48332 48337 7ff79b710367 48324->48337 48324->48477 48326->48327 48330 7ff79b710252 free 48326->48330 48327->48317 48327->48477 48328 7ff79b710171 48340 7ff79b710212 48328->48340 48343 7ff79b7101cf 48328->48343 48334 7ff79b71027d 48330->48334 48335 7ff79b710270 48330->48335 48331->48316 48331->48319 48331->48328 48331->48343 48338 7ff79b7103ce 48332->48338 48339 7ff79b7103a5 48332->48339 48333 7ff79b70ff62 48333->48315 48341 7ff79b70ff6a 48333->48341 48334->48335 48336 7ff79b710290 48334->48336 48564 7ff79b708db0 15 API calls 48335->48564 48563 7ff79b708db0 15 API calls 48336->48563 48565 7ff79b7115a0 7 API calls 48337->48565 48566 7ff79b7115a0 7 API calls 48338->48566 48348 7ff79b711960 25 API calls 48339->48348 48562 7ff79b705970 19 API calls 48340->48562 48554 7ff79b72e510 48341->48554 48343->48316 48352 7ff79b7101f9 48343->48352 48347 7ff79b70feb7 48347->48315 48347->48477 48553 7ff79b72e680 8 API calls 48347->48553 48363 7ff79b7103cc 48348->48363 48561 7ff79b705970 19 API calls 48352->48561 48354 7ff79b7103eb 48360 7ff79b711960 25 API calls 48354->48360 48354->48363 48354->48477 48356 7ff79b710388 free 48356->48363 48357 7ff79b70ff72 48357->48331 48358 7ff79b70ff9a strstr 48357->48358 48359 7ff79b71002f 48357->48359 48361 7ff79b70ffb2 48358->48361 48359->48331 48360->48363 48361->48359 48362 7ff79b708e80 13 API calls 48361->48362 48362->48359 48364 7ff79b711960 25 API calls 48363->48364 48363->48477 48365 7ff79b7105e0 free free free 48364->48365 48367 7ff79b71061e 48365->48367 48365->48477 48366 7ff79b7107db 48369 7ff79b710921 48366->48369 48366->48477 48570 7ff79b717c70 _gmtime64 48366->48570 48367->48366 48368 7ff79b710681 48367->48368 48376 7ff79b710765 48367->48376 48367->48477 48567 7ff79b6f9a20 62 API calls 48368->48567 48507 7ff79b711a00 48369->48507 48370 7ff79b7107b0 48370->48366 48373 7ff79b7107c4 48370->48373 48370->48477 48569 7ff79b7115a0 7 API calls 48373->48569 48374 7ff79b71080d 48380 7ff79b710813 48374->48380 48396 7ff79b710829 48374->48396 48375 7ff79b710784 48377 7ff79b711960 25 API calls 48375->48377 48375->48477 48376->48370 48376->48375 48381 7ff79b711960 25 API calls 48376->48381 48377->48370 48571 7ff79b705970 19 API calls 48380->48571 48381->48375 48382 7ff79b7107d8 48382->48366 48384 7ff79b71092f 48385 7ff79b710960 48384->48385 48391 7ff79b710d4c 48384->48391 48384->48477 48387 7ff79b710cf3 48385->48387 48389 7ff79b710a57 48385->48389 48390 7ff79b710970 48385->48390 48386 7ff79b710756 48386->48376 48581 7ff79b7115a0 7 API calls 48387->48581 48392 7ff79b710a60 48389->48392 48411 7ff79b710ad1 48389->48411 48390->48387 48409 7ff79b71097a 48390->48409 48398 7ff79b710da5 48391->48398 48404 7ff79b711960 25 API calls 48391->48404 48395 7ff79b711960 25 API calls 48392->48395 48393 7ff79b710d09 48401 7ff79b711710 62 API calls 48393->48401 48393->48477 48394 7ff79b71074e 48568 7ff79b6f9990 9 API calls 48394->48568 48399 7ff79b710a70 48395->48399 48396->48369 48405 7ff79b708e80 13 API calls 48396->48405 48396->48477 48397 7ff79b710dd1 48424 7ff79b710ec1 48397->48424 48453 7ff79b710df4 48397->48453 48397->48477 48398->48397 48407 7ff79b711960 25 API calls 48398->48407 48398->48477 48415 7ff79b711710 62 API calls 48399->48415 48399->48477 48400 7ff79b711960 25 API calls 48410 7ff79b7106c8 48400->48410 48408 7ff79b710d2c 48401->48408 48402 7ff79b7109cb 48412 7ff79b7109ef 48402->48412 48402->48477 48573 7ff79b713f90 28 API calls 48402->48573 48404->48398 48413 7ff79b7108f5 48405->48413 48406 7ff79b710b64 48423 7ff79b710c41 48406->48423 48440 7ff79b710b7f 48406->48440 48407->48397 48416 7ff79b710aaf 48408->48416 48417 7ff79b710d36 48408->48417 48409->48402 48428 7ff79b711960 25 API calls 48409->48428 48410->48386 48410->48394 48410->48400 48419 7ff79b711960 25 API calls 48411->48419 48422 7ff79b710b20 48411->48422 48574 7ff79b7115a0 7 API calls 48412->48574 48572 7ff79b7115a0 7 API calls 48413->48572 48414 7ff79b711960 25 API calls 48414->48422 48425 7ff79b710a93 48415->48425 48577 7ff79b70c9a0 17 API calls 48416->48577 48582 7ff79b705970 19 API calls 48417->48582 48419->48422 48422->48406 48422->48414 48422->48477 48455 7ff79b710c25 48423->48455 48578 7ff79b713f90 28 API calls 48423->48578 48468 7ff79b710e6c 48424->48468 48583 7ff79b713f90 28 API calls 48424->48583 48425->48416 48431 7ff79b710a99 48425->48431 48428->48402 48429 7ff79b7109e7 48429->48412 48429->48477 48576 7ff79b705970 19 API calls 48431->48576 48432 7ff79b710917 48432->48369 48432->48477 48437 7ff79b710a05 48441 7ff79b711710 62 API calls 48437->48441 48437->48477 48438 7ff79b710ef7 48447 7ff79b710f11 48438->48447 48458 7ff79b710fe8 48438->48458 48439 7ff79b711081 48591 7ff79b7115a0 7 API calls 48439->48591 48442 7ff79b710bbf strchr 48440->48442 48440->48455 48446 7ff79b710a33 48441->48446 48448 7ff79b710bd4 strchr 48442->48448 48467 7ff79b710bf4 48442->48467 48443 7ff79b710e37 strchr 48449 7ff79b710e4c strchr 48443->48449 48443->48468 48445 7ff79b710ac8 48445->48477 48593 7ff79b7151e0 22 API calls 48445->48593 48450 7ff79b710a39 48446->48450 48451 7ff79b710a4f 48446->48451 48452 7ff79b710f1e 48447->48452 48447->48458 48454 7ff79b710be7 strchr 48448->48454 48448->48467 48456 7ff79b710e5f strchr 48449->48456 48449->48468 48575 7ff79b705970 19 API calls 48450->48575 48592 7ff79b70c9a0 17 API calls 48451->48592 48584 7ff79b7115a0 7 API calls 48452->48584 48453->48443 48453->48468 48454->48467 48579 7ff79b7115a0 7 API calls 48455->48579 48456->48468 48476 7ff79b710f58 48458->48476 48458->48477 48589 7ff79b7115a0 7 API calls 48458->48589 48459 7ff79b710c80 48464 7ff79b711710 62 API calls 48459->48464 48459->48477 48462 7ff79b711155 48471 7ff79b705af0 15 API calls 48462->48471 48462->48477 48470 7ff79b710cd3 48464->48470 48465 7ff79b710f34 48474 7ff79b710f5d 48465->48474 48475 7ff79b710f45 48465->48475 48465->48477 48466 7ff79b711043 48517 7ff79b711710 48466->48517 48467->48455 48467->48477 48468->48438 48468->48439 48468->48477 48470->48451 48473 7ff79b710cdd 48470->48473 48471->48477 48580 7ff79b705970 19 API calls 48473->48580 48481 7ff79b710fa4 48474->48481 48483 7ff79b711960 25 API calls 48474->48483 48585 7ff79b7115a0 7 API calls 48475->48585 48476->48466 48476->48477 48477->48247 48481->48476 48588 7ff79b7115a0 7 API calls 48481->48588 48482 7ff79b71106b 48590 7ff79b705970 19 API calls 48482->48590 48486 7ff79b710f75 48483->48486 48486->48476 48586 7ff79b7115a0 7 API calls 48486->48586 48488 7ff79b710f8c 48488->48481 48587 7ff79b7115a0 7 API calls 48488->48587 48490->48241 48491->48220 48492->48237 48493->48241 48494->48241 48495->48241 48496->48225 48594 7ff79b708ef0 15 API calls 48497->48594 48499 7ff79b711989 48500 7ff79b7119ca 48499->48500 48501 7ff79b711991 48499->48501 48502 7ff79b7119e9 48500->48502 48504 7ff79b7119d7 free free 48500->48504 48595 7ff79b7115a0 7 API calls 48501->48595 48502->48324 48504->48502 48506 7ff79b7119b5 free 48506->48324 48515 7ff79b711a2b 48507->48515 48508 7ff79b711ab0 strchr 48510 7ff79b711ac9 strchr 48508->48510 48508->48515 48509 7ff79b711d0a 48509->48384 48510->48515 48511 7ff79b711b18 _strdup 48512 7ff79b711d29 48511->48512 48511->48515 48512->48509 48513 7ff79b711d33 free free 48512->48513 48513->48509 48514 7ff79b711ce4 free 48514->48515 48515->48508 48515->48509 48515->48511 48515->48514 48516 7ff79b711960 25 API calls 48515->48516 48516->48515 48518 7ff79b711772 48517->48518 48519 7ff79b7117da 48518->48519 48520 7ff79b711784 48518->48520 48596 7ff79b7061c0 48519->48596 48599 7ff79b70c080 malloc 48520->48599 48522 7ff79b711799 48524 7ff79b7117bf memcpy 48522->48524 48525 7ff79b7117a0 48522->48525 48524->48519 48527 7ff79b7117b7 48525->48527 48528 7ff79b7117a5 free free 48525->48528 48536 7ff79b711061 48527->48536 48528->48527 48529 7ff79b711929 free free 48529->48536 48530 7ff79b71183c 48600 7ff79b7058b0 fwrite fwrite 48530->48600 48531 7ff79b71186e 48531->48529 48531->48536 48533 7ff79b71184d 48534 7ff79b711866 48533->48534 48601 7ff79b7058b0 fwrite fwrite 48533->48601 48534->48531 48536->48451 48536->48482 48537->48252 48538->48259 48539->48261 48540->48266 48541->48270 48542->48274 48543->48276 48544->48281 48545->48292 48546->48308 48547->48295 48548->48301 48549->48311 48550->48304 48551->48304 48552->48347 48553->48333 48555 7ff79b72e530 48554->48555 48556 7ff79b72e515 48554->48556 48555->48357 48671 7ff79b72f4f0 12 API calls 48556->48671 48559->48327 48560->48295 48561->48295 48562->48295 48563->48327 48564->48327 48565->48356 48566->48354 48567->48410 48568->48386 48569->48382 48570->48374 48571->48295 48572->48432 48573->48429 48574->48437 48575->48477 48576->48295 48577->48445 48578->48467 48579->48459 48580->48295 48581->48393 48582->48295 48583->48468 48584->48465 48585->48476 48586->48488 48587->48481 48588->48476 48589->48476 48590->48295 48591->48458 48592->48445 48593->48462 48594->48499 48595->48506 48602 7ff79b71bc90 48596->48602 48599->48522 48600->48533 48601->48534 48603 7ff79b71bd09 malloc 48602->48603 48604 7ff79b71bce2 48602->48604 48605 7ff79b71bd49 48603->48605 48606 7ff79b71bcfc 48603->48606 48604->48603 48604->48606 48607 7ff79b71bd69 memcpy 48605->48607 48608 7ff79b73f580 8 API calls 48606->48608 48617 7ff79b71bdec 48607->48617 48609 7ff79b7061f0 48608->48609 48609->48530 48609->48531 48610 7ff79b71bef9 free 48610->48606 48611 7ff79b7071f0 10 API calls 48611->48617 48612 7ff79b71bec1 48650 7ff79b705970 19 API calls 48612->48650 48615 7ff79b71bed3 48615->48610 48616 7ff79b71be9b WSAGetLastError 48649 7ff79b705970 19 API calls 48616->48649 48617->48610 48617->48611 48617->48612 48617->48616 48621 7ff79b71be8d 48617->48621 48622 7ff79b715fe0 48617->48622 48646 7ff79b706230 48617->48646 48620 7ff79b71beb3 48620->48621 48621->48610 48623 7ff79b716027 48622->48623 48627 7ff79b71605b 48622->48627 48624 7ff79b716031 48623->48624 48623->48627 48625 7ff79b716038 WSASetLastError 48624->48625 48626 7ff79b71604b Sleep 48624->48626 48634 7ff79b716054 48624->48634 48625->48634 48626->48634 48630 7ff79b7161a5 48627->48630 48631 7ff79b7161d3 select 48627->48631 48629 7ff79b73f580 8 API calls 48633 7ff79b71630e 48629->48633 48632 7ff79b7161aa 48630->48632 48635 7ff79b7161b3 WSASetLastError 48630->48635 48636 7ff79b7161c6 Sleep 48630->48636 48631->48632 48632->48634 48637 7ff79b71629c 48632->48637 48638 7ff79b716272 __WSAFDIsSet __WSAFDIsSet 48632->48638 48633->48617 48634->48629 48635->48632 48636->48632 48639 7ff79b7162cb 48637->48639 48640 7ff79b7162a4 __WSAFDIsSet 48637->48640 48638->48637 48639->48634 48641 7ff79b7162d3 __WSAFDIsSet 48639->48641 48642 7ff79b7162b7 48640->48642 48643 7ff79b7162ba __WSAFDIsSet 48640->48643 48644 7ff79b7162e9 __WSAFDIsSet 48641->48644 48645 7ff79b7162e6 48641->48645 48642->48643 48643->48639 48644->48634 48645->48644 48651 7ff79b705ed0 48646->48651 48649->48620 48650->48615 48652 7ff79b705f3f 48651->48652 48653 7ff79b705fd7 send 48651->48653 48652->48653 48657 7ff79b715fe0 19 API calls 48652->48657 48654 7ff79b705ff5 WSAGetLastError 48653->48654 48655 7ff79b706004 48653->48655 48654->48655 48656 7ff79b706010 48654->48656 48658 7ff79b73f580 8 API calls 48655->48658 48669 7ff79b6f2500 27 API calls 48656->48669 48660 7ff79b705f73 48657->48660 48661 7ff79b706057 48658->48661 48660->48653 48664 7ff79b705f7c 48660->48664 48661->48617 48662 7ff79b706022 48670 7ff79b705970 19 API calls 48662->48670 48666 7ff79b705f84 malloc 48664->48666 48667 7ff79b705fb0 recv 48664->48667 48665 7ff79b706034 48665->48655 48666->48667 48668 7ff79b705fcd 48666->48668 48667->48653 48667->48668 48668->48653 48669->48662 48670->48665 48672 7ff79b71a005 48707 7ff79b71a009 48672->48707 48673 7ff79b71a0d7 48674 7ff79b71a0f6 strchr 48673->48674 48675 7ff79b71a595 calloc 48673->48675 48676 7ff79b71a25b 48674->48676 48677 7ff79b71a10f strncmp 48674->48677 48678 7ff79b71a638 48675->48678 48679 7ff79b71a5bc 48675->48679 48686 7ff79b71a61b 48676->48686 48687 7ff79b71a36e fopen 48676->48687 48680 7ff79b71a12c 48677->48680 48681 7ff79b71a150 strncmp 48677->48681 48689 7ff79b71a69a 48678->48689 48690 7ff79b71a694 CertFreeCertificateContext 48678->48690 48860 7ff79b705970 19 API calls 48679->48860 48684 7ff79b71a229 strchr 48680->48684 48681->48680 48683 7ff79b71a172 strncmp 48681->48683 48683->48680 48691 7ff79b71a194 strncmp 48683->48691 48684->48676 48692 7ff79b71a243 _strdup 48684->48692 48685 7ff79b71a5cb 48693 7ff79b71a5d9 CertFreeCertificateContext 48685->48693 48777 7ff79b71a856 48685->48777 48862 7ff79b705970 19 API calls 48686->48862 48687->48686 48694 7ff79b71a387 fseek 48687->48694 48695 7ff79b71a69e 48689->48695 48696 7ff79b71a703 48689->48696 48690->48689 48691->48680 48697 7ff79b71a1b3 strncmp 48691->48697 48692->48676 48698 7ff79b71a263 48692->48698 48693->48777 48700 7ff79b71a3bd 48694->48700 48701 7ff79b71a3b1 ftell 48694->48701 48863 7ff79b6f1d10 22 API calls 48695->48863 48713 7ff79b717900 13 API calls 48696->48713 48697->48684 48705 7ff79b71a1ca strncmp 48697->48705 48698->48676 48717 7ff79b71a284 CertOpenStore 48698->48717 48699 7ff79b71a090 strtol 48706 7ff79b71a0b2 strchr 48699->48706 48699->48707 48702 7ff79b71a5e9 fclose 48700->48702 48703 7ff79b71a3ce fseek 48700->48703 48701->48700 48861 7ff79b705970 19 API calls 48702->48861 48703->48702 48710 7ff79b71a3eb malloc 48703->48710 48705->48680 48712 7ff79b71a1e9 strncmp 48705->48712 48706->48673 48706->48707 48707->48673 48707->48699 48707->48706 48722 7ff79b71a137 48707->48722 48779 7ff79b719430 strchr 48707->48779 48708 7ff79b73f580 8 API calls 48709 7ff79b71aa0c 48708->48709 48710->48702 48716 7ff79b71a404 fread 48710->48716 48711 7ff79b71a6b2 48864 7ff79b705970 19 API calls 48711->48864 48712->48680 48719 7ff79b71a208 strncmp 48712->48719 48720 7ff79b71a71c 48713->48720 48716->48702 48723 7ff79b71a422 fclose 48716->48723 48724 7ff79b71a2d7 free CryptStringToBinaryA 48717->48724 48725 7ff79b71a2a7 GetLastError 48717->48725 48719->48676 48719->48680 48727 7ff79b71a72f 48720->48727 48728 7ff79b717900 13 API calls 48720->48728 48721 7ff79b71a608 free 48721->48777 48855 7ff79b705970 19 API calls 48722->48855 48731 7ff79b71a44f malloc 48723->48731 48732 7ff79b71a43f 48723->48732 48734 7ff79b71a322 CertFindCertificateInStore 48724->48734 48735 7ff79b71a561 CertCloseStore 48724->48735 48856 7ff79b705970 19 API calls 48725->48856 48726 7ff79b71a6c4 free 48758 7ff79b71a146 48726->48758 48726->48777 48730 7ff79b705af0 15 API calls 48727->48730 48736 7ff79b71a742 48727->48736 48728->48727 48730->48736 48738 7ff79b71a469 MultiByteToWideChar 48731->48738 48739 7ff79b71a493 PFXImportCertStore free free 48731->48739 48732->48731 48740 7ff79b71a57a CertCloseStore 48734->48740 48741 7ff79b71a354 48734->48741 48735->48777 48742 7ff79b705af0 15 API calls 48736->48742 48745 7ff79b71a78b 48736->48745 48737 7ff79b71a2c6 free 48737->48777 48738->48739 48746 7ff79b71a51a CertFindCertificateInStore 48739->48746 48747 7ff79b71a4c4 GetLastError 48739->48747 48740->48675 48741->48735 48742->48745 48744 7ff79b71a7ed calloc 48748 7ff79b71a847 48744->48748 48757 7ff79b71a860 48744->48757 48745->48744 48749 7ff79b71a542 GetLastError 48746->48749 48750 7ff79b71a576 48746->48750 48751 7ff79b71a4d9 48747->48751 48752 7ff79b71a501 48747->48752 48865 7ff79b705970 19 API calls 48748->48865 48859 7ff79b705970 19 API calls 48749->48859 48750->48740 48857 7ff79b705970 19 API calls 48751->48857 48858 7ff79b705970 19 API calls 48752->48858 48759 7ff79b71a8c9 free 48757->48759 48760 7ff79b71a96c 48757->48760 48757->48777 48758->48777 48761 7ff79b71a8fa 48759->48761 48762 7ff79b71a946 48759->48762 48763 7ff79b706230 48 API calls 48760->48763 48765 7ff79b71a920 48761->48765 48766 7ff79b71a902 48761->48766 48870 7ff79b6f1d10 22 API calls 48762->48870 48767 7ff79b71a98d 48763->48767 48868 7ff79b6f1d10 22 API calls 48765->48868 48866 7ff79b6f1d10 22 API calls 48766->48866 48775 7ff79b71a9e9 48767->48775 48767->48777 48768 7ff79b71a950 48871 7ff79b705970 19 API calls 48768->48871 48772 7ff79b71a909 48867 7ff79b705970 19 API calls 48772->48867 48773 7ff79b71a92a 48869 7ff79b705970 19 API calls 48773->48869 48872 7ff79b705970 19 API calls 48775->48872 48777->48708 48780 7ff79b719470 48779->48780 48781 7ff79b7194ca strncpy 48780->48781 48782 7ff79b719479 strncpy 48780->48782 48785 7ff79b7194c5 48780->48785 48783 7ff79b7194da strcmp 48781->48783 48786 7ff79b719a6c 48782->48786 48787 7ff79b7194c3 48782->48787 48788 7ff79b7194fd strcmp 48783->48788 48803 7ff79b7194f3 48783->48803 48785->48781 48873 7ff79b73fafc 48786->48873 48787->48783 48790 7ff79b71951b strcmp 48788->48790 48788->48803 48793 7ff79b719539 strcmp 48790->48793 48790->48803 48791 7ff79b73f580 8 API calls 48794 7ff79b719a5c 48791->48794 48795 7ff79b719551 strcmp 48793->48795 48793->48803 48794->48707 48796 7ff79b719569 strcmp 48795->48796 48795->48803 48798 7ff79b719587 strcmp 48796->48798 48796->48803 48799 7ff79b7195a5 strcmp 48798->48799 48798->48803 48799->48803 48804 7ff79b7195c3 strcmp 48799->48804 48803->48791 48804->48803 48808 7ff79b7195e1 strcmp 48804->48808 48808->48803 48810 7ff79b7195ff strcmp 48808->48810 48810->48803 48813 7ff79b71961d strcmp 48810->48813 48813->48803 48815 7ff79b71963b strcmp 48813->48815 48815->48803 48817 7ff79b719659 strcmp 48815->48817 48817->48803 48821 7ff79b719677 strcmp 48817->48821 48821->48803 48822 7ff79b719695 strcmp 48821->48822 48822->48803 48824 7ff79b7196b3 strcmp 48822->48824 48824->48803 48825 7ff79b7196d1 strcmp 48824->48825 48825->48803 48826 7ff79b7196ef strcmp 48825->48826 48826->48803 48827 7ff79b71970d strcmp 48826->48827 48827->48803 48828 7ff79b71972b strcmp 48827->48828 48828->48803 48829 7ff79b719749 strcmp 48828->48829 48829->48803 48830 7ff79b719767 strcmp 48829->48830 48830->48803 48831 7ff79b719785 strcmp 48830->48831 48831->48803 48832 7ff79b7197a3 strcmp 48831->48832 48832->48803 48833 7ff79b7197c1 strcmp 48832->48833 48833->48803 48834 7ff79b7197df strcmp 48833->48834 48834->48803 48835 7ff79b7197fd strcmp 48834->48835 48835->48803 48836 7ff79b71981b strcmp 48835->48836 48836->48803 48837 7ff79b719839 strcmp 48836->48837 48837->48803 48838 7ff79b719857 strcmp 48837->48838 48838->48803 48839 7ff79b719875 strcmp 48838->48839 48839->48803 48840 7ff79b719893 strcmp 48839->48840 48840->48803 48841 7ff79b7198b1 strcmp 48840->48841 48841->48803 48842 7ff79b7198cf strcmp 48841->48842 48842->48803 48843 7ff79b7198ed strcmp 48842->48843 48843->48803 48844 7ff79b71990b strcmp 48843->48844 48844->48803 48845 7ff79b719929 strcmp 48844->48845 48845->48803 48846 7ff79b719947 strcmp 48845->48846 48846->48803 48847 7ff79b719965 strcmp 48846->48847 48847->48803 48848 7ff79b719983 strcmp 48847->48848 48848->48803 48849 7ff79b7199a1 strcmp 48848->48849 48849->48803 48850 7ff79b7199bf strcmp 48849->48850 48850->48803 48851 7ff79b7199da strcmp 48850->48851 48851->48803 48852 7ff79b7199f5 strcmp 48851->48852 48852->48803 48853 7ff79b719a10 strcmp 48852->48853 48853->48803 48854 7ff79b719a2b strcmp 48853->48854 48854->48803 48855->48758 48856->48737 48857->48758 48858->48758 48859->48735 48860->48685 48861->48721 48862->48758 48863->48711 48864->48726 48865->48777 48866->48772 48867->48758 48868->48773 48869->48758 48870->48768 48871->48758 48872->48777 49000 7ff79b73fb10 IsProcessorFeaturePresent 48873->49000 49001 7ff79b73fb27 49000->49001 49006 7ff79b73fbac RtlCaptureContext RtlLookupFunctionEntry 49001->49006 49007 7ff79b73fb3b 49006->49007 49008 7ff79b73fbdc RtlVirtualUnwind 49006->49008 49009 7ff79b73f9f4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 49007->49009 49008->49007 49038 7ff79b6fb1a0 49039 7ff79b708e80 13 API calls 49038->49039 49040 7ff79b6fb1df 49039->49040 49057 7ff79b7186d0 getaddrinfo 49040->49057 49043 7ff79b6fb21d EnterCriticalSection 49047 7ff79b6fb22c LeaveCriticalSection 49043->49047 49048 7ff79b6fb248 49043->49048 49044 7ff79b6fb1fb WSAGetLastError 49045 7ff79b6fb205 WSAGetLastError 49044->49045 49046 7ff79b6fb21a 49044->49046 49045->49043 49046->49043 49075 7ff79b6fb130 7 API calls 49047->49075 49050 7ff79b6fb276 LeaveCriticalSection 49048->49050 49051 7ff79b6fb252 send 49048->49051 49054 7ff79b6fb286 49050->49054 49051->49050 49053 7ff79b6fb26d WSAGetLastError 49051->49053 49052 7ff79b6fb23d free 49052->49054 49053->49050 49055 7ff79b73f580 8 API calls 49054->49055 49056 7ff79b6fb295 49055->49056 49058 7ff79b6fb1f5 49057->49058 49061 7ff79b718703 49057->49061 49058->49043 49058->49044 49059 7ff79b718874 WSASetLastError 49059->49058 49060 7ff79b7187ee 49062 7ff79b718837 49060->49062 49063 7ff79b718831 freeaddrinfo 49060->49063 49061->49059 49061->49060 49064 7ff79b718759 malloc 49061->49064 49065 7ff79b71883c 49062->49065 49066 7ff79b71886f 49062->49066 49063->49062 49067 7ff79b71881c 49064->49067 49068 7ff79b718770 malloc 49064->49068 49065->49058 49069 7ff79b718841 free free free 49065->49069 49066->49058 49066->49059 49067->49060 49070 7ff79b7187a7 memcpy 49068->49070 49071 7ff79b71880b free 49068->49071 49069->49058 49069->49069 49072 7ff79b7187bf _strdup 49070->49072 49074 7ff79b7187ce 49070->49074 49071->49060 49073 7ff79b7187f0 free free 49072->49073 49072->49074 49073->49060 49074->49061 49075->49052 49076 7ff79b7220b0 49077 7ff79b7220d9 49076->49077 49078 7ff79b722140 49076->49078 49080 7ff79b7220ea 49077->49080 49081 7ff79b722100 49077->49081 49151 7ff79b70b6d0 49078->49151 49149 7ff79b70b5d0 456 API calls 49080->49149 49111 7ff79b706980 49081->49111 49084 7ff79b72214d 49094 7ff79b7221b1 49084->49094 49096 7ff79b72222a 49084->49096 49171 7ff79b73aa80 35 API calls 49084->49171 49085 7ff79b7220f5 49087 7ff79b722111 49087->49096 49150 7ff79b722d30 65 API calls 49087->49150 49088 7ff79b7222de 49179 7ff79b70c9a0 17 API calls 49088->49179 49089 7ff79b7221e2 49091 7ff79b72223e 49089->49091 49092 7ff79b7221ee 49089->49092 49106 7ff79b722247 49091->49106 49175 7ff79b73cb10 _errno strtoll _errno 49091->49175 49172 7ff79b722a40 322 API calls 49092->49172 49094->49088 49094->49089 49094->49096 49098 7ff79b722135 49100 7ff79b7221f8 49100->49096 49173 7ff79b722590 26 API calls 49100->49173 49102 7ff79b72229e 49102->49096 49178 7ff79b73aa80 35 API calls 49102->49178 49105 7ff79b722263 49105->49102 49105->49106 49108 7ff79b722289 49105->49108 49106->49102 49177 7ff79b722dd0 72 API calls 49106->49177 49107 7ff79b722213 49107->49096 49174 7ff79b722980 32 API calls 49107->49174 49176 7ff79b722dd0 72 API calls 49108->49176 49112 7ff79b7069cf 49111->49112 49113 7ff79b7069d8 49111->49113 49115 7ff79b73f580 8 API calls 49112->49115 49114 7ff79b70d7b0 2 API calls 49113->49114 49117 7ff79b7069f2 49114->49117 49116 7ff79b706f05 49115->49116 49116->49078 49116->49087 49118 7ff79b706a82 49117->49118 49119 7ff79b706a69 49117->49119 49121 7ff79b706a8c 49118->49121 49148 7ff79b706ab9 49118->49148 49201 7ff79b705970 19 API calls 49119->49201 49122 7ff79b707b50 662 API calls 49121->49122 49123 7ff79b706a9a 49122->49123 49123->49112 49126 7ff79b707c60 51 API calls 49123->49126 49124 7ff79b715fe0 19 API calls 49124->49148 49125 7ff79b706d95 49125->49112 49203 7ff79b708280 667 API calls 49125->49203 49126->49112 49127 7ff79b706d04 SleepEx getsockopt 49129 7ff79b706d4c WSAGetLastError 49127->49129 49127->49148 49129->49148 49130 7ff79b706ca6 SleepEx getsockopt 49132 7ff79b706cee WSAGetLastError 49130->49132 49130->49148 49131 7ff79b705af0 15 API calls 49131->49148 49132->49148 49133 7ff79b706dc7 49204 7ff79b6f2500 27 API calls 49133->49204 49134 7ff79b706dd3 49137 7ff79b706e2b 49134->49137 49139 7ff79b7065d0 2 API calls 49134->49139 49135 7ff79b706bb7 WSASetLastError 49135->49148 49136 7ff79b706dae 49136->49112 49136->49133 49180 7ff79b707b50 49137->49180 49139->49137 49141 7ff79b706ea7 49205 7ff79b705970 19 API calls 49141->49205 49142 7ff79b706e49 49142->49112 49193 7ff79b707c60 49142->49193 49145 7ff79b706a78 49145->49112 49146 7ff79b708280 667 API calls 49146->49148 49148->49124 49148->49125 49148->49127 49148->49130 49148->49131 49148->49134 49148->49135 49148->49146 49202 7ff79b6f2500 27 API calls 49148->49202 49149->49085 49150->49098 49152 7ff79b70b71f 49151->49152 49153 7ff79b70b704 49151->49153 49155 7ff79b70b761 memset 49152->49155 49158 7ff79b70b725 49152->49158 49153->49152 49210 7ff79b6ffb70 49153->49210 49159 7ff79b70b793 49155->49159 49156 7ff79b73f580 8 API calls 49157 7ff79b70b8c5 49156->49157 49157->49084 49158->49156 49160 7ff79b70b7ee calloc 49159->49160 49161 7ff79b70b866 49159->49161 49162 7ff79b70b81c 49160->49162 49163 7ff79b70b806 49160->49163 49224 7ff79b70aa80 455 API calls 49161->49224 49165 7ff79b705af0 15 API calls 49162->49165 49163->49158 49167 7ff79b70b82b 49165->49167 49166 7ff79b70b876 49168 7ff79b705af0 15 API calls 49166->49168 49169 7ff79b70b891 49166->49169 49167->49161 49168->49169 49169->49158 49170 7ff79b70b89b free 49169->49170 49170->49158 49171->49094 49172->49100 49173->49107 49174->49096 49175->49105 49176->49102 49177->49102 49178->49096 49179->49096 49181 7ff79b707c55 49180->49181 49185 7ff79b707b67 49180->49185 49181->49142 49182 7ff79b707c37 49208 7ff79b716440 634 API calls 49182->49208 49184 7ff79b707c0a 49207 7ff79b716a90 661 API calls 49184->49207 49185->49182 49185->49184 49186 7ff79b707bec 49185->49186 49186->49184 49189 7ff79b707bf1 49186->49189 49188 7ff79b707c50 49188->49142 49206 7ff79b705970 19 API calls 49189->49206 49190 7ff79b707c32 49190->49142 49192 7ff79b707c00 49192->49142 49194 7ff79b707c80 49193->49194 49195 7ff79b707c8d 49193->49195 49196 7ff79b715090 2 API calls 49194->49196 49197 7ff79b707300 47 API calls 49195->49197 49196->49195 49198 7ff79b707c9d 49197->49198 49209 7ff79b7020a0 15 API calls 49198->49209 49200 7ff79b707ca5 49200->49112 49201->49145 49202->49148 49203->49136 49204->49141 49205->49145 49206->49192 49207->49190 49208->49188 49209->49200 49211 7ff79b6ffb9e 49210->49211 49212 7ff79b6ffb97 49210->49212 49214 7ff79b6ffbc4 49211->49214 49215 7ff79b6ffbcd 49211->49215 49217 7ff79b6ffc07 49211->49217 49261 7ff79b700550 memset 49212->49261 49262 7ff79b705970 19 API calls 49214->49262 49223 7ff79b719430 306 API calls 49215->49223 49225 7ff79b719a80 49215->49225 49243 7ff79b718df0 49215->49243 49217->49152 49218 7ff79b6ffc17 49218->49217 49219 7ff79b6ffbf2 49219->49217 49220 7ff79b715090 2 API calls 49219->49220 49220->49217 49223->49219 49224->49166 49226 7ff79b719ad4 49225->49226 49234 7ff79b719ac9 49225->49234 49227 7ff79b7071f0 10 API calls 49226->49227 49239 7ff79b719afb 49226->49239 49229 7ff79b719ae7 49227->49229 49228 7ff79b719bf2 49228->49234 49265 7ff79b71b1e0 69 API calls 49228->49265 49232 7ff79b719bdc 49229->49232 49233 7ff79b719c70 74 API calls 49229->49233 49230 7ff79b7071f0 10 API calls 49230->49239 49264 7ff79b705970 19 API calls 49232->49264 49233->49239 49234->49219 49236 7ff79b719bd5 49236->49234 49237 7ff79b71aa50 305 API calls 49237->49239 49238 7ff79b715fe0 19 API calls 49238->49239 49239->49228 49239->49230 49239->49232 49239->49234 49239->49237 49239->49238 49240 7ff79b719bbd WSAGetLastError 49239->49240 49241 7ff79b719bac 49239->49241 49263 7ff79b705970 19 API calls 49240->49263 49241->49232 49241->49234 49244 7ff79b719a80 49243->49244 49245 7ff79b7071f0 10 API calls 49244->49245 49249 7ff79b719ac9 49244->49249 49257 7ff79b719afb 49244->49257 49247 7ff79b719ae7 49245->49247 49246 7ff79b719bf2 49246->49249 49268 7ff79b71b1e0 69 API calls 49246->49268 49251 7ff79b719bdc 49247->49251 49252 7ff79b719c70 74 API calls 49247->49252 49248 7ff79b7071f0 10 API calls 49248->49257 49249->49219 49267 7ff79b705970 19 API calls 49251->49267 49252->49257 49254 7ff79b719bd5 49254->49249 49255 7ff79b71aa50 305 API calls 49255->49257 49256 7ff79b715fe0 19 API calls 49256->49257 49257->49246 49257->49248 49257->49249 49257->49251 49257->49255 49257->49256 49258 7ff79b719bbd WSAGetLastError 49257->49258 49259 7ff79b719bac 49257->49259 49266 7ff79b705970 19 API calls 49258->49266 49259->49249 49259->49251 49261->49211 49262->49218 49263->49236 49264->49236 49265->49234 49266->49254 49267->49254 49268->49249 49269 7ff79b711490 49270 7ff79b6ffb70 306 API calls 49269->49270 49271 7ff79b7114a7 49270->49271 49272 7ff79b6f777b 49273 7ff79b6f778e 49272->49273 49274 7ff79b6f7847 49273->49274 49276 7ff79b70b6d0 458 API calls 49273->49276 49277 7ff79b6f7796 49273->49277 49275 7ff79b6f77d3 49274->49275 49274->49277 49278 7ff79b6f6d00 292 API calls 49275->49278 49280 7ff79b6f77cd 49276->49280 49292 7ff79b6f727b 49277->49292 49314 7ff79b70b580 free 49277->49314 49278->49292 49280->49274 49280->49275 49280->49277 49295 7ff79b7112d0 49280->49295 49281 7ff79b6f84a0 17 API calls 49281->49292 49283 7ff79b6f8322 49284 7ff79b6f8313 49318 7ff79b705970 19 API calls 49284->49318 49288 7ff79b7071f0 10 API calls 49288->49292 49289 7ff79b705970 19 API calls 49290 7ff79b6f731e 49289->49290 49290->49289 49290->49292 49292->49281 49292->49283 49292->49284 49292->49288 49292->49290 49293 7ff79b6f6d00 292 API calls 49292->49293 49313 7ff79b705970 19 API calls 49292->49313 49315 7ff79b701430 90 API calls 49292->49315 49316 7ff79b6f5a20 15 API calls 49292->49316 49317 7ff79b7151e0 22 API calls 49292->49317 49293->49292 49296 7ff79b7112fc 49295->49296 49297 7ff79b70b6d0 458 API calls 49296->49297 49300 7ff79b711306 49297->49300 49298 7ff79b73f580 8 API calls 49299 7ff79b711462 49298->49299 49299->49274 49301 7ff79b71141c 49300->49301 49302 7ff79b711357 49300->49302 49306 7ff79b711436 49300->49306 49303 7ff79b6ffb70 306 API calls 49301->49303 49301->49306 49304 7ff79b708e80 13 API calls 49302->49304 49303->49306 49305 7ff79b7113c8 calloc 49304->49305 49307 7ff79b7113e7 49305->49307 49308 7ff79b7113e0 49305->49308 49306->49298 49309 7ff79b711960 25 API calls 49307->49309 49308->49306 49310 7ff79b7113f6 49309->49310 49310->49306 49311 7ff79b711710 62 API calls 49310->49311 49312 7ff79b711418 49311->49312 49312->49301 49312->49306 49313->49292 49314->49292 49315->49292 49316->49292 49317->49292 49318->49283 49319 7ff79b6f743c 49320 7ff79b715090 2 API calls 49319->49320 49321 7ff79b6f7449 49320->49321 49322 7ff79b6f7465 49321->49322 49377 7ff79b6f57f0 17 API calls 49321->49377 49324 7ff79b6f7481 49322->49324 49378 7ff79b6f57f0 17 API calls 49322->49378 49346 7ff79b701190 free free 49324->49346 49327 7ff79b6f7491 49328 7ff79b705af0 15 API calls 49327->49328 49331 7ff79b6f74e7 49327->49331 49344 7ff79b6f727b 49327->49344 49329 7ff79b6f74db 49328->49329 49330 7ff79b6f84a0 17 API calls 49329->49330 49330->49331 49331->49344 49379 7ff79b70b580 free 49331->49379 49332 7ff79b6f84a0 17 API calls 49332->49344 49335 7ff79b6f8322 49336 7ff79b6f8313 49383 7ff79b705970 19 API calls 49336->49383 49340 7ff79b7071f0 10 API calls 49340->49344 49341 7ff79b705970 19 API calls 49342 7ff79b6f731e 49341->49342 49342->49341 49342->49344 49344->49332 49344->49335 49344->49336 49344->49340 49344->49342 49345 7ff79b6f6d00 292 API calls 49344->49345 49376 7ff79b705970 19 API calls 49344->49376 49380 7ff79b701430 90 API calls 49344->49380 49381 7ff79b6f5a20 15 API calls 49344->49381 49382 7ff79b7151e0 22 API calls 49344->49382 49345->49344 49347 7ff79b700f70 292 API calls 49346->49347 49348 7ff79b7011ea 49347->49348 49349 7ff79b700f70 292 API calls 49348->49349 49350 7ff79b7011f6 memset 49349->49350 49384 7ff79b702920 49350->49384 49352 7ff79b7012be 49356 7ff79b70123d 49352->49356 49475 7ff79b701430 90 API calls 49352->49475 49355 7ff79b715090 2 API calls 49357 7ff79b70125f 49355->49357 49356->49327 49357->49356 49358 7ff79b7012b2 49357->49358 49359 7ff79b70128b free 49357->49359 49358->49352 49360 7ff79b70d7b0 2 API calls 49358->49360 49474 7ff79b708db0 15 API calls 49359->49474 49362 7ff79b701300 49360->49362 49363 7ff79b701314 49362->49363 49364 7ff79b70133d 49362->49364 49365 7ff79b706780 667 API calls 49363->49365 49366 7ff79b715090 2 API calls 49364->49366 49368 7ff79b70132a 49365->49368 49367 7ff79b70134a 49366->49367 49371 7ff79b70136d 49367->49371 49372 7ff79b715090 2 API calls 49367->49372 49368->49352 49369 7ff79b7013f7 49368->49369 49370 7ff79b70d7b0 2 API calls 49369->49370 49370->49356 49373 7ff79b707300 47 API calls 49371->49373 49372->49371 49374 7ff79b701387 49373->49374 49374->49369 49375 7ff79b705af0 15 API calls 49374->49375 49375->49369 49376->49344 49377->49322 49378->49324 49379->49344 49380->49344 49381->49344 49382->49344 49383->49335 49385 7ff79b702965 49384->49385 49473 7ff79b702989 49385->49473 49476 7ff79b702120 calloc 49385->49476 49387 7ff79b70299b 49387->49473 49491 7ff79b704590 49387->49491 49388 7ff79b73f580 8 API calls 49389 7ff79b701225 49388->49389 49389->49352 49389->49355 49389->49356 49392 7ff79b7029e4 49394 7ff79b7029f0 _strdup 49392->49394 49395 7ff79b702a02 49392->49395 49393 7ff79b7029d2 _strdup 49393->49392 49393->49473 49394->49395 49394->49473 49541 7ff79b703330 49395->49541 49399 7ff79b708e80 13 API calls 49400 7ff79b702a75 49399->49400 49400->49473 49600 7ff79b703b80 49400->49600 49401 7ff79b702ac7 49402 7ff79b702b22 49401->49402 49403 7ff79b702b0c _strdup 49401->49403 49401->49473 49404 7ff79b702b45 49402->49404 49405 7ff79b702b2c _strdup 49402->49405 49403->49402 49403->49473 49616 7ff79b703ff0 49404->49616 49405->49404 49405->49473 49410 7ff79b702b92 49412 7ff79b702bb4 49410->49412 49413 7ff79b7016c0 38 API calls 49410->49413 49410->49473 49411 7ff79b7016c0 38 API calls 49411->49410 49414 7ff79b7016c0 38 API calls 49412->49414 49415 7ff79b702bd6 49412->49415 49412->49473 49413->49412 49414->49415 49416 7ff79b702d6f 49415->49416 49419 7ff79b702cd4 49415->49419 49415->49473 49638 7ff79b6feea0 49416->49638 49418 7ff79b702f0a 49420 7ff79b6feea0 8 API calls 49418->49420 49418->49473 49421 7ff79b702cf4 49419->49421 49422 7ff79b702d5f 49419->49422 49423 7ff79b702f21 49420->49423 49719 7ff79b6fdde0 17 API calls 49421->49719 49424 7ff79b701790 2 API calls 49422->49424 49423->49473 49662 7ff79b704a50 49423->49662 49424->49473 49426 7ff79b702d0a 49429 7ff79b7054c0 17 API calls 49426->49429 49426->49473 49434 7ff79b702d1c 49429->49434 49430 7ff79b703014 49472 7ff79b7030c1 49430->49472 49723 7ff79b6fe380 13 API calls 49430->49723 49432 7ff79b702d22 49432->49473 49433 7ff79b702f79 49433->49430 49435 7ff79b702f81 49433->49435 49434->49432 49720 7ff79b70c9a0 17 API calls 49434->49720 49722 7ff79b705170 34 API calls 49435->49722 49436 7ff79b705af0 15 API calls 49440 7ff79b7030d0 49436->49440 49726 7ff79b7025b0 44 API calls 49440->49726 49441 7ff79b702f91 free free 49444 7ff79b702fb8 49441->49444 49443 7ff79b7030ab 49446 7ff79b70314c 49443->49446 49727 7ff79b6fe200 QueryPerformanceCounter GetTickCount 49443->49727 49448 7ff79b705af0 15 API calls 49444->49448 49445 7ff79b703066 49445->49443 49724 7ff79b6fe130 QueryPerformanceCounter GetTickCount 49445->49724 49729 7ff79b6fdde0 17 API calls 49446->49729 49451 7ff79b70300f 49448->49451 49450 7ff79b70308d 49456 7ff79b7030a0 49450->49456 49457 7ff79b7030ad 49450->49457 49682 7ff79b701790 49451->49682 49454 7ff79b7031cb 49686 7ff79b7054c0 49454->49686 49455 7ff79b703181 49455->49451 49467 7ff79b705af0 15 API calls 49455->49467 49725 7ff79b701430 90 API calls 49456->49725 49459 7ff79b705af0 15 API calls 49457->49459 49459->49472 49460 7ff79b703135 49463 7ff79b703141 49460->49463 49464 7ff79b70331b 49460->49464 49462 7ff79b70315b 49462->49455 49466 7ff79b705af0 15 API calls 49462->49466 49462->49473 49728 7ff79b701430 90 API calls 49463->49728 49469 7ff79b705af0 15 API calls 49464->49469 49465 7ff79b7031d3 49465->49473 49695 7ff79b704ef0 49465->49695 49466->49455 49470 7ff79b7031af 49467->49470 49469->49472 49470->49451 49472->49436 49473->49388 49474->49358 49475->49356 49477 7ff79b702145 49476->49477 49478 7ff79b702150 calloc 49476->49478 49477->49387 49479 7ff79b7023c1 free 49478->49479 49480 7ff79b70217a 49478->49480 49479->49387 49481 7ff79b70d7b0 2 API calls 49480->49481 49482 7ff79b702211 49481->49482 49483 7ff79b70d7b0 2 API calls 49482->49483 49484 7ff79b702225 49483->49484 49485 7ff79b7023fd 49484->49485 49486 7ff79b702387 _strdup 49484->49486 49487 7ff79b70d7b0 2 API calls 49485->49487 49486->49485 49488 7ff79b702399 49486->49488 49489 7ff79b70243d 49487->49489 49490 7ff79b7023a7 free free 49488->49490 49489->49387 49490->49479 49730 7ff79b705570 8 API calls 49491->49730 49494 7ff79b7045b0 49733 7ff79b72e540 23 API calls 49494->49733 49495 7ff79b7045b7 49734 7ff79b72e500 calloc 49495->49734 49498 7ff79b7045b5 49499 7ff79b7045bc 49498->49499 49504 7ff79b704632 49499->49504 49536 7ff79b7029bc 49499->49536 49735 7ff79b72e170 tolower 49499->49735 49500 7ff79b7046f5 49738 7ff79b72e680 8 API calls 49500->49738 49502 7ff79b7045ff 49502->49504 49505 7ff79b70460b free 49502->49505 49506 7ff79b704618 49502->49506 49504->49500 49504->49536 49737 7ff79b72e680 8 API calls 49504->49737 49505->49506 49736 7ff79b708db0 15 API calls 49506->49736 49509 7ff79b70475c 49739 7ff79b705970 19 API calls 49509->49739 49511 7ff79b7046dc 49511->49500 49513 7ff79b7046e8 free 49511->49513 49511->49536 49512 7ff79b70476e 49512->49536 49513->49500 49514 7ff79b70471e 49514->49509 49515 7ff79b704794 49514->49515 49514->49536 49740 7ff79b72e680 8 API calls 49515->49740 49517 7ff79b7047bb 49518 7ff79b7047c5 _strdup 49517->49518 49519 7ff79b7047e2 49517->49519 49518->49519 49518->49536 49519->49536 49741 7ff79b72e680 8 API calls 49519->49741 49521 7ff79b704805 49522 7ff79b704828 49521->49522 49523 7ff79b70480f _strdup 49521->49523 49522->49536 49742 7ff79b72e680 8 API calls 49522->49742 49523->49522 49523->49536 49525 7ff79b704848 49526 7ff79b704852 _strdup 49525->49526 49527 7ff79b7048dd 49525->49527 49526->49527 49526->49536 49527->49536 49743 7ff79b72e680 8 API calls 49527->49743 49529 7ff79b7048f8 49529->49536 49744 7ff79b72e680 8 API calls 49529->49744 49531 7ff79b70492d 49531->49536 49745 7ff79b72e680 8 API calls 49531->49745 49533 7ff79b704971 49534 7ff79b704991 strtoul 49533->49534 49535 7ff79b704975 49533->49535 49534->49535 49535->49536 49746 7ff79b72e680 8 API calls 49535->49746 49536->49392 49536->49393 49536->49473 49538 7ff79b704a0d _strdup 49538->49536 49539 7ff79b7049d0 49539->49538 49539->49539 49747 7ff79b705640 20 API calls 49539->49747 49542 7ff79b70344d 49541->49542 49543 7ff79b70337d memset memset 49541->49543 49544 7ff79b703480 49542->49544 49545 7ff79b703459 _strdup 49542->49545 49546 7ff79b7033b0 strncpy 49543->49546 49547 7ff79b7033c8 49543->49547 49551 7ff79b70349f 49544->49551 49552 7ff79b70348c _strdup 49544->49552 49545->49544 49550 7ff79b703467 49545->49550 49546->49547 49548 7ff79b7033d4 strncpy 49547->49548 49549 7ff79b7033ef 49547->49549 49548->49549 49748 7ff79b71c080 malloc strtoul free 49549->49748 49750 7ff79b705970 19 API calls 49550->49750 49575 7ff79b7034fe 49551->49575 49751 7ff79b71bf40 realloc GetEnvironmentVariableA realloc free 49551->49751 49552->49550 49552->49551 49556 7ff79b70340f 49559 7ff79b70343c 49556->49559 49749 7ff79b71c080 malloc strtoul free 49556->49749 49557 7ff79b703476 49560 7ff79b7039a7 free free 49557->49560 49558 7ff79b7034c0 49561 7ff79b7034dc 49558->49561 49752 7ff79b71bf40 realloc GetEnvironmentVariableA realloc free 49558->49752 49559->49542 49559->49560 49564 7ff79b73f580 8 API calls 49560->49564 49568 7ff79b705af0 15 API calls 49561->49568 49561->49575 49563 7ff79b703761 free 49565 7ff79b703771 49563->49565 49566 7ff79b70379e 49563->49566 49569 7ff79b702a17 49564->49569 49565->49566 49570 7ff79b703792 free 49565->49570 49571 7ff79b7037c8 49566->49571 49576 7ff79b7037b8 free 49566->49576 49568->49575 49569->49399 49569->49400 49569->49473 49570->49566 49577 7ff79b7037cd 49571->49577 49757 7ff79b704240 47 API calls 49571->49757 49572 7ff79b7036a9 49753 7ff79b71bf40 realloc GetEnvironmentVariableA realloc free 49572->49753 49573 7ff79b703656 49573->49563 49573->49572 49578 7ff79b703690 tolower 49573->49578 49574 7ff79b7037e4 free free free 49585 7ff79b7037d7 49574->49585 49575->49573 49575->49574 49575->49575 49582 7ff79b70356e strchr 49575->49582 49599 7ff79b703587 49575->49599 49576->49571 49577->49585 49597 7ff79b703881 49577->49597 49758 7ff79b704240 47 API calls 49577->49758 49578->49572 49578->49578 49581 7ff79b70382f free 49581->49577 49581->49585 49582->49573 49582->49599 49584 7ff79b70370c 49587 7ff79b70373f 49584->49587 49755 7ff79b71bf40 realloc GetEnvironmentVariableA realloc free 49584->49755 49585->49560 49586 7ff79b703863 free 49586->49585 49586->49597 49589 7ff79b705af0 15 API calls 49587->49589 49590 7ff79b70375c 49587->49590 49589->49590 49590->49563 49591 7ff79b7036d0 49591->49584 49754 7ff79b71bf40 realloc GetEnvironmentVariableA realloc free 49591->49754 49592 7ff79b703728 49592->49587 49756 7ff79b71bf40 realloc GetEnvironmentVariableA realloc free 49592->49756 49593 7ff79b7035b0 strchr 49593->49599 49596 7ff79b7035e0 strchr 49596->49599 49597->49585 49598 7ff79b7038f7 free 49597->49598 49598->49585 49599->49573 49599->49574 49599->49593 49599->49596 49601 7ff79b703bb1 49600->49601 49602 7ff79b703be4 49600->49602 49601->49602 49605 7ff79b703bc4 free 49601->49605 49606 7ff79b703bd0 49601->49606 49603 7ff79b703c1b 49602->49603 49604 7ff79b703bf9 free _strdup 49602->49604 49607 7ff79b703c2f free _strdup 49603->49607 49608 7ff79b703c51 49603->49608 49604->49603 49614 7ff79b703d18 49604->49614 49605->49606 49606->49602 49610 7ff79b703bd8 free 49606->49610 49607->49608 49607->49614 49609 7ff79b703c65 free _strdup 49608->49609 49611 7ff79b703c8f 49608->49611 49609->49611 49609->49614 49610->49602 49611->49614 49759 7ff79b730430 36 API calls 49611->49759 49613 7ff79b703cfe 49613->49614 49615 7ff79b705af0 15 API calls 49613->49615 49614->49401 49615->49614 49623 7ff79b704020 49616->49623 49618 7ff79b7040f8 strchr 49619 7ff79b70410d strtol 49618->49619 49618->49623 49619->49623 49621 7ff79b702b57 49621->49473 49626 7ff79b7016c0 49621->49626 49622 7ff79b70419a free 49622->49623 49623->49618 49623->49621 49623->49622 49624 7ff79b705af0 15 API calls 49623->49624 49625 7ff79b7040c7 free 49623->49625 49760 7ff79b708db0 15 API calls 49623->49760 49761 7ff79b703df0 22 API calls 49623->49761 49624->49623 49625->49622 49625->49623 49628 7ff79b7016f5 49626->49628 49632 7ff79b70170f 49626->49632 49627 7ff79b73f580 8 API calls 49629 7ff79b701721 49627->49629 49628->49632 49762 7ff79b730380 18 API calls 49628->49762 49629->49410 49629->49411 49629->49473 49631 7ff79b701748 49631->49632 49633 7ff79b70175b GetLastError 49631->49633 49632->49627 49763 7ff79b6f2640 21 API calls 49633->49763 49635 7ff79b701773 49764 7ff79b705970 19 API calls 49635->49764 49637 7ff79b701789 49637->49632 49639 7ff79b6feee6 _strdup 49638->49639 49640 7ff79b6fef05 49638->49640 49639->49640 49641 7ff79b6feef5 49639->49641 49642 7ff79b6fef12 _strdup 49640->49642 49643 7ff79b6fef31 49640->49643 49641->49418 49642->49643 49644 7ff79b6fef21 49642->49644 49645 7ff79b6fef3e _strdup 49643->49645 49646 7ff79b6fef5d 49643->49646 49644->49418 49645->49646 49647 7ff79b6fef4d 49645->49647 49648 7ff79b6fef6a _strdup 49646->49648 49649 7ff79b6fef89 49646->49649 49647->49418 49648->49649 49650 7ff79b6fef79 49648->49650 49651 7ff79b6fef96 _strdup 49649->49651 49652 7ff79b6fefb5 49649->49652 49650->49418 49651->49652 49653 7ff79b6fefa5 49651->49653 49654 7ff79b6fefc2 _strdup 49652->49654 49655 7ff79b6fefe1 49652->49655 49653->49418 49654->49655 49656 7ff79b6fefd1 49654->49656 49657 7ff79b6fefee _strdup 49655->49657 49658 7ff79b6ff00d 49655->49658 49656->49418 49657->49658 49659 7ff79b6feffd 49657->49659 49660 7ff79b6ff01a _strdup 49658->49660 49661 7ff79b6ff029 49658->49661 49659->49418 49660->49661 49661->49418 49663 7ff79b70d7b0 2 API calls 49662->49663 49669 7ff79b704a63 49663->49669 49664 7ff79b702f37 49664->49430 49721 7ff79b700600 15 API calls 49664->49721 49665 7ff79b70e520 9 API calls 49665->49669 49669->49664 49669->49665 49672 7ff79b704b37 49669->49672 49765 7ff79b70eee0 free free free free 49669->49765 49766 7ff79b730d10 8 API calls 49669->49766 49767 7ff79b730920 7 API calls 49669->49767 49670 7ff79b705af0 15 API calls 49670->49672 49672->49670 49673 7ff79b7065d0 closesocket free 49672->49673 49674 7ff79b704bd6 30 API calls 49672->49674 49768 7ff79b6fac00 16 API calls 49672->49768 49673->49672 49769 7ff79b7028a0 free free 49674->49769 49676 7ff79b704e36 49677 7ff79b704e44 free 49676->49677 49770 7ff79b6ff050 8 API calls 49677->49770 49679 7ff79b704e64 49771 7ff79b6ff050 8 API calls 49679->49771 49681 7ff79b704e70 free free free 49681->49669 49683 7ff79b70179e 49682->49683 49684 7ff79b70d7b0 2 API calls 49683->49684 49685 7ff79b701808 49684->49685 49685->49454 49687 7ff79b7054dc 49686->49687 49688 7ff79b7054e5 49687->49688 49689 7ff79b705512 49687->49689 49690 7ff79b7054fe free 49687->49690 49688->49465 49691 7ff79b705525 _strdup 49689->49691 49692 7ff79b705517 49689->49692 49690->49689 49694 7ff79b705523 49691->49694 49772 7ff79b708db0 15 API calls 49692->49772 49694->49465 49696 7ff79b7071f0 10 API calls 49695->49696 49697 7ff79b704f15 49696->49697 49698 7ff79b704f20 49697->49698 49699 7ff79b704fdc 49697->49699 49700 7ff79b704f37 calloc 49697->49700 49698->49473 49701 7ff79b70509d _strdup 49699->49701 49702 7ff79b704fe8 _strdup 49699->49702 49703 7ff79b704f57 49700->49703 49716 7ff79b704f4f 49700->49716 49716->49698 49719->49426 49720->49422 49721->49433 49722->49441 49723->49445 49724->49450 49725->49443 49726->49473 49727->49460 49728->49446 49729->49462 49731 7ff79b72e510 13 API calls 49730->49731 49732 7ff79b7045a4 49731->49732 49732->49494 49732->49495 49733->49498 49735->49502 49736->49504 49737->49511 49738->49514 49739->49512 49740->49517 49741->49521 49742->49525 49743->49529 49744->49531 49745->49533 49746->49539 49747->49538 49748->49556 49749->49559 49750->49557 49751->49558 49752->49561 49753->49591 49754->49584 49755->49592 49756->49587 49757->49581 49758->49586 49759->49613 49760->49623 49761->49623 49762->49631 49763->49635 49764->49637 49765->49669 49768->49672 49769->49676 49770->49679 49771->49681 49772->49694 49777 7ff79b6f7df8 49778 7ff79b6f7e11 49777->49778 49779 7ff79b6f7e9f 49778->49779 49781 7ff79b6f8074 49778->49781 49818 7ff79b70c510 49779->49818 49862 7ff79b6f57f0 17 API calls 49781->49862 49785 7ff79b6f7ec4 49786 7ff79b6f7f60 49785->49786 49789 7ff79b6f7ef5 49785->49789 49792 7ff79b6f7ece 49785->49792 49787 7ff79b6f8011 49786->49787 49788 7ff79b6f7f68 49786->49788 49816 7ff79b6f727b 49787->49816 49861 7ff79b6f57f0 17 API calls 49787->49861 49788->49789 49795 7ff79b6f7f7e 49788->49795 49796 7ff79b6f7feb free 49788->49796 49797 7ff79b6f6d00 292 API calls 49789->49797 49791 7ff79b6f84a0 17 API calls 49791->49816 49793 7ff79b6f6d00 292 API calls 49792->49793 49793->49816 49799 7ff79b6f7f8b free 49795->49799 49795->49816 49796->49789 49801 7ff79b6f7f13 49797->49801 49798 7ff79b6f8322 49860 7ff79b70bdd0 28 API calls 49799->49860 49800 7ff79b6f8313 49866 7ff79b705970 19 API calls 49800->49866 49859 7ff79b70bdd0 28 API calls 49801->49859 49805 7ff79b6f7fb3 free 49807 7ff79b6f7fc9 49805->49807 49805->49816 49810 7ff79b6f6d00 292 API calls 49807->49810 49809 7ff79b6f7f44 free 49809->49816 49810->49816 49811 7ff79b7071f0 10 API calls 49811->49816 49812 7ff79b6f7f22 49812->49809 49813 7ff79b705970 19 API calls 49814 7ff79b6f731e 49813->49814 49814->49813 49814->49816 49816->49791 49816->49798 49816->49800 49816->49811 49816->49814 49817 7ff79b6f6d00 292 API calls 49816->49817 49857 7ff79b705970 19 API calls 49816->49857 49863 7ff79b701430 90 API calls 49816->49863 49864 7ff79b6f5a20 15 API calls 49816->49864 49865 7ff79b7151e0 22 API calls 49816->49865 49817->49816 49819 7ff79b70c561 49818->49819 49820 7ff79b70c5af 49819->49820 49821 7ff79b715fe0 19 API calls 49819->49821 49822 7ff79b70c5cd 49820->49822 49823 7ff79b70c5b6 49820->49823 49821->49820 49825 7ff79b70c5f9 49822->49825 49867 7ff79b70cc20 49822->49867 49900 7ff79b705970 19 API calls 49823->49900 49826 7ff79b70c62e 49825->49826 49827 7ff79b70c616 49825->49827 49831 7ff79b6f7eb3 49825->49831 49830 7ff79b70d7b0 2 API calls 49826->49830 49901 7ff79b70d370 90 API calls 49827->49901 49828 7ff79b70c5c5 49828->49831 49839 7ff79b70c638 49830->49839 49831->49785 49858 7ff79b70c810 24 API calls 49831->49858 49833 7ff79b70c626 49833->49826 49833->49831 49834 7ff79b70c6a8 49902 7ff79b7151e0 22 API calls 49834->49902 49836 7ff79b70c6b0 49836->49831 49903 7ff79b716350 23 API calls 49836->49903 49838 7ff79b70c6ce 49838->49831 49840 7ff79b70c6e2 49838->49840 49847 7ff79b70c762 49838->49847 49839->49834 49841 7ff79b705af0 15 API calls 49839->49841 49843 7ff79b7071f0 10 API calls 49840->49843 49841->49834 49842 7ff79b70c7c9 49908 7ff79b7151e0 22 API calls 49842->49908 49846 7ff79b70c6f1 49843->49846 49845 7ff79b70c7a0 49845->49842 49850 7ff79b70c7b3 49845->49850 49846->49831 49848 7ff79b70c6fa 49846->49848 49847->49842 49847->49845 49849 7ff79b70c787 49847->49849 49853 7ff79b70c74c 49848->49853 49854 7ff79b70c731 49848->49854 49906 7ff79b705970 19 API calls 49849->49906 49907 7ff79b705970 19 API calls 49850->49907 49905 7ff79b705970 19 API calls 49853->49905 49904 7ff79b705970 19 API calls 49854->49904 49857->49816 49858->49785 49859->49812 49860->49805 49861->49816 49862->49816 49863->49816 49864->49816 49865->49816 49866->49798 49871 7ff79b70cc70 49867->49871 49869 7ff79b715090 2 API calls 49869->49871 49870 7ff79b70d1aa 49873 7ff79b705af0 15 API calls 49870->49873 49899 7ff79b70d1c3 49870->49899 49871->49869 49871->49870 49872 7ff79b70d7b0 2 API calls 49871->49872 49875 7ff79b70d187 49871->49875 49876 7ff79b70cf00 49871->49876 49881 7ff79b70d241 49871->49881 49884 7ff79b70d1af 49871->49884 49886 7ff79b705af0 15 API calls 49871->49886 49893 7ff79b70cedc 49871->49893 49898 7ff79b705890 23 API calls 49871->49898 49871->49899 49909 7ff79b705c60 49871->49909 49912 7ff79b712890 192 API calls 49871->49912 49915 7ff79b732590 23 API calls 49871->49915 49916 7ff79b71f0b0 23 API calls 49871->49916 49872->49871 49873->49899 49875->49870 49877 7ff79b705af0 15 API calls 49875->49877 49876->49871 49913 7ff79b7058b0 fwrite fwrite 49876->49913 49914 7ff79b7058b0 fwrite fwrite 49876->49914 49877->49870 49882 7ff79b70d25d 49881->49882 49883 7ff79b70d246 49881->49883 49919 7ff79b705970 19 API calls 49882->49919 49918 7ff79b705970 19 API calls 49883->49918 49887 7ff79b70d1b7 49884->49887 49888 7ff79b70d1e3 49884->49888 49886->49871 49890 7ff79b705af0 15 API calls 49887->49890 49917 7ff79b705970 19 API calls 49888->49917 49889 7ff79b70d1ef 49889->49899 49890->49899 49894 7ff79b705af0 15 API calls 49893->49894 49895 7ff79b70d208 49894->49895 49897 7ff79b705af0 15 API calls 49895->49897 49897->49899 49898->49871 49899->49825 49900->49828 49901->49833 49902->49836 49903->49838 49904->49828 49905->49828 49906->49828 49907->49828 49908->49831 49920 7ff79b71b5c0 49909->49920 49912->49871 49913->49876 49914->49871 49915->49871 49916->49871 49917->49889 49918->49889 49919->49889 49921 7ff79b71b65e 49920->49921 49922 7ff79b71b63f 49920->49922 49923 7ff79b71b682 49921->49923 49924 7ff79b71b665 49921->49924 49922->49921 49925 7ff79b71b645 49922->49925 49928 7ff79b71b688 49923->49928 49931 7ff79b71b6a1 49923->49931 49927 7ff79b705af0 15 API calls 49924->49927 49926 7ff79b705af0 15 API calls 49925->49926 49929 7ff79b71b654 49926->49929 49927->49929 49930 7ff79b705af0 15 API calls 49928->49930 49941 7ff79b708800 14 API calls 49929->49941 49947 7ff79b71baf6 49929->49947 49930->49929 49932 7ff79b71b6d0 realloc 49931->49932 49933 7ff79b71b71e 49931->49933 49955 7ff79b71b799 49931->49955 49932->49933 49934 7ff79b71b6fd 49932->49934 49937 7ff79b705cf0 2 API calls 49933->49937 49967 7ff79b705970 19 API calls 49934->49967 49935 7ff79b71bbf5 memcpy memcpy 49938 7ff79b71bc3b 49935->49938 49940 7ff79b71b767 49937->49940 49942 7ff79b73f580 8 API calls 49938->49942 49939 7ff79b71b714 49939->49929 49945 7ff79b71b95e 49940->49945 49946 7ff79b71b78d 49940->49946 49940->49955 49943 7ff79b71bae6 49941->49943 49944 7ff79b705cbb 49942->49944 49943->49947 49948 7ff79b705af0 15 API calls 49943->49948 49944->49871 49949 7ff79b705af0 15 API calls 49945->49949 49950 7ff79b705af0 15 API calls 49946->49950 49947->49935 49947->49938 49948->49947 49949->49955 49950->49955 49951 7ff79b705af0 15 API calls 49951->49929 49952 7ff79b719a80 306 API calls 49952->49955 49953 7ff79b705af0 15 API calls 49953->49955 49954 7ff79b71bb07 49958 7ff79b71ba7e 49954->49958 49959 7ff79b71bb36 49954->49959 49955->49929 49955->49952 49955->49953 49955->49954 49956 7ff79b71b8a0 realloc 49955->49956 49955->49958 49961 7ff79b71b93b memcpy 49955->49961 49963 7ff79b71b8eb memcpy 49955->49963 49956->49955 49957 7ff79b71bb66 49956->49957 49969 7ff79b705970 19 API calls 49957->49969 49958->49929 49958->49951 49968 7ff79b6f1d10 22 API calls 49959->49968 49961->49955 49963->49955 49964 7ff79b71bb4f 49966 7ff79b705af0 15 API calls 49964->49966 49965 7ff79b71bb7d 49965->49929 49966->49929 49967->49939 49968->49964 49969->49965
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$strchr$_strdup$callocmemcpystrstr
                                                  • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                                  • API String ID: 2045874074-4264080130
                                                  • Opcode ID: 7786becf68336d0054d3751eb5a69a9aec0b7b775e65eefc63fcc71cb1334378
                                                  • Instruction ID: aa297e2a62e940e2c3fac46c53f95091aacbcc2841c5ddd7ff78a42621aa0b44
                                                  • Opcode Fuzzy Hash: 7786becf68336d0054d3751eb5a69a9aec0b7b775e65eefc63fcc71cb1334378
                                                  • Instruction Fuzzy Hash: 5503A721A0C64A85FB74EB3998502B9A7A1EF89B84F844237CD1D5B6B5DF3CE645C330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strchr$_strdupstrncmpstrtol
                                                  • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                                  • API String ID: 707411602-3372543188
                                                  • Opcode ID: f594f424c43ecc92778b926f78d702b8f711881766d09741b9e3cd8d16f4b1de
                                                  • Instruction ID: 8129abcc6343b1a1affc0e6aa6b46609fcfe5a50c1abe81cc2c1ce82b071d436
                                                  • Opcode Fuzzy Hash: f594f424c43ecc92778b926f78d702b8f711881766d09741b9e3cd8d16f4b1de
                                                  • Instruction Fuzzy Hash: 00428221A0864E85EB34EF39D8546B9A7A5FB89794F804237CA5E467B0DF3CE644C720

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 870 7ff79b6f1530-7ff79b6f157c rand 871 7ff79b6f1583-7ff79b6f158a 870->871 871->871 872 7ff79b6f158c-7ff79b6f15be call 7ff79b6f0580 rand 871->872 875 7ff79b6f1633-7ff79b6f164f SetConsoleTitleA 872->875 876 7ff79b6f15c0 872->876 877 7ff79b6f1685-7ff79b6f1700 GetConsoleWindow GetWindowLongPtrA SetWindowLongPtrA SetLayeredWindowAttributes GetStdHandle SetConsoleTextAttribute GetStdHandle SetConsoleTextAttribute call 7ff79b6e2aa0 875->877 878 7ff79b6f1651-7ff79b6f1662 875->878 879 7ff79b6f15c2-7ff79b6f15f7 rand 876->879 887 7ff79b6f1705-7ff79b6f1907 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 * 2 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 GetStdHandle SetConsoleTextAttribute call 7ff79b6f1a70 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 877->887 880 7ff79b6f1664-7ff79b6f1677 878->880 881 7ff79b6f1680 call 7ff79b73f22c 878->881 883 7ff79b6f1619-7ff79b6f1624 call 7ff79b6f0680 879->883 884 7ff79b6f15f9-7ff79b6f1617 879->884 880->881 885 7ff79b6f1679-7ff79b6f167f _invalid_parameter_noinfo_noreturn 880->885 881->877 888 7ff79b6f1629-7ff79b6f162d 883->888 884->888 885->881 923 7ff79b6f1982-7ff79b6f1985 887->923 924 7ff79b6f1909-7ff79b6f1981 call 7ff79b6e3d30 * 2 call 7ff79b6e3b10 * 2 URLDownloadToFileA system * 2 Sleep exit 887->924 888->879 890 7ff79b6f162f 888->890 890->875 925 7ff79b6f1a00-7ff79b6f1a08 923->925 926 7ff79b6f1987-7ff79b6f19ff call 7ff79b6e3d30 * 2 call 7ff79b6e3b10 * 2 URLDownloadToFileA system * 2 Sleep exit 923->926 924->923 930 7ff79b6f1a3e-7ff79b6f1a60 call 7ff79b73f580 925->930 931 7ff79b6f1a0a-7ff79b6f1a1b 925->931 926->925 932 7ff79b6f1a1d-7ff79b6f1a30 931->932 933 7ff79b6f1a39 call 7ff79b73f22c 931->933 932->933 937 7ff79b6f1a32-7ff79b6f1a38 _invalid_parameter_noinfo_noreturn 932->937 933->930 937->933
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Console$AttributeHandleText$Windowsystem$rand$DownloadFileLongSleep_invalid_parameter_noinfo_noreturnexit$??5?$basic_istream@AttributesD@std@@@std@@LayeredTitleU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintfmemcpy
                                                  • String ID: Iniciar Valorant Plus (HVCI DESLIGADO): $ Iniciar Valorant Plus (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$.exe$C:\Windows\System32\SerHuStinsHostDialog.exe$C:\Windows\System32\ServceHubeinssDialog.exe$[ Selecione uma opcao: ]$cd C:\$http://185.101.104.122/plushvciforabronkz.exe$http://185.101.104.122/plushvcionbronkz.exe$start C:\Windows\System32\SerHuStinsHostDialog.exe$start C:\Windows\System32\ServceHubeinssDialog.exe
                                                  • API String ID: 2233566951-898826868
                                                  • Opcode ID: 88824a79e85efdc60ed7d95ebd4118c32d67c6a1aa86a915eb6cad24bffb8373
                                                  • Instruction ID: 0ee4322c6ddd2875dd884c0123f0367ecc04a3cd0ad8bfc532b9c72784e8aae7
                                                  • Opcode Fuzzy Hash: 88824a79e85efdc60ed7d95ebd4118c32d67c6a1aa86a915eb6cad24bffb8373
                                                  • Instruction Fuzzy Hash: 9EE16721B0C54B86EB20FB78D8551B8A763EF49795F804336D51E86AF5DE2CA749C320

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 951 7ff79b708980-7ff79b70899c 952 7ff79b70899e-7ff79b7089b0 WSAStartup 951->952 953 7ff79b7089e6-7ff79b7089ed call 7ff79b732480 951->953 955 7ff79b7089c9-7ff79b7089e5 call 7ff79b73f580 952->955 956 7ff79b7089b2-7ff79b7089b9 952->956 962 7ff79b708caf-7ff79b708cc6 call 7ff79b73f580 953->962 963 7ff79b7089f3-7ff79b708a20 GetModuleHandleA 953->963 959 7ff79b7089bb-7ff79b7089c1 956->959 960 7ff79b7089c3 WSACleanup 956->960 959->953 959->960 960->955 965 7ff79b708a2e-7ff79b708a63 GetProcAddress strpbrk 963->965 966 7ff79b708a22-7ff79b708a29 963->966 969 7ff79b708a8b-7ff79b708a8e 965->969 970 7ff79b708a65-7ff79b708a6b 965->970 968 7ff79b708bb3-7ff79b708ca7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 966->968 968->962 973 7ff79b708aba-7ff79b708ad1 GetSystemDirectoryA 969->973 974 7ff79b708a90-7ff79b708aa3 GetProcAddress 969->974 971 7ff79b708a7d-7ff79b708a86 LoadLibraryA 970->971 972 7ff79b708a6d-7ff79b708a78 970->972 978 7ff79b708b7a-7ff79b708b8c 971->978 972->978 976 7ff79b708ad7-7ff79b708aea malloc 973->976 977 7ff79b708b72 973->977 974->973 975 7ff79b708aa5-7ff79b708ab5 LoadLibraryExA 974->975 975->978 979 7ff79b708b69-7ff79b708b6c free 976->979 980 7ff79b708aec-7ff79b708afa GetSystemDirectoryA 976->980 977->978 978->968 981 7ff79b708b8e-7ff79b708bac GetProcAddress 978->981 979->977 980->979 983 7ff79b708afc-7ff79b708b06 980->983 981->968 984 7ff79b708b10-7ff79b708b19 983->984 984->984 985 7ff79b708b1b-7ff79b708b20 984->985 986 7ff79b708b24-7ff79b708b2b 985->986 986->986 987 7ff79b708b2d-7ff79b708b36 986->987 988 7ff79b708b40-7ff79b708b4c 987->988 988->988 989 7ff79b708b4e-7ff79b708b54 988->989 990 7ff79b708b60 LoadLibraryA 989->990 991 7ff79b708b56-7ff79b708b5e 989->991 992 7ff79b708b66 990->992 991->992 992->979
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                                  • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                                  • API String ID: 2612373469-2794540096
                                                  • Opcode ID: dd8c520f1f9f42ea8cb78eec73e1dd8ca5308544d44c97ebf9fd234ba4bd7abd
                                                  • Instruction ID: b7dfeb4b0396e38b3410325c7d9519670048f98e27cedd45b3baa057d22add13
                                                  • Opcode Fuzzy Hash: dd8c520f1f9f42ea8cb78eec73e1dd8ca5308544d44c97ebf9fd234ba4bd7abd
                                                  • Instruction Fuzzy Hash: 47916721A0D78686E770AB39A8543B9B7A2FB8DB85F844337C94D06775DF3CE2458720

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1248 7ff79b707cc0-7ff79b707d2d 1249 7ff79b707d32-7ff79b707d42 1248->1249 1250 7ff79b707d2f 1248->1250 1251 7ff79b707d44-7ff79b707d4c 1249->1251 1252 7ff79b707d51-7ff79b707d69 memcpy 1249->1252 1250->1249 1251->1252 1253 7ff79b707d6b-7ff79b707d96 call 7ff79b6f6290 * 2 1252->1253 1254 7ff79b707d98-7ff79b707dab socket 1252->1254 1256 7ff79b707dae-7ff79b707dba 1253->1256 1254->1256 1258 7ff79b707dc0-7ff79b707dc8 1256->1258 1259 7ff79b70824f 1256->1259 1261 7ff79b707dca-7ff79b707dd2 call 7ff79b714c90 1258->1261 1262 7ff79b707dd7-7ff79b707de0 1258->1262 1260 7ff79b708254-7ff79b70827d call 7ff79b73f580 1259->1260 1261->1262 1264 7ff79b707de2-7ff79b707ded 1262->1264 1265 7ff79b707df0-7ff79b707df9 1262->1265 1264->1265 1268 7ff79b707e0c-7ff79b707e10 1265->1268 1269 7ff79b707dfb-7ff79b707dfe 1265->1269 1274 7ff79b707e15-7ff79b707e27 call 7ff79b7311c0 1268->1274 1272 7ff79b707e04-7ff79b707e0a 1269->1272 1273 7ff79b7081fa-7ff79b70824d _errno * 3 call 7ff79b6f2500 call 7ff79b705970 call 7ff79b7065d0 1269->1273 1272->1274 1273->1260 1274->1273 1281 7ff79b707e2d-7ff79b707e55 htons call 7ff79b705af0 1274->1281 1287 7ff79b707e5c-7ff79b707e61 1281->1287 1288 7ff79b707e57-7ff79b707e5a 1281->1288 1289 7ff79b707ece 1287->1289 1290 7ff79b707e63-7ff79b707e6d 1287->1290 1288->1287 1288->1289 1291 7ff79b707ed1-7ff79b707eed 1289->1291 1290->1291 1292 7ff79b707e6f-7ff79b707e9b setsockopt 1290->1292 1295 7ff79b707eef-7ff79b707f03 call 7ff79b708800 1291->1295 1296 7ff79b707f1d-7ff79b707f20 1291->1296 1293 7ff79b707e9d-7ff79b707ec4 WSAGetLastError call 7ff79b6f2500 call 7ff79b705af0 1292->1293 1294 7ff79b707ec9-7ff79b707ecc 1292->1294 1293->1294 1294->1291 1309 7ff79b707f05-7ff79b707f0f 1295->1309 1310 7ff79b707f11-7ff79b707f1b 1295->1310 1299 7ff79b707f74-7ff79b707f77 1296->1299 1300 7ff79b707f22-7ff79b707f47 getsockopt 1296->1300 1301 7ff79b70805f-7ff79b708066 1299->1301 1302 7ff79b707f7d-7ff79b707f84 1299->1302 1305 7ff79b707f53-7ff79b707f6e setsockopt 1300->1305 1306 7ff79b707f49-7ff79b707f51 1300->1306 1311 7ff79b70809a-7ff79b7080a1 1301->1311 1312 7ff79b708068-7ff79b708095 call 7ff79b6f6290 * 2 1301->1312 1302->1301 1307 7ff79b707f8a-7ff79b707fb5 setsockopt 1302->1307 1305->1299 1306->1299 1306->1305 1314 7ff79b707fce-7ff79b708042 call 7ff79b708370 * 2 WSAIoctl 1307->1314 1315 7ff79b707fb7-7ff79b707fc9 call 7ff79b705af0 1307->1315 1309->1299 1310->1300 1316 7ff79b7080a3-7ff79b7080a6 1311->1316 1317 7ff79b7080a8-7ff79b7080c8 call 7ff79b731130 call 7ff79b707630 1311->1317 1339 7ff79b7080e5-7ff79b7080e7 1312->1339 1340 7ff79b708097 1312->1340 1314->1301 1337 7ff79b708044-7ff79b70805a WSAGetLastError call 7ff79b705af0 1314->1337 1315->1301 1316->1317 1321 7ff79b7080fe-7ff79b708128 call 7ff79b714c90 call 7ff79b70d7b0 1316->1321 1317->1321 1338 7ff79b7080ca-7ff79b7080d8 call 7ff79b7065d0 1317->1338 1341 7ff79b70812a-7ff79b70813a call 7ff79b6f57f0 1321->1341 1342 7ff79b70813f-7ff79b708142 1321->1342 1337->1301 1338->1259 1350 7ff79b7080de-7ff79b7080e0 1338->1350 1339->1311 1346 7ff79b7080e9-7ff79b7080f9 call 7ff79b7065d0 1339->1346 1340->1311 1341->1342 1348 7ff79b708148-7ff79b708150 1342->1348 1349 7ff79b7081ef-7ff79b7081f8 1342->1349 1346->1260 1348->1349 1352 7ff79b708156-7ff79b70815d 1348->1352 1349->1260 1350->1260 1353 7ff79b708188-7ff79b708193 WSAGetLastError 1352->1353 1354 7ff79b70815f-7ff79b708174 connect 1352->1354 1357 7ff79b7081e2-7ff79b7081e4 1353->1357 1358 7ff79b708195-7ff79b70819e 1353->1358 1354->1353 1356 7ff79b708176-7ff79b708178 1354->1356 1359 7ff79b70817a-7ff79b708183 1356->1359 1360 7ff79b7081eb-7ff79b7081ed 1356->1360 1357->1360 1358->1357 1361 7ff79b7081a0-7ff79b7081e0 call 7ff79b6f2500 call 7ff79b705af0 call 7ff79b7065d0 1358->1361 1359->1260 1360->1260 1361->1260
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                                  • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                                  • API String ID: 3453287622-3868455274
                                                  • Opcode ID: f83ce6319c3d072a7bee076589618ddd50afc74ce46f89b4be21cbc75155fc70
                                                  • Instruction ID: 79d13a319f992aaedfe9e11edc6fe94f8d50ec6fbe9aef4f614f82459a615c94
                                                  • Opcode Fuzzy Hash: f83ce6319c3d072a7bee076589618ddd50afc74ce46f89b4be21cbc75155fc70
                                                  • Instruction Fuzzy Hash: D5F1B471A0C64A86E770EB39D8442BDA7A1FB48748F804637DA4D47AB5DF3CE645CB20

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1905 7ff79b714a60-7ff79b714aae socket 1906 7ff79b714ab0 1905->1906 1907 7ff79b714ab5-7ff79b714b0e htonl setsockopt 1905->1907 1908 7ff79b714c64-7ff79b714c82 call 7ff79b73f580 1906->1908 1909 7ff79b714c3b-7ff79b714c57 closesocket * 3 1907->1909 1910 7ff79b714b14-7ff79b714b29 bind 1907->1910 1911 7ff79b714c5c 1909->1911 1910->1909 1913 7ff79b714b2f-7ff79b714b45 getsockname 1910->1913 1911->1908 1913->1909 1915 7ff79b714b4b-7ff79b714b5a listen 1913->1915 1915->1909 1916 7ff79b714b60-7ff79b714b75 socket 1915->1916 1916->1909 1917 7ff79b714b7b-7ff79b714b90 connect 1916->1917 1917->1909 1918 7ff79b714b96-7ff79b714bac accept 1917->1918 1918->1909 1919 7ff79b714bb2-7ff79b714bce call 7ff79b708e80 1918->1919 1922 7ff79b714bd5-7ff79b714bdc 1919->1922 1922->1922 1923 7ff79b714bde-7ff79b714bf8 send 1922->1923 1923->1909 1924 7ff79b714bfa-7ff79b714c16 recv 1923->1924 1924->1909 1925 7ff79b714c18-7ff79b714c2c memcmp 1924->1925 1925->1909 1926 7ff79b714c2e-7ff79b714c39 closesocket 1925->1926 1926->1911
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                                  • String ID:
                                                  • API String ID: 3699910901-0
                                                  • Opcode ID: 422b14c895b552d3fb477ae8a66caf64ac0e62345687c253540b9b0d801fd834
                                                  • Instruction ID: 5ffa98a76d898694f182cf99dd9b1801b9d64c29dd5ce9f8ff400a7cc426cc47
                                                  • Opcode Fuzzy Hash: 422b14c895b552d3fb477ae8a66caf64ac0e62345687c253540b9b0d801fd834
                                                  • Instruction Fuzzy Hash: 31518531608A4A81D720EF39E444169B762EF897B5F904736DA7E43AF4DF3CD6458B20

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1927 7ff79b706980-7ff79b7069cd 1928 7ff79b7069cf-7ff79b7069d3 1927->1928 1929 7ff79b7069d8-7ff79b706a13 call 7ff79b70d7b0 1927->1929 1930 7ff79b706ef6-7ff79b706f14 call 7ff79b73f580 1928->1930 1935 7ff79b706a15 1929->1935 1936 7ff79b706a18-7ff79b706a1b 1929->1936 1935->1936 1937 7ff79b706a1d-7ff79b706a20 1936->1937 1938 7ff79b706a38 1936->1938 1939 7ff79b706a33-7ff79b706a36 1937->1939 1940 7ff79b706a22-7ff79b706a25 1937->1940 1941 7ff79b706a3b-7ff79b706a67 call 7ff79b70d840 1938->1941 1939->1941 1940->1941 1942 7ff79b706a27-7ff79b706a31 1940->1942 1945 7ff79b706a82-7ff79b706a8a 1941->1945 1946 7ff79b706a69-7ff79b706a7d call 7ff79b705970 1941->1946 1942->1941 1948 7ff79b706a8c-7ff79b706a9e call 7ff79b707b50 1945->1948 1949 7ff79b706ab9-7ff79b706ad7 1945->1949 1953 7ff79b706ee6-7ff79b706eee 1946->1953 1958 7ff79b706ab2-7ff79b706ab4 1948->1958 1959 7ff79b706aa0-7ff79b706aa2 1948->1959 1952 7ff79b706ae0-7ff79b706af5 1949->1952 1955 7ff79b706afb-7ff79b706b0f call 7ff79b715fe0 1952->1955 1956 7ff79b706d7a 1952->1956 1953->1930 1964 7ff79b706b15-7ff79b706b40 call 7ff79b70d840 1955->1964 1965 7ff79b706c90-7ff79b706c93 1955->1965 1957 7ff79b706d7e-7ff79b706d8f 1956->1957 1957->1952 1961 7ff79b706d95-7ff79b706d97 1957->1961 1958->1953 1959->1958 1962 7ff79b706aa4-7ff79b706aad call 7ff79b707c60 1959->1962 1966 7ff79b706d9d-7ff79b706db4 call 7ff79b708280 1961->1966 1967 7ff79b706edc 1961->1967 1962->1958 1979 7ff79b706b42-7ff79b706b54 call 7ff79b705af0 1964->1979 1980 7ff79b706b59-7ff79b706b5c 1964->1980 1970 7ff79b706c95-7ff79b706c9c 1965->1970 1971 7ff79b706d04-7ff79b706d4a SleepEx getsockopt 1965->1971 1983 7ff79b706dba-7ff79b706dc1 1966->1983 1984 7ff79b706e67-7ff79b706e69 1966->1984 1973 7ff79b706ede 1967->1973 1970->1971 1975 7ff79b706c9e-7ff79b706ca0 1970->1975 1977 7ff79b706d56 1971->1977 1978 7ff79b706d4c-7ff79b706d54 WSAGetLastError 1971->1978 1973->1953 1981 7ff79b706ca6-7ff79b706cec SleepEx getsockopt 1975->1981 1982 7ff79b706baf-7ff79b706bb1 1975->1982 1985 7ff79b706d5a-7ff79b706d5c 1977->1985 1978->1985 1979->1980 1991 7ff79b706b5e-7ff79b706b65 1980->1991 1992 7ff79b706bab 1980->1992 1987 7ff79b706cee-7ff79b706cf6 WSAGetLastError 1981->1987 1988 7ff79b706cfb-7ff79b706cff 1981->1988 1982->1956 1995 7ff79b706bb7-7ff79b706bcc WSASetLastError 1982->1995 1989 7ff79b706e6b-7ff79b706e72 1983->1989 1990 7ff79b706dc7-7ff79b706dce 1983->1990 1984->1973 1993 7ff79b706dd3-7ff79b706e21 1985->1993 1994 7ff79b706d5e-7ff79b706d64 1985->1994 1987->1982 1988->1982 1997 7ff79b706e74-7ff79b706e7b 1989->1997 1998 7ff79b706e7d-7ff79b706e84 1989->1998 2000 7ff79b706e96-7ff79b706ed9 call 7ff79b6f2500 call 7ff79b705970 1990->2000 1991->1992 2001 7ff79b706b67-7ff79b706b93 call 7ff79b70d840 1991->2001 1992->1982 2002 7ff79b706e36-7ff79b706e4b call 7ff79b707b50 1993->2002 2003 7ff79b706e23-7ff79b706e2b call 7ff79b7065d0 1993->2003 1994->1993 2004 7ff79b706d66-7ff79b706d75 call 7ff79b705af0 1994->2004 1995->1956 1996 7ff79b706bd2-7ff79b706c3c call 7ff79b70eba0 call 7ff79b6f2500 call 7ff79b705af0 1995->1996 2030 7ff79b706c5e-7ff79b706c74 call 7ff79b708280 1996->2030 2031 7ff79b706c3e-7ff79b706c45 1996->2031 1997->2000 2006 7ff79b706e86-7ff79b706e8d 1998->2006 2007 7ff79b706e8f 1998->2007 2000->1967 2001->1992 2021 7ff79b706b95-7ff79b706ba6 call 7ff79b708280 2001->2021 2002->1973 2022 7ff79b706e51-7ff79b706e53 2002->2022 2003->2002 2004->1956 2006->2000 2007->2000 2021->1992 2022->1973 2026 7ff79b706e59-7ff79b706e62 call 7ff79b707c60 2022->2026 2026->1984 2037 7ff79b706c76-7ff79b706c81 2030->2037 2038 7ff79b706c87-7ff79b706c8b 2030->2038 2031->2030 2032 7ff79b706c47-7ff79b706c4e 2031->2032 2034 7ff79b706c50-7ff79b706c53 2032->2034 2034->2030 2036 7ff79b706c55-7ff79b706c5c 2034->2036 2036->2030 2036->2034 2037->1956 2037->2038 2038->1957
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                                  • API String ID: 0-3307081561
                                                  • Opcode ID: a71db190aa329004f507fd76ddab9ba0122149fb4121735d41cd30deda26f777
                                                  • Instruction ID: 5715ab0a7affd685939391c5ac95b4c807aa25bb76451257f2b8429df33af24e
                                                  • Opcode Fuzzy Hash: a71db190aa329004f507fd76ddab9ba0122149fb4121735d41cd30deda26f777
                                                  • Instruction Fuzzy Hash: 54E1D161A0C68A86EB24AB38D8543BAA771FB48794F844337EA5D077F5DF3CE6518310
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastrecv
                                                  • String ID:
                                                  • API String ID: 2514157807-0
                                                  • Opcode ID: 50b0f7eba990a790d6b453f32775dedec0c9d4c657e3ed14e7c64ed1cc5c7626
                                                  • Instruction ID: 96dfbcd5cbbac8bcb4fca3b8dd4428cb720103a437e9aa4ff0caf354d9e49d9a
                                                  • Opcode Fuzzy Hash: 50b0f7eba990a790d6b453f32775dedec0c9d4c657e3ed14e7c64ed1cc5c7626
                                                  • Instruction Fuzzy Hash: 48E02661F0850983FF3967B4F8943785292DB48772F844735CA3B867E0EE2C46D24310

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 994 7ff79b6e2aa0-7ff79b6e2aef call 7ff79b6e2840 997 7ff79b6e2af5-7ff79b6e2afa 994->997 998 7ff79b6e30a8-7ff79b6e3117 call 7ff79b6e3120 Sleep exit 994->998 997->998 999 7ff79b6e2b00-7ff79b6e2c1e call 7ff79b6e3160 call 7ff79b6e3c30 call 7ff79b6e32d0 call 7ff79b6e3c30 call 7ff79b6e33d0 call 7ff79b6e3c30 997->999 1003 7ff79b6e3118-7ff79b6e311f call 7ff79b6e19f0 998->1003 1017 7ff79b6e2c54-7ff79b6e2c6d 999->1017 1018 7ff79b6e2c20-7ff79b6e2c31 999->1018 1021 7ff79b6e2ca5-7ff79b6e2cad 1017->1021 1022 7ff79b6e2c6f-7ff79b6e2c81 1017->1022 1019 7ff79b6e2c33-7ff79b6e2c46 1018->1019 1020 7ff79b6e2c4f call 7ff79b73f22c 1018->1020 1019->1020 1023 7ff79b6e2c48-7ff79b6e2c4e _invalid_parameter_noinfo_noreturn 1019->1023 1020->1017 1027 7ff79b6e2ce3-7ff79b6e2cfb 1021->1027 1028 7ff79b6e2caf-7ff79b6e2cc0 1021->1028 1025 7ff79b6e2c83-7ff79b6e2c96 1022->1025 1026 7ff79b6e2c9f-7ff79b6e2ca4 call 7ff79b73f22c 1022->1026 1023->1020 1025->1026 1031 7ff79b6e2c98-7ff79b6e2c9e _invalid_parameter_noinfo_noreturn 1025->1031 1026->1021 1029 7ff79b6e2d32-7ff79b6e2d3a 1027->1029 1030 7ff79b6e2cfd-7ff79b6e2d0e 1027->1030 1033 7ff79b6e2cc2-7ff79b6e2cd5 1028->1033 1034 7ff79b6e2cde call 7ff79b73f22c 1028->1034 1039 7ff79b6e2d70-7ff79b6e2db7 1029->1039 1040 7ff79b6e2d3c-7ff79b6e2d4d 1029->1040 1037 7ff79b6e2d10-7ff79b6e2d23 1030->1037 1038 7ff79b6e2d2c-7ff79b6e2d31 call 7ff79b73f22c 1030->1038 1031->1026 1033->1034 1035 7ff79b6e2cd7-7ff79b6e2cdd _invalid_parameter_noinfo_noreturn 1033->1035 1034->1027 1035->1034 1037->1038 1044 7ff79b6e2d25-7ff79b6e2d2b _invalid_parameter_noinfo_noreturn 1037->1044 1038->1029 1042 7ff79b6e2dc8-7ff79b6e2deb 1039->1042 1043 7ff79b6e2db9-7ff79b6e2dc6 1039->1043 1046 7ff79b6e2d4f-7ff79b6e2d62 1040->1046 1047 7ff79b6e2d6b call 7ff79b73f22c 1040->1047 1049 7ff79b6e2e1f-7ff79b6e2e22 1042->1049 1050 7ff79b6e2ded-7ff79b6e2df4 1042->1050 1048 7ff79b6e2e42-7ff79b6e2e5b call 7ff79b6e3550 call 7ff79b6e2840 1043->1048 1044->1038 1046->1047 1052 7ff79b6e2d64-7ff79b6e2d6a _invalid_parameter_noinfo_noreturn 1046->1052 1047->1039 1065 7ff79b6e2e60-7ff79b6e2e98 call 7ff79b6e4bd0 call 7ff79b6e48c0 1048->1065 1056 7ff79b6e2e24-7ff79b6e2e29 call 7ff79b73f1f0 1049->1056 1057 7ff79b6e2e2b 1049->1057 1050->1003 1055 7ff79b6e2dfa-7ff79b6e2e08 call 7ff79b73f1f0 1050->1055 1052->1047 1066 7ff79b6e2e18-7ff79b6e2e1e _invalid_parameter_noinfo_noreturn 1055->1066 1067 7ff79b6e2e0a-7ff79b6e2e16 1055->1067 1061 7ff79b6e2e2e-7ff79b6e2e3d memcpy 1056->1061 1057->1061 1061->1048 1072 7ff79b6e2fa3-7ff79b6e3013 call 7ff79b6e48c0 call 7ff79b73f1f0 call 7ff79b6e4310 call 7ff79b6e5a00 call 7ff79b6e3e50 1065->1072 1073 7ff79b6e2e9e-7ff79b6e2ead call 7ff79b6e48c0 1065->1073 1066->1049 1067->1061 1101 7ff79b6e3015-7ff79b6e3060 call 7ff79b6e48c0 call 7ff79b6e49a0 call 7ff79b6e3b10 ShellExecuteA exit 1072->1101 1102 7ff79b6e3061-7ff79b6e30a7 call 7ff79b6e48c0 call 7ff79b6e4d00 call 7ff79b6e3b10 MessageBoxA call 7ff79b6e3cd0 exit 1072->1102 1079 7ff79b6e2eb5 1073->1079 1080 7ff79b6e2eaf-7ff79b6e2eb3 1073->1080 1082 7ff79b6e2eb8-7ff79b6e2ec1 1079->1082 1080->1082 1084 7ff79b6e2ec3 1082->1084 1085 7ff79b6e2ec6-7ff79b6e2ee9 call 7ff79b6e4310 call 7ff79b6e3e50 1082->1085 1084->1085 1094 7ff79b6e2f1f-7ff79b6e2f33 1085->1094 1095 7ff79b6e2eeb-7ff79b6e2efc 1085->1095 1099 7ff79b6e2f35-7ff79b6e2f43 1094->1099 1100 7ff79b6e2f69-7ff79b6e2fa2 call 7ff79b73f580 1094->1100 1097 7ff79b6e2efe-7ff79b6e2f11 1095->1097 1098 7ff79b6e2f1a call 7ff79b73f22c 1095->1098 1097->1098 1105 7ff79b6e2f13-7ff79b6e2f19 _invalid_parameter_noinfo_noreturn 1097->1105 1098->1094 1107 7ff79b6e2f45-7ff79b6e2f58 1099->1107 1108 7ff79b6e2f61-7ff79b6e2f64 call 7ff79b73f22c 1099->1108 1101->1102 1102->998 1105->1098 1107->1108 1112 7ff79b6e2f5a-7ff79b6e2f60 _invalid_parameter_noinfo_noreturn 1107->1112 1108->1100 1112->1108
                                                  APIs
                                                    • Part of subcall function 00007FF79B6E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E28A7
                                                    • Part of subcall function 00007FF79B6E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2917
                                                    • Part of subcall function 00007FF79B6E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2977
                                                    • Part of subcall function 00007FF79B6E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E29C7
                                                    • Part of subcall function 00007FF79B6E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2A17
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2C48
                                                    • Part of subcall function 00007FF79B6E48C0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E4980
                                                    • Part of subcall function 00007FF79B73F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF79B6E43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B73F20A
                                                    • Part of subcall function 00007FF79B6E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B6E4341
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2C98
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2CD7
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2D25
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2D64
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2E18
                                                  • memcpy.VCRUNTIME140 ref: 00007FF79B6E2E3D
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2F13
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2F5A
                                                  • ShellExecuteA.SHELL32 ref: 00007FF79B6E3052
                                                  • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E305A
                                                  • MessageBoxA.USER32 ref: 00007FF79B6E3090
                                                  • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E30A1
                                                  • Sleep.KERNEL32 ref: 00007FF79B6E3109
                                                  • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E3111
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF79B6E3118
                                                    • Part of subcall function 00007FF79B6E3160: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E326F
                                                    • Part of subcall function 00007FF79B6E3160: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E32B0
                                                    • Part of subcall function 00007FF79B6E3C30: memcpy.VCRUNTIME140 ref: 00007FF79B6E3C83
                                                    • Part of subcall function 00007FF79B6E32D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E33B0
                                                    • Part of subcall function 00007FF79B6E33D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E34B0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                                  • String ID: Failure$download$invalidver$message$open$sessionid$success
                                                  • API String ID: 3283070336-3881042241
                                                  • Opcode ID: 808f3f8f9a502d94b51a1e4f925074e44e6be06fd5dabf19b5d0441e1288d3e7
                                                  • Instruction ID: 6ada24265388a8bc80017f47869179c31b63833b375b0b48ef0dee78c64c972a
                                                  • Opcode Fuzzy Hash: 808f3f8f9a502d94b51a1e4f925074e44e6be06fd5dabf19b5d0441e1288d3e7
                                                  • Instruction Fuzzy Hash: 1F02E662A0878981EB20EBBCE4443ADA763FB44794F805635DA6D07AF5DF3DE294C350

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1125 7ff79b71b5c0-7ff79b71b63d 1126 7ff79b71b65e-7ff79b71b663 1125->1126 1127 7ff79b71b63f-7ff79b71b643 1125->1127 1128 7ff79b71b682-7ff79b71b686 1126->1128 1129 7ff79b71b665-7ff79b71b67d call 7ff79b705af0 1126->1129 1127->1126 1130 7ff79b71b645-7ff79b71b659 call 7ff79b705af0 1127->1130 1133 7ff79b71b688-7ff79b71b69c call 7ff79b705af0 1128->1133 1134 7ff79b71b6a1-7ff79b71b6a4 1128->1134 1141 7ff79b71baa3-7ff79b71baa6 1129->1141 1140 7ff79b71baac-7ff79b71bab9 1130->1140 1133->1141 1138 7ff79b71b9ba 1134->1138 1139 7ff79b71b6aa-7ff79b71b6ae 1134->1139 1146 7ff79b71b9c2-7ff79b71b9ca 1138->1146 1139->1138 1143 7ff79b71b6b4-7ff79b71b6c9 1139->1143 1144 7ff79b71bbc5-7ff79b71bbcb 1140->1144 1145 7ff79b71babf-7ff79b71bac3 1140->1145 1141->1140 1141->1144 1147 7ff79b71b6cb-7ff79b71b6ce 1143->1147 1148 7ff79b71b6d0-7ff79b71b6fb realloc 1143->1148 1150 7ff79b71bbdd-7ff79b71bbf3 1144->1150 1151 7ff79b71bbcd-7ff79b71bbd0 1144->1151 1145->1144 1149 7ff79b71bac9-7ff79b71bacd 1145->1149 1152 7ff79b71b9ce 1146->1152 1147->1148 1153 7ff79b71b74d-7ff79b71b762 call 7ff79b705cf0 1147->1153 1154 7ff79b71b71e-7ff79b71b74b 1148->1154 1155 7ff79b71b6fd-7ff79b71b719 call 7ff79b705970 1148->1155 1149->1144 1160 7ff79b71bad3-7ff79b71bae8 call 7ff79b708800 1149->1160 1156 7ff79b71bc3b-7ff79b71bc41 1150->1156 1157 7ff79b71bbf5-7ff79b71bc39 memcpy * 2 1150->1157 1151->1150 1161 7ff79b71bbd2-7ff79b71bbda 1151->1161 1162 7ff79b71b9d6-7ff79b71b9dc 1152->1162 1167 7ff79b71b767-7ff79b71b76d 1153->1167 1154->1153 1155->1140 1165 7ff79b71bc43-7ff79b71bc46 1156->1165 1166 7ff79b71bc55-7ff79b71bc58 1156->1166 1163 7ff79b71bc65-7ff79b71bc87 call 7ff79b73f580 1157->1163 1187 7ff79b71bbae-7ff79b71bbc0 call 7ff79b705af0 1160->1187 1188 7ff79b71baee-7ff79b71baf0 1160->1188 1161->1150 1169 7ff79b71ba72-7ff79b71ba78 1162->1169 1170 7ff79b71b9e2-7ff79b71b9f7 call 7ff79b705af0 1162->1170 1165->1166 1172 7ff79b71bc48-7ff79b71bc50 1165->1172 1173 7ff79b71bc5a-7ff79b71bc5e 1166->1173 1174 7ff79b71bc60-7ff79b71bc62 1166->1174 1175 7ff79b71b972-7ff79b71b97a 1167->1175 1176 7ff79b71b773-7ff79b71b77f 1167->1176 1179 7ff79b71ba7e-7ff79b71ba8e 1169->1179 1180 7ff79b71b7a0-7ff79b71b7af 1169->1180 1191 7ff79b71b9f9-7ff79b71b9fc 1170->1191 1192 7ff79b71ba02-7ff79b71ba12 1170->1192 1172->1166 1173->1174 1174->1163 1182 7ff79b71b97c-7ff79b71b98d 1175->1182 1183 7ff79b71b992 1175->1183 1184 7ff79b71b799-7ff79b71b79e 1176->1184 1185 7ff79b71b781-7ff79b71b787 1176->1185 1179->1141 1190 7ff79b71ba90-7ff79b71ba94 1179->1190 1180->1141 1189 7ff79b71b7b5-7ff79b71b7b7 1180->1189 1182->1180 1183->1184 1195 7ff79b71b998-7ff79b71b9b5 1183->1195 1184->1180 1193 7ff79b71b95e-7ff79b71b96d call 7ff79b705af0 1185->1193 1194 7ff79b71b78d-7ff79b71b794 call 7ff79b705af0 1185->1194 1187->1144 1188->1187 1196 7ff79b71baf6-7ff79b71bb02 1188->1196 1189->1141 1198 7ff79b71b7bd-7ff79b71b7c0 1189->1198 1199 7ff79b71ba9b 1190->1199 1191->1192 1201 7ff79b71bb82-7ff79b71bb89 1191->1201 1202 7ff79b71ba18-7ff79b71ba59 call 7ff79b705af0 call 7ff79b719a80 1192->1202 1203 7ff79b71bb9a-7ff79b71bba9 1192->1203 1193->1184 1194->1184 1195->1180 1196->1144 1206 7ff79b71b7d2-7ff79b71b850 call 7ff79b7083c0 1198->1206 1207 7ff79b71b7c2-7ff79b71b7c6 1198->1207 1200 7ff79b71ba9e call 7ff79b705af0 1199->1200 1200->1141 1201->1199 1220 7ff79b71bb8e-7ff79b71bb95 1202->1220 1221 7ff79b71ba5f-7ff79b71ba6d call 7ff79b705af0 1202->1221 1203->1200 1218 7ff79b71b852-7ff79b71b857 1206->1218 1219 7ff79b71b864-7ff79b71b869 1206->1219 1207->1206 1212 7ff79b71b7c8-7ff79b71b7cc 1207->1212 1212->1141 1212->1206 1218->1219 1222 7ff79b71b859-7ff79b71b85e 1218->1222 1223 7ff79b71b90e-7ff79b71b912 1219->1223 1224 7ff79b71b86f-7ff79b71b899 1219->1224 1220->1200 1221->1180 1222->1219 1227 7ff79b71bb07-7ff79b71bb0d 1222->1227 1223->1146 1226 7ff79b71b918-7ff79b71b91d 1223->1226 1228 7ff79b71b89b-7ff79b71b89e 1224->1228 1229 7ff79b71b8a0-7ff79b71b8bb realloc 1224->1229 1226->1146 1231 7ff79b71b923-7ff79b71b935 1226->1231 1235 7ff79b71bb0f-7ff79b71bb20 1227->1235 1236 7ff79b71bb36-7ff79b71bb61 call 7ff79b6f1d10 call 7ff79b705af0 1227->1236 1228->1229 1232 7ff79b71b8e5-7ff79b71b8e9 1228->1232 1233 7ff79b71b8c1-7ff79b71b8e1 1229->1233 1234 7ff79b71bb66-7ff79b71bb7d call 7ff79b705970 1229->1234 1231->1162 1238 7ff79b71b93b-7ff79b71b95c memcpy 1231->1238 1240 7ff79b71b90c 1232->1240 1241 7ff79b71b8eb-7ff79b71b908 memcpy 1232->1241 1233->1232 1234->1141 1242 7ff79b71bb2a-7ff79b71bb31 1235->1242 1243 7ff79b71bb22 1235->1243 1236->1141 1238->1152 1240->1223 1241->1240 1242->1199 1243->1242
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                                  • API String ID: 3510742995-857957974
                                                  • Opcode ID: 40bec67c4f280abf8169a9c87595eced14b45029a4417c1ac000181a656fb29d
                                                  • Instruction ID: 1e184bdf1f3ace3cbe9b48b2edc68bc4ed02fe39ac95bd3617314bae8b7b88fe
                                                  • Opcode Fuzzy Hash: 40bec67c4f280abf8169a9c87595eced14b45029a4417c1ac000181a656fb29d
                                                  • Instruction Fuzzy Hash: 1D02D232A18A4989EB70EF2DD884369B7A5FB88B94F904637CA4D477B0DF78D541C720

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1368 7ff79b71aa50-7ff79b71aabe 1369 7ff79b71aae0 1368->1369 1370 7ff79b71aac0-7ff79b71aad5 1368->1370 1372 7ff79b71aae7-7ff79b71ab01 1369->1372 1370->1369 1371 7ff79b71aad7-7ff79b71aade 1370->1371 1371->1372 1373 7ff79b71ab07-7ff79b71ab0c 1372->1373 1374 7ff79b71b1cb 1372->1374 1373->1374 1375 7ff79b71ab12-7ff79b71ab20 1373->1375 1376 7ff79b71ab62-7ff79b71ab66 1375->1376 1377 7ff79b71ab22-7ff79b71ab5c malloc 1375->1377 1379 7ff79b71ab68-7ff79b71abad malloc 1376->1379 1380 7ff79b71abb3-7ff79b71abc4 1376->1380 1377->1376 1378 7ff79b71b1bf 1377->1378 1378->1374 1379->1378 1379->1380 1381 7ff79b71ac38-7ff79b71ac3a 1380->1381 1382 7ff79b71abc6-7ff79b71abe0 realloc 1380->1382 1383 7ff79b71ac9a-7ff79b71ad41 call 7ff79b7083c0 malloc 1381->1383 1384 7ff79b71ac3c-7ff79b71ac60 call 7ff79b705cf0 1381->1384 1385 7ff79b71ac20-7ff79b71ac36 1382->1385 1386 7ff79b71abe2-7ff79b71abec call 7ff79b705970 1382->1386 1383->1378 1396 7ff79b71ad47-7ff79b71ad61 memcpy 1383->1396 1391 7ff79b71ac65-7ff79b71ac68 1384->1391 1385->1381 1390 7ff79b71abf1 1386->1390 1393 7ff79b71abf6-7ff79b71ac1f call 7ff79b73f580 1390->1393 1394 7ff79b71ac6e-7ff79b71ac70 1391->1394 1395 7ff79b71aedf-7ff79b71aee6 1391->1395 1399 7ff79b71aec6-7ff79b71aeda call 7ff79b705970 1394->1399 1400 7ff79b71ac76-7ff79b71ac7e 1394->1400 1401 7ff79b71b1b8-7ff79b71b1ba 1395->1401 1402 7ff79b71aeec-7ff79b71aef8 1395->1402 1396->1390 1397 7ff79b71ad67-7ff79b71add3 free 1396->1397 1408 7ff79b71add9-7ff79b71ade0 1397->1408 1409 7ff79b71b1a3-7ff79b71b1aa 1397->1409 1399->1393 1400->1399 1405 7ff79b71ac84-7ff79b71ac96 1400->1405 1401->1393 1402->1393 1405->1383 1411 7ff79b71b14c-7ff79b71b158 1408->1411 1412 7ff79b71ade6-7ff79b71aded 1408->1412 1410 7ff79b71b1ae 1409->1410 1410->1401 1415 7ff79b71b15a-7ff79b71b186 call 7ff79b6f1d10 call 7ff79b705970 1411->1415 1416 7ff79b71b18b-7ff79b71b19e 1411->1416 1413 7ff79b71adf8-7ff79b71adff 1412->1413 1414 7ff79b71adef-7ff79b71adf2 1412->1414 1418 7ff79b71ae00-7ff79b71ae04 1413->1418 1414->1413 1417 7ff79b71aefd-7ff79b71af04 1414->1417 1415->1393 1416->1393 1423 7ff79b71af44-7ff79b71af6d call 7ff79b6f1d10 call 7ff79b705970 1417->1423 1424 7ff79b71af06-7ff79b71af0d 1417->1424 1420 7ff79b71ae43-7ff79b71ae4a 1418->1420 1421 7ff79b71ae06-7ff79b71ae0a 1418->1421 1428 7ff79b71ae59-7ff79b71ae62 1420->1428 1429 7ff79b71ae4c 1420->1429 1421->1420 1426 7ff79b71ae0c-7ff79b71ae27 call 7ff79b706230 1421->1426 1423->1390 1424->1415 1430 7ff79b71af13-7ff79b71af3f call 7ff79b6f1d10 call 7ff79b705970 1424->1430 1440 7ff79b71ae2c-7ff79b71ae32 1426->1440 1428->1418 1431 7ff79b71ae64-7ff79b71ae68 1428->1431 1429->1428 1430->1393 1437 7ff79b71af98-7ff79b71af9f 1431->1437 1438 7ff79b71ae6e-7ff79b71ae73 1431->1438 1444 7ff79b71afa7-7ff79b71afae 1437->1444 1438->1437 1442 7ff79b71ae79-7ff79b71ae8a 1438->1442 1445 7ff79b71ae38-7ff79b71ae3d 1440->1445 1446 7ff79b71af72-7ff79b71af93 call 7ff79b705970 1440->1446 1442->1444 1448 7ff79b71ae90-7ff79b71aeb4 memcpy 1442->1448 1444->1410 1450 7ff79b71afb4-7ff79b71afb7 1444->1450 1445->1420 1445->1446 1446->1393 1448->1450 1451 7ff79b71aeba-7ff79b71aebf 1448->1451 1453 7ff79b71afb9 1450->1453 1454 7ff79b71afc3-7ff79b71afcb 1450->1454 1451->1399 1453->1454 1455 7ff79b71afcd-7ff79b71afe7 1454->1455 1456 7ff79b71aff3 1454->1456 1455->1456 1457 7ff79b71afe9-7ff79b71aff1 1455->1457 1458 7ff79b71affb-7ff79b71affe 1456->1458 1457->1458 1459 7ff79b71b120-7ff79b71b128 1458->1459 1460 7ff79b71b004-7ff79b71b035 1458->1460 1459->1401 1461 7ff79b71b12e-7ff79b71b139 1459->1461 1465 7ff79b71b03b-7ff79b71b043 1460->1465 1466 7ff79b71b0f3-7ff79b71b11e call 7ff79b6f1d10 call 7ff79b705970 1460->1466 1461->1401 1462 7ff79b71b13b-7ff79b71b147 call 7ff79b735ad0 1461->1462 1462->1393 1465->1466 1468 7ff79b71b049-7ff79b71b04c 1465->1468 1472 7ff79b71b0c5-7ff79b71b0c8 1466->1472 1471 7ff79b71b04e-7ff79b71b055 1468->1471 1468->1472 1476 7ff79b71b057-7ff79b71b07e memset call 7ff79b7384b0 1471->1476 1477 7ff79b71b0c0 1471->1477 1474 7ff79b71b0ca CertFreeCertificateContext 1472->1474 1475 7ff79b71b0d0-7ff79b71b0d2 1472->1475 1474->1475 1475->1459 1479 7ff79b71b0d4-7ff79b71b0e5 call 7ff79b705970 1475->1479 1484 7ff79b71b0bb 1476->1484 1485 7ff79b71b080-7ff79b71b08a 1476->1485 1477->1472 1479->1393 1484->1477 1486 7ff79b71b0ea-7ff79b71b0f1 1485->1486 1487 7ff79b71b08c-7ff79b71b096 1485->1487 1488 7ff79b71b0b3-7ff79b71b0b6 call 7ff79b705970 1486->1488 1487->1486 1489 7ff79b71b098-7ff79b71b0aa call 7ff79b6ff0e0 1487->1489 1488->1484 1489->1484 1493 7ff79b71b0ac 1489->1493 1493->1488
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                                  • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                                  • API String ID: 860210379-3059304359
                                                  • Opcode ID: 0069e22e83d2df3d6ca214a1eead1379acfb1bb3aa6f3cc0dfee171741038c1e
                                                  • Instruction ID: e54f54e5e7d2da956fdaa87d3a4e074c0eb3ae889f1739197d2fe371624342c6
                                                  • Opcode Fuzzy Hash: 0069e22e83d2df3d6ca214a1eead1379acfb1bb3aa6f3cc0dfee171741038c1e
                                                  • Instruction Fuzzy Hash: 64127032608B8A85E770DB2DD8543AAB7A5FB88B84F904237CA5D577B0DF38D645C720

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1494 7ff79b719c70-7ff79b719ce0 1495 7ff79b719cff 1494->1495 1496 7ff79b719ce2-7ff79b719cf4 1494->1496 1498 7ff79b719d06-7ff79b719d20 call 7ff79b708800 1495->1498 1496->1495 1497 7ff79b719cf6-7ff79b719cfd 1496->1497 1497->1498 1501 7ff79b719d22-7ff79b719d2c call 7ff79b705af0 1498->1501 1502 7ff79b719d31-7ff79b719d38 1498->1502 1501->1502 1504 7ff79b719d78 1502->1504 1505 7ff79b719d3a-7ff79b719d5a GetModuleHandleA GetProcAddress 1502->1505 1506 7ff79b719d7a-7ff79b719d8b 1504->1506 1505->1504 1507 7ff79b719d5c-7ff79b719d72 call 7ff79b708800 1505->1507 1508 7ff79b719d8d-7ff79b719da5 1506->1508 1509 7ff79b719db0 1506->1509 1507->1504 1514 7ff79b719d74-7ff79b719d76 1507->1514 1508->1509 1511 7ff79b719da7-7ff79b719dae 1508->1511 1512 7ff79b719db7-7ff79b719dba 1509->1512 1511->1512 1515 7ff79b719dbc-7ff79b719dd3 call 7ff79b708800 1512->1515 1516 7ff79b719dfb-7ff79b719e02 1512->1516 1514->1506 1524 7ff79b719de2-7ff79b719df6 call 7ff79b705970 1515->1524 1525 7ff79b719dd5-7ff79b719de0 1515->1525 1518 7ff79b719e06-7ff79b719e17 1516->1518 1519 7ff79b719e19-7ff79b719e31 1518->1519 1520 7ff79b719e3c 1518->1520 1519->1520 1522 7ff79b719e33-7ff79b719e3a 1519->1522 1523 7ff79b719e43-7ff79b719e45 1520->1523 1522->1523 1526 7ff79b719e88-7ff79b719e92 1523->1526 1527 7ff79b719e47-7ff79b719e63 call 7ff79b700360 call 7ff79b6ffd80 1523->1527 1537 7ff79b71a9fd-7ff79b71aa26 call 7ff79b73f580 1524->1537 1525->1518 1530 7ff79b719e98-7ff79b719ec3 1526->1530 1531 7ff79b71a707-7ff79b71a71e call 7ff79b717900 1526->1531 1556 7ff79b719e80-7ff79b719e83 call 7ff79b700390 1527->1556 1557 7ff79b719e65-7ff79b719e7d 1527->1557 1535 7ff79b719efb 1530->1535 1536 7ff79b719ec5-7ff79b719edc 1530->1536 1550 7ff79b71a720-7ff79b71a731 call 7ff79b717900 1531->1550 1551 7ff79b71a733-7ff79b71a73d call 7ff79b705af0 1531->1551 1538 7ff79b719f00-7ff79b719f0a 1535->1538 1541 7ff79b719ede-7ff79b719ee3 1536->1541 1542 7ff79b719ee5-7ff79b719eec 1536->1542 1547 7ff79b719f0c-7ff79b719f0f 1538->1547 1548 7ff79b719f12-7ff79b719f1d 1538->1548 1541->1538 1545 7ff79b719eee-7ff79b719ef3 1542->1545 1546 7ff79b719ef5-7ff79b719ef9 1542->1546 1545->1538 1546->1538 1547->1548 1554 7ff79b71a6ef-7ff79b71a6fe call 7ff79b705970 1548->1554 1555 7ff79b719f23-7ff79b719f38 1548->1555 1550->1551 1559 7ff79b71a742-7ff79b71a74d 1550->1559 1551->1559 1567 7ff79b71a9f8 1554->1567 1555->1554 1556->1526 1557->1556 1562 7ff79b71a753-7ff79b71a7d4 call 7ff79b705af0 call 7ff79b708380 1559->1562 1563 7ff79b71a7d6-7ff79b71a7e8 1559->1563 1566 7ff79b71a7ed-7ff79b71a845 calloc 1562->1566 1563->1566 1569 7ff79b71a847-7ff79b71a851 call 7ff79b705970 1566->1569 1570 7ff79b71a860-7ff79b71a863 1566->1570 1567->1537 1571 7ff79b71a856-7ff79b71a85b 1569->1571 1570->1571 1572 7ff79b71a865-7ff79b71a8c3 1570->1572 1571->1537 1577 7ff79b71a8c9-7ff79b71a8f8 free 1572->1577 1578 7ff79b71a96c-7ff79b71a988 call 7ff79b706230 1572->1578 1579 7ff79b71a8fa-7ff79b71a900 1577->1579 1580 7ff79b71a946-7ff79b71a967 call 7ff79b6f1d10 call 7ff79b705970 1577->1580 1585 7ff79b71a98d-7ff79b71a9aa 1578->1585 1583 7ff79b71a920-7ff79b71a941 call 7ff79b6f1d10 call 7ff79b705970 1579->1583 1584 7ff79b71a902-7ff79b71a91b call 7ff79b6f1d10 call 7ff79b705970 1579->1584 1580->1537 1583->1537 1584->1567 1595 7ff79b71a9e9-7ff79b71a9f3 call 7ff79b705970 1585->1595 1596 7ff79b71a9ac-7ff79b71a9af 1585->1596 1595->1567 1596->1595 1599 7ff79b71a9b1-7ff79b71a9e7 1596->1599 1599->1537
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                                  • API String ID: 1646373207-2477831187
                                                  • Opcode ID: e035301e0cbd76806e6d1a7f8fc22b50779d8e0e354411302bf99611f5d9ad32
                                                  • Instruction ID: 56554f7f5c9534c8931e120dd75844f647b5d3aad9ef67f81c3770cc81091c16
                                                  • Opcode Fuzzy Hash: e035301e0cbd76806e6d1a7f8fc22b50779d8e0e354411302bf99611f5d9ad32
                                                  • Instruction Fuzzy Hash: 8D028F32A08B8986E760EF39D8442B9B7A5FB88784F804237DA5D477B5DF38D645C720

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1602 7ff79b6fb2b0-7ff79b6fb2fb calloc 1603 7ff79b6fb301-7ff79b6fb38a malloc 1602->1603 1604 7ff79b6fb43e-7ff79b6fb447 _errno 1602->1604 1606 7ff79b6fb38c-7ff79b6fb3b1 InitializeCriticalSectionEx call 7ff79b714a60 1603->1606 1607 7ff79b6fb3c7-7ff79b6fb3ce 1603->1607 1605 7ff79b6fb449-7ff79b6fb465 1604->1605 1614 7ff79b6fb466-7ff79b6fb47a _strdup 1606->1614 1615 7ff79b6fb3b7-7ff79b6fb3bf 1606->1615 1609 7ff79b6fb3e0-7ff79b6fb3f1 free 1607->1609 1610 7ff79b6fb3d0-7ff79b6fb3da DeleteCriticalSection free 1607->1610 1612 7ff79b6fb3f3 call 7ff79b718680 1609->1612 1613 7ff79b6fb3f8-7ff79b6fb400 1609->1613 1610->1609 1612->1613 1617 7ff79b6fb402 closesocket 1613->1617 1618 7ff79b6fb408-7ff79b6fb438 free 1613->1618 1614->1607 1619 7ff79b6fb480-7ff79b6fb4a0 free _strdup 1614->1619 1615->1607 1617->1618 1618->1604 1620 7ff79b6fb4a2-7ff79b6fb4b1 call 7ff79b718d50 1619->1620 1621 7ff79b6fb4ce-7ff79b6fb4d8 1619->1621 1625 7ff79b6fb4b6-7ff79b6fb4bc 1620->1625 1623 7ff79b6fb551-7ff79b6fb56c free 1621->1623 1624 7ff79b6fb4da-7ff79b6fb502 EnterCriticalSection LeaveCriticalSection 1621->1624 1623->1604 1626 7ff79b6fb515-7ff79b6fb518 1624->1626 1627 7ff79b6fb504-7ff79b6fb50c CloseHandle 1624->1627 1628 7ff79b6fb50e-7ff79b6fb510 1625->1628 1629 7ff79b6fb4be-7ff79b6fb4cb _errno 1625->1629 1631 7ff79b6fb522-7ff79b6fb532 call 7ff79b6fb130 free 1626->1631 1632 7ff79b6fb51a-7ff79b6fb51d call 7ff79b718da0 1626->1632 1630 7ff79b6fb538-7ff79b6fb53b 1627->1630 1628->1605 1629->1621 1634 7ff79b6fb53d-7ff79b6fb543 call 7ff79b6f5b00 1630->1634 1635 7ff79b6fb548-7ff79b6fb54b closesocket 1630->1635 1631->1630 1632->1631 1634->1635 1635->1623
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                                  • String ID:
                                                  • API String ID: 259767416-0
                                                  • Opcode ID: 5be7457888181850c85d56aadbc1f894fea58f0b3c7651b9d9ee872265a8f40c
                                                  • Instruction ID: ae3ccdade534d83c2f0a55142f66b544df1a48c40c10586936f3a241f0526802
                                                  • Opcode Fuzzy Hash: 5be7457888181850c85d56aadbc1f894fea58f0b3c7651b9d9ee872265a8f40c
                                                  • Instruction Fuzzy Hash: 70817C22D09B8583E624EF25E441269B761FBD8B50F855335CBAE027B1DF78F6D48320
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                                  • API String ID: 0-760484938
                                                  • Opcode ID: 252dd515cb8bdb198c95c2b8d2812c48f0c9e2258bf50e30846c177568f5f6a3
                                                  • Instruction ID: dba20c37e7a8078715dc977ccb597b7018fbeae43b9280b78023d6cc7d01e9b6
                                                  • Opcode Fuzzy Hash: 252dd515cb8bdb198c95c2b8d2812c48f0c9e2258bf50e30846c177568f5f6a3
                                                  • Instruction Fuzzy Hash: 0642CA62609B8A51EB69AB3999403B9B7A1FB4DB84F440237CE5D47771DF38E660C320

                                                  Control-flow Graph

                                                  APIs
                                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B6F1B61,?,?,?,?,00007FF79B6E3591), ref: 00007FF79B7018C8
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B701911
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: callocfree
                                                  • String ID: <$<$<$`$v
                                                  • API String ID: 306872129-2056843887
                                                  • Opcode ID: 0f6027920e8d3f7411a692dd236cf3385027a913357f224eb3018c0997195d0f
                                                  • Instruction ID: cdb9b5072cae3d27410b027c1b9c5e852334d2935cfea06e29f04fd771e636cf
                                                  • Opcode Fuzzy Hash: 0f6027920e8d3f7411a692dd236cf3385027a913357f224eb3018c0997195d0f
                                                  • Instruction Fuzzy Hash: 39914B32908BC586E3109F38D4043E977A1FB59B5CF485339DF990A7A6DFBAA194C720

                                                  Control-flow Graph

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,?,?,00007FF79B7324BA,?,?,?,?,00007FF79B7089EB), ref: 00007FF79B708674
                                                  • GetProcAddress.KERNEL32(?,?,00007FF79B7324BA,?,?,?,?,00007FF79B7089EB), ref: 00007FF79B708699
                                                  • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF79B7324BA,?,?,?,?,00007FF79B7089EB), ref: 00007FF79B7086AC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProcstrpbrk
                                                  • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                                  • API String ID: 27745253-3327535076
                                                  • Opcode ID: 4e48bd242bc8de50c7c49492aed2aaea806512792f90eb033efec11107f27546
                                                  • Instruction ID: 4c7ba7eaee9c59cfd2a4a19ee5e47f49c41e7d8f01e6967115dd14c8a92eaa8c
                                                  • Opcode Fuzzy Hash: 4e48bd242bc8de50c7c49492aed2aaea806512792f90eb033efec11107f27546
                                                  • Instruction Fuzzy Hash: AA41BD16B0E64682EB25AF7AA80013997A2EF4DBD1F885233CE5D037B4DE3CD585C720

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$_errnogetpeernamegetsockname
                                                  • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                                  • API String ID: 2911674258-670633250
                                                  • Opcode ID: 49c1520c5f3771e96cdf1576298b0c1f5e19965a53e7fb4b6fc29f3d889e0196
                                                  • Instruction ID: 2db1d430306f823d843ad284fa7e14e2395d1c2e82577409b060def4c9ebfe18
                                                  • Opcode Fuzzy Hash: 49c1520c5f3771e96cdf1576298b0c1f5e19965a53e7fb4b6fc29f3d889e0196
                                                  • Instruction Fuzzy Hash: 6E916E66A18B8582D720DF39D4542E97361FB8CB88F845237DE4C47675EF38E285CB20

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2074 7ff79b7186d0-7ff79b7186fd getaddrinfo 2075 7ff79b718894-7ff79b7188a1 2074->2075 2076 7ff79b718703-7ff79b718715 2074->2076 2077 7ff79b71871b 2076->2077 2078 7ff79b718874-7ff79b71887d WSASetLastError 2076->2078 2079 7ff79b718720-7ff79b718726 2077->2079 2080 7ff79b718883-7ff79b718890 2078->2080 2081 7ff79b718728-7ff79b71872b 2079->2081 2082 7ff79b71872d-7ff79b718730 2079->2082 2080->2075 2083 7ff79b718739-7ff79b71873d 2081->2083 2084 7ff79b7187e1-7ff79b7187e8 2082->2084 2085 7ff79b718736 2082->2085 2083->2084 2087 7ff79b718743-7ff79b71874a 2083->2087 2084->2079 2086 7ff79b7187ee 2084->2086 2085->2083 2088 7ff79b718822-7ff79b71882f 2086->2088 2087->2084 2089 7ff79b718750-7ff79b718753 2087->2089 2090 7ff79b718837-7ff79b71883a 2088->2090 2091 7ff79b718831 freeaddrinfo 2088->2091 2089->2084 2092 7ff79b718759-7ff79b71876a malloc 2089->2092 2093 7ff79b71883c-7ff79b71883f 2090->2093 2094 7ff79b71886f-7ff79b718872 2090->2094 2091->2090 2095 7ff79b71881c 2092->2095 2096 7ff79b718770-7ff79b7187a5 malloc 2092->2096 2097 7ff79b71886a-7ff79b71886d 2093->2097 2098 7ff79b718841-7ff79b718868 free * 3 2093->2098 2094->2078 2094->2080 2095->2088 2099 7ff79b7187a7-7ff79b7187bd memcpy 2096->2099 2100 7ff79b71880b-7ff79b71881a free 2096->2100 2097->2080 2098->2097 2098->2098 2101 7ff79b7187ce-7ff79b7187d8 2099->2101 2102 7ff79b7187bf-7ff79b7187cc _strdup 2099->2102 2100->2088 2104 7ff79b7187da 2101->2104 2105 7ff79b7187de 2101->2105 2102->2101 2103 7ff79b7187f0-7ff79b718809 free * 2 2102->2103 2103->2088 2104->2105 2105->2084
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                                  • String ID:
                                                  • API String ID: 2364279375-0
                                                  • Opcode ID: aae1654f01031a43846d7b113ef3c787abe0dcc67a0a0ca57b12d574065e3cdc
                                                  • Instruction ID: 72c096c0ec22a807b56f91dd845fdc07f1919f0aff21c30fe1e892d35d755529
                                                  • Opcode Fuzzy Hash: aae1654f01031a43846d7b113ef3c787abe0dcc67a0a0ca57b12d574065e3cdc
                                                  • Instruction Fuzzy Hash: CF512E36A19B4986EA35EF69A540139F7A1FB88B90F844236CE9E13770DF3CE5448730

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2106 7ff79b715fe0-7ff79b716025 2107 7ff79b716027-7ff79b71602a 2106->2107 2108 7ff79b71605b-7ff79b716075 2106->2108 2107->2108 2109 7ff79b71602c-7ff79b71602f 2107->2109 2110 7ff79b716077-7ff79b716087 2108->2110 2111 7ff79b71608c-7ff79b7160a7 2108->2111 2109->2108 2114 7ff79b716031-7ff79b716034 2109->2114 2110->2111 2112 7ff79b716137-7ff79b716143 2111->2112 2113 7ff79b7160ad-7ff79b7160b2 2111->2113 2119 7ff79b716190-7ff79b71619a 2112->2119 2120 7ff79b716145-7ff79b716159 2112->2120 2115 7ff79b7160c7-7ff79b7160ca 2113->2115 2116 7ff79b7160b4-7ff79b7160be 2113->2116 2117 7ff79b716054-7ff79b716056 2114->2117 2118 7ff79b716036 2114->2118 2122 7ff79b7160cc-7ff79b7160d0 2115->2122 2123 7ff79b7160ed-7ff79b7160f2 2115->2123 2116->2115 2121 7ff79b7160c0-7ff79b7160c5 2116->2121 2128 7ff79b7162fd 2117->2128 2126 7ff79b716038-7ff79b716046 WSASetLastError 2118->2126 2127 7ff79b71604b-7ff79b71604e Sleep 2118->2127 2124 7ff79b71619c-7ff79b71619f 2119->2124 2125 7ff79b7161d3-7ff79b7161db 2119->2125 2129 7ff79b71615b 2120->2129 2130 7ff79b71616f-7ff79b716171 2120->2130 2121->2115 2121->2116 2122->2123 2134 7ff79b7160d2-7ff79b7160e6 2122->2134 2135 7ff79b716104-7ff79b71610e 2123->2135 2136 7ff79b7160f4-7ff79b7160fb 2123->2136 2124->2125 2138 7ff79b7161a1-7ff79b7161a3 2124->2138 2139 7ff79b7161dd-7ff79b7161e0 2125->2139 2140 7ff79b7161e2 2125->2140 2126->2128 2127->2117 2137 7ff79b7162ff-7ff79b71631f call 7ff79b73f580 2128->2137 2131 7ff79b716160-7ff79b716167 2129->2131 2132 7ff79b716189-7ff79b71618c 2130->2132 2133 7ff79b716173-7ff79b716176 2130->2133 2131->2130 2142 7ff79b716169-7ff79b71616d 2131->2142 2132->2119 2133->2132 2145 7ff79b716178-7ff79b716185 2133->2145 2134->2123 2149 7ff79b71612b-7ff79b716133 2135->2149 2150 7ff79b716110-7ff79b716118 2135->2150 2136->2135 2146 7ff79b7160fd-7ff79b716102 2136->2146 2138->2125 2148 7ff79b7161a5-7ff79b7161a8 2138->2148 2141 7ff79b71621a-7ff79b71624a select 2139->2141 2143 7ff79b716210-7ff79b716213 2140->2143 2144 7ff79b7161e4-7ff79b71620e 2140->2144 2152 7ff79b716250-7ff79b71625a 2141->2152 2142->2130 2142->2131 2143->2141 2151 7ff79b716215 2143->2151 2144->2141 2145->2132 2146->2135 2146->2136 2154 7ff79b7161aa-7ff79b7161ac 2148->2154 2155 7ff79b7161b1 2148->2155 2149->2112 2150->2149 2156 7ff79b71611a-7ff79b716127 2150->2156 2151->2141 2157 7ff79b71625c-7ff79b71625f 2152->2157 2158 7ff79b716264 2152->2158 2154->2152 2159 7ff79b7161b3-7ff79b7161c1 WSASetLastError 2155->2159 2160 7ff79b7161c6-7ff79b7161d1 Sleep 2155->2160 2156->2149 2157->2137 2161 7ff79b71626d-7ff79b716270 2158->2161 2162 7ff79b716266-7ff79b716268 2158->2162 2159->2152 2160->2152 2163 7ff79b71629f-7ff79b7162a2 2161->2163 2164 7ff79b716272-7ff79b71629a __WSAFDIsSet * 2 2161->2164 2162->2137 2166 7ff79b7162ce-7ff79b7162d1 2163->2166 2167 7ff79b7162a4-7ff79b7162b5 __WSAFDIsSet 2163->2167 2164->2163 2165 7ff79b71629c 2164->2165 2165->2163 2166->2128 2168 7ff79b7162d3-7ff79b7162e4 __WSAFDIsSet 2166->2168 2169 7ff79b7162b7 2167->2169 2170 7ff79b7162ba-7ff79b7162c9 __WSAFDIsSet 2167->2170 2172 7ff79b7162e9-7ff79b7162f8 __WSAFDIsSet 2168->2172 2173 7ff79b7162e6 2168->2173 2169->2170 2170->2166 2171 7ff79b7162cb 2170->2171 2171->2166 2172->2128 2174 7ff79b7162fa 2172->2174 2173->2172 2174->2128
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastSleep
                                                  • String ID:
                                                  • API String ID: 1458359878-0
                                                  • Opcode ID: 363319e16a2b8222d8df7e59ba0061303e8eba5504a98dbbef40f9d959649e26
                                                  • Instruction ID: 42da510f8667915be44c99007fc8b4aa1194843b6ed8c2f435f3476ce357eee8
                                                  • Opcode Fuzzy Hash: 363319e16a2b8222d8df7e59ba0061303e8eba5504a98dbbef40f9d959649e26
                                                  • Instruction Fuzzy Hash: 8291DA31B0C64A86EB74EE3C98506B9A295FBCC754F904336D91986BF4DE3CDB418630
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: calloc
                                                  • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                                  • API String ID: 2635317215-3812100122
                                                  • Opcode ID: 20c1f01f82be5406a22b6bd8f2c06d5bf3bce3b875cd4d8ace4c03d303d19b1a
                                                  • Instruction ID: ededaaa8520539d9e21dc00f7e3c5b7402c1dbc5b991095c40c17e394063f4d2
                                                  • Opcode Fuzzy Hash: 20c1f01f82be5406a22b6bd8f2c06d5bf3bce3b875cd4d8ace4c03d303d19b1a
                                                  • Instruction Fuzzy Hash: DC51B621A0C64A82F735AF399890379A7A1EB48790F940637DB5D437B0EF3DE6518B20
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: system
                                                  • String ID: .8$h%49
                                                  • API String ID: 3377271179-4206735779
                                                  • Opcode ID: 7ebd12cc3e181ad32f3692901b742a6bc9b2230d4e4e9f973d7613ff70f3cc47
                                                  • Instruction ID: dc1080d81016a3348a79c4b35d9909f4777caa0687bf3184e6b7356618189297
                                                  • Opcode Fuzzy Hash: 7ebd12cc3e181ad32f3692901b742a6bc9b2230d4e4e9f973d7613ff70f3cc47
                                                  • Instruction Fuzzy Hash: C2617F22E18BDA89F311DFBCE8051BCB772BB8D749F405369CF8925D25EBA85208C754
                                                  APIs
                                                    • Part of subcall function 00007FF79B7186D0: getaddrinfo.WS2_32 ref: 00007FF79B7186F2
                                                    • Part of subcall function 00007FF79B7186D0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B6FB1F5), ref: 00007FF79B71875E
                                                    • Part of subcall function 00007FF79B7186D0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B6FB1F5), ref: 00007FF79B718798
                                                    • Part of subcall function 00007FF79B7186D0: memcpy.VCRUNTIME140(?,?,?,00007FF79B6FB1F5), ref: 00007FF79B7187B1
                                                    • Part of subcall function 00007FF79B7186D0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF79B6FB1F5), ref: 00007FF79B7187BF
                                                    • Part of subcall function 00007FF79B7186D0: freeaddrinfo.WS2_32(?,?,?,00007FF79B6FB1F5), ref: 00007FF79B718831
                                                    • Part of subcall function 00007FF79B7186D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B6FB1F5), ref: 00007FF79B718845
                                                    • Part of subcall function 00007FF79B7186D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B6FB1F5), ref: 00007FF79B71884F
                                                    • Part of subcall function 00007FF79B7186D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B6FB1F5), ref: 00007FF79B71885C
                                                  • WSAGetLastError.WS2_32 ref: 00007FF79B6FB1FB
                                                  • WSAGetLastError.WS2_32 ref: 00007FF79B6FB205
                                                  • EnterCriticalSection.KERNEL32 ref: 00007FF79B6FB220
                                                  • LeaveCriticalSection.KERNEL32 ref: 00007FF79B6FB22F
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B6FB240
                                                  • send.WS2_32 ref: 00007FF79B6FB263
                                                  • WSAGetLastError.WS2_32 ref: 00007FF79B6FB26D
                                                  • LeaveCriticalSection.KERNEL32 ref: 00007FF79B6FB280
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                                  • String ID:
                                                  • API String ID: 506363382-0
                                                  • Opcode ID: 8d4847aa9c3541c6272cc4f64181b6fcda6a05a4c2714a92309b560570c47997
                                                  • Instruction ID: a36cc7819dc67962e88537b987b9ad13e1f6d7a61259751237d73fa66f1abb45
                                                  • Opcode Fuzzy Hash: 8d4847aa9c3541c6272cc4f64181b6fcda6a05a4c2714a92309b560570c47997
                                                  • Instruction Fuzzy Hash: FA31A83160864AC2EB60AF39D44127DBB61FF88B99F840232D51E836B4DF3CE645C760
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastSleep
                                                  • String ID:
                                                  • API String ID: 1458359878-0
                                                  • Opcode ID: e3f0b53e7d0d702f4cea96a3ea50b309b15a16bcda6c46903225a8fb009487bc
                                                  • Instruction ID: 7937c93e2665f8b4c174680922ef14f736531f97f2a1793254dcfdf4cb36d652
                                                  • Opcode Fuzzy Hash: e3f0b53e7d0d702f4cea96a3ea50b309b15a16bcda6c46903225a8fb009487bc
                                                  • Instruction Fuzzy Hash: C1A1E931A1865A86EB7DEA3C9440279A255FF8CB94F944336ED5A46BF4DF3DD6008330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemallocmemcpy
                                                  • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                                  • API String ID: 3056473165-3891197721
                                                  • Opcode ID: 30f06a6357ad4ebb74709ca43414f22e7c0f39d1b84d28cab9a3d25f85249b39
                                                  • Instruction ID: bf69260acb88ac624e3a882c8e88211cf8aeb77b9eac5b05c5b0b3e3a2351794
                                                  • Opcode Fuzzy Hash: 30f06a6357ad4ebb74709ca43414f22e7c0f39d1b84d28cab9a3d25f85249b39
                                                  • Instruction Fuzzy Hash: 6B718172B04B498AE720DB79D4506AD77A5FB48BA8F800736DE2D477E4EE38E505C720
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: __p___argc__p___argv__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                                  • String ID:
                                                  • API String ID: 1328870896-0
                                                  • Opcode ID: a47a634a3720dd5e8eb68d9e5f74ccc3e60940e6258ac4f028983f2e83e52973
                                                  • Instruction ID: 14e7fc1369c03a8bd337f3b03c49290525ffe25c1b6aaa32a4617d4df7c106ae
                                                  • Opcode Fuzzy Hash: a47a634a3720dd5e8eb68d9e5f74ccc3e60940e6258ac4f028983f2e83e52973
                                                  • Instruction Fuzzy Hash: 64314111A0C14A82FA74BB7CA8613B99392DF4D7C5FC40A37D54D4B2F7DE2DA7488220
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: %s$Connection #%ld to host %s left intact
                                                  • API String ID: 1294909896-118628944
                                                  • Opcode ID: b43007c119ddb362dd522825b94bdaea00a64d4afe850bffe6a95a76408431e2
                                                  • Instruction ID: 100772b8209de02636a59567e0c64b1ec44fde7e09fc08369aac1682c83808b4
                                                  • Opcode Fuzzy Hash: b43007c119ddb362dd522825b94bdaea00a64d4afe850bffe6a95a76408431e2
                                                  • Instruction Fuzzy Hash: 72918832B0968982E778BB3995413B9A7A2FB45B84F844532DE5E07775CF38F660C360
                                                  APIs
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B7011BB
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B7011D1
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B700FED
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70100A
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70101E
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70103A
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B701057
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70107A
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70108E
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B7010A2
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B7010C8
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B7010DC
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B7010F0
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70113F
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70114C
                                                    • Part of subcall function 00007FF79B700F70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B701175
                                                  • memset.VCRUNTIME140 ref: 00007FF79B701205
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$memset
                                                  • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                                  • API String ID: 2717317152-3248832348
                                                  • Opcode ID: 1fe9221564d640c4bd26ef65c7d112e8fbc6b6f9e54e64452478d767993c87a9
                                                  • Instruction ID: a8cae385e70201f282e14e16fd0642ea04718c2f819e6ca44bce0843013cbe8a
                                                  • Opcode Fuzzy Hash: 1fe9221564d640c4bd26ef65c7d112e8fbc6b6f9e54e64452478d767993c87a9
                                                  • Instruction Fuzzy Hash: 7271982290CBC681E761EF3998503BDA761EB49B94F884233EB5D476B5DF38E6418360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$memcpy
                                                  • String ID: 1.1
                                                  • API String ID: 4107583993-2150719395
                                                  • Opcode ID: 8ee6e2ac4f1f044f33e62cc652399c1e933622224b859357fc7780ca18183277
                                                  • Instruction ID: 59184717e0b97cc0f89a9effa763a6e7f57ec47483db66bab886d02e350b0074
                                                  • Opcode Fuzzy Hash: 8ee6e2ac4f1f044f33e62cc652399c1e933622224b859357fc7780ca18183277
                                                  • Instruction Fuzzy Hash: F3516172604A8986D674DF36E9403BAA3A0FB89B84F844136DF9D47B64DF3CE2558320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastmallocrecvsend
                                                  • String ID: Send failure: %s
                                                  • API String ID: 25851408-857917747
                                                  • Opcode ID: ec379f2b73a9106b4843e1e171a2b1657df7012b1886c8a7eb7b196d624deaa1
                                                  • Instruction ID: 0adbfb88f6d676ca533bb5afa7394613b965c6dcac7993c2b794b90ac528ffb1
                                                  • Opcode Fuzzy Hash: ec379f2b73a9106b4843e1e171a2b1657df7012b1886c8a7eb7b196d624deaa1
                                                  • Instruction Fuzzy Hash: D241A22260574945EB70AF39A850779A6A1EB0CBA8F944237DE5D473B4DE3CE641C710
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Resolving timed out after %I64d milliseconds
                                                  • API String ID: 1294909896-3343404259
                                                  • Opcode ID: 31029ba7bc85c6221cd791e62b65783b040d515dfa54cdf18f0e68298fd35378
                                                  • Instruction ID: 1daaa025c9234fe285c9bba2a7555bca39a0eed57c46e1197bcd3bdec858cf2f
                                                  • Opcode Fuzzy Hash: 31029ba7bc85c6221cd791e62b65783b040d515dfa54cdf18f0e68298fd35378
                                                  • Instruction Fuzzy Hash: 96D1A121A0864A85FB34AF3D95462BCA3A2FF44B88F845536CE1D076B9DF38F645C360
                                                  APIs
                                                    • Part of subcall function 00007FF79B6E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E28A7
                                                    • Part of subcall function 00007FF79B6E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2917
                                                    • Part of subcall function 00007FF79B6E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2977
                                                    • Part of subcall function 00007FF79B6E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E29C7
                                                    • Part of subcall function 00007FF79B6E2840: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2A17
                                                  • MessageBoxA.USER32 ref: 00007FF79B6E3727
                                                    • Part of subcall function 00007FF79B6E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B6E4341
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E378A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                                  • String ID: keyauth.win$null
                                                  • API String ID: 3545939226-2841560827
                                                  • Opcode ID: 8cfda5f5f43a2ef64e5d60ee091a101a41021cad360c346b34a777ee23893537
                                                  • Instruction ID: 1037069544857ddc8c49b150dc3b131cf611653cec5d99045fcdb0b082c746e8
                                                  • Opcode Fuzzy Hash: 8cfda5f5f43a2ef64e5d60ee091a101a41021cad360c346b34a777ee23893537
                                                  • Instruction Fuzzy Hash: 05511322B08B5986FB14EB79D4053AC7763AB04B88F804139CE5D17FA6DF3DA2928350
                                                  APIs
                                                    • Part of subcall function 00007FF79B708660: GetModuleHandleA.KERNEL32(?,?,?,00007FF79B7324BA,?,?,?,?,00007FF79B7089EB), ref: 00007FF79B708674
                                                  • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF79B7089EB), ref: 00007FF79B7324D0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: AddressCallerHandleModuleProc
                                                  • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                                  • API String ID: 2084706301-3788156360
                                                  • Opcode ID: eb7c67d60f81500d2959fb3e2a887152230945b8df9bf8d07a2b4a513378b2c4
                                                  • Instruction ID: 1609855a5c510854d9b284b25aae9f9f441ad1d2e62d697b414c1fee7fede5d9
                                                  • Opcode Fuzzy Hash: eb7c67d60f81500d2959fb3e2a887152230945b8df9bf8d07a2b4a513378b2c4
                                                  • Instruction Fuzzy Hash: F6F01D60F0AA0A41FE74B77DA8817709691AF5D780FC40636C44C426B1EE7CE7598320
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Resolving timed out after %I64d milliseconds
                                                  • API String ID: 0-3343404259
                                                  • Opcode ID: ca364cd61b22da7a45924ca2c5d0be0ab3f163353069b28667edec80b41675fb
                                                  • Instruction ID: 563bd446e27340f63fa6967d30d4e22478aeadcdf9c028aadc64272646a6fb8b
                                                  • Opcode Fuzzy Hash: ca364cd61b22da7a45924ca2c5d0be0ab3f163353069b28667edec80b41675fb
                                                  • Instruction Fuzzy Hash: 48B17622A0864B85F734AE3D945627CA3A2FF45B48F941536CE2E472B5DE3DF644C360
                                                  APIs
                                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B7113D0
                                                    • Part of subcall function 00007FF79B711960: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B7119BA
                                                    • Part of subcall function 00007FF79B711710: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B7117A8
                                                    • Part of subcall function 00007FF79B711710: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B7117B1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$calloc
                                                  • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                                  • API String ID: 3095843317-1242256665
                                                  • Opcode ID: d87249517ff07babbaddcc4d36a8d36abfd2810195727dd7a268275d9892dd13
                                                  • Instruction ID: 4c956452b1c6267d0b7757a83d8e19c80e2710d52df77312237fb545044bd85c
                                                  • Opcode Fuzzy Hash: d87249517ff07babbaddcc4d36a8d36abfd2810195727dd7a268275d9892dd13
                                                  • Instruction Fuzzy Hash: 1341AA31A0C68686EB70EF39A4503B9B7A1AB89784F944133DE4D4BAB5DE3CD604C730
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: closesocket$calloc
                                                  • String ID:
                                                  • API String ID: 2958813939-0
                                                  • Opcode ID: 6726d0aa8d66446f52f79849a812bac3dfc78dd39627bec9a0ad9fa3862d7e62
                                                  • Instruction ID: 72d353f6e279a0336f189bd75199b490c7e63506f095848748f5b9fb990f3612
                                                  • Opcode Fuzzy Hash: 6726d0aa8d66446f52f79849a812bac3dfc78dd39627bec9a0ad9fa3862d7e62
                                                  • Instruction Fuzzy Hash: 9B416131A08A4981E760FF39D8512E9A362FF88754FC44236DE6D462F6EF38E6458330
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                                  • API String ID: 0-3791222319
                                                  • Opcode ID: 6cd692b88b8fa1b00046f1ce7aec65a6f95e73399830cfa2c490f8007ac3b3ba
                                                  • Instruction ID: cd77c0e0f1943c77ce2b9b47c7977ac4b42e5826d4776709ad503d6563eeebf4
                                                  • Opcode Fuzzy Hash: 6cd692b88b8fa1b00046f1ce7aec65a6f95e73399830cfa2c490f8007ac3b3ba
                                                  • Instruction Fuzzy Hash: 28515531B0C64A85EB74EF399544279A691EB887A4F948332DA5D472F1DE3CE5438730
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freerecv
                                                  • String ID:
                                                  • API String ID: 2032557106-0
                                                  • Opcode ID: c790e156fe5950b785f982986055669257d471f0900d9163bc54202700052627
                                                  • Instruction ID: fe2f0de625d3a7fb296ee63ae9ed8a4feb25aa86a2ee5ce58dc65aba7076edb1
                                                  • Opcode Fuzzy Hash: c790e156fe5950b785f982986055669257d471f0900d9163bc54202700052627
                                                  • Instruction Fuzzy Hash: A5C10632A0968646EB359B3994013B9B692FB447A8F944235DE7E437E5DF3CFA01C710
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                                  • API String ID: 1294909896-3248832348
                                                  • Opcode ID: 2db8d1b1d87920ac502833c0690e4baa10251e2d594a51cea7f79aa9207dcd08
                                                  • Instruction ID: 2dd54976eb97079f02acc5c3cd445a10c1a314247dd55ae0b8a67bc9cbc1d99a
                                                  • Opcode Fuzzy Hash: 2db8d1b1d87920ac502833c0690e4baa10251e2d594a51cea7f79aa9207dcd08
                                                  • Instruction Fuzzy Hash: D1518362A086C581E761DF39D4503A9A760E789B98F884237DF5C0B7B9CF7CE591C320
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: closesocket
                                                  • String ID:
                                                  • API String ID: 2781271927-0
                                                  • Opcode ID: 0acd8f144205fd7c07458067433ed9e513df544e46d7a056d5b47dc6e313ae86
                                                  • Instruction ID: b650ddf673b56db416f7ad703de1c5ceeb7e3767cb2a8769332641d03f306ccc
                                                  • Opcode Fuzzy Hash: 0acd8f144205fd7c07458067433ed9e513df544e46d7a056d5b47dc6e313ae86
                                                  • Instruction Fuzzy Hash: E701D621B0554581FB64EB3EE55836DA7A1EF8CB84F885132C71E472B5CF38E5918710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: socket
                                                  • String ID:
                                                  • API String ID: 98920635-0
                                                  • Opcode ID: b0a6f7b45456ddbb6455febc33661ab65252148e8f2ff9fccaae510af289b50e
                                                  • Instruction ID: 3d05713978508e04fbf21aaee8132d37bf56746521465066cf3c4c162ac4e69b
                                                  • Opcode Fuzzy Hash: b0a6f7b45456ddbb6455febc33661ab65252148e8f2ff9fccaae510af289b50e
                                                  • Instruction Fuzzy Hash: 7AE06535F0650982DE68B739885117963616B59734FD44776C63D026F0DD2CD2569B10
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _beginthreadex
                                                  • String ID:
                                                  • API String ID: 3014514943-0
                                                  • Opcode ID: 6fcec5ed8170132fa7d27f4e84d0996d8cab90decfbbc05c53f51dd08cce7cd9
                                                  • Instruction ID: 1dcf13b625d5d70e8ca3bf1d04726e846fb4bb02091d89ffa6d7afa9bf5b2baf
                                                  • Opcode Fuzzy Hash: 6fcec5ed8170132fa7d27f4e84d0996d8cab90decfbbc05c53f51dd08cce7cd9
                                                  • Instruction Fuzzy Hash: 75D02B63B18A0483DF20DF75A840029E752B78C774B884339AE7D827F0DF3CD2454600
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ioctlsocket
                                                  • String ID:
                                                  • API String ID: 3577187118-0
                                                  • Opcode ID: c94a7031483957ba514d176006d7fe961fd69d16ab90eb25bfe450ab854bbbb6
                                                  • Instruction ID: 6367c0af8f8c07cb1e22788c85e45cadf9a8a8ee21174740be9e2034addd7892
                                                  • Opcode Fuzzy Hash: c94a7031483957ba514d176006d7fe961fd69d16ab90eb25bfe450ab854bbbb6
                                                  • Instruction Fuzzy Hash: 8CC08026F14581C2D3447F755485087A773ABC4215FD55436D24742534DD3CC3E58B50
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                                                  • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                                  • API String ID: 2059720140-3844637060
                                                  • Opcode ID: 7c0d23a60b93744acfd05b3892a9ff91a3a92e57e3aab93d37f62f7272c507e2
                                                  • Instruction ID: e11baee65cec44ef2d88bbfd759689baa437202af1b503771538dc657e9b8974
                                                  • Opcode Fuzzy Hash: 7c0d23a60b93744acfd05b3892a9ff91a3a92e57e3aab93d37f62f7272c507e2
                                                  • Instruction Fuzzy Hash: 5872A321A0D74A86FB70AB3D9945379A7A2EF55794F844132CAAE026F5DF3CF644C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$#211$fwrite$#217calloc
                                                  • String ID: ;binary$DN: $LDAP local: %s$LDAP local: %s$LDAP local: Cannot connect to %s:%ld$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                                                  • API String ID: 2742731861-78870445
                                                  • Opcode ID: 8902ead9c02bc733e7016fe6144117ed68cd36cbc7c3d5c06982d80d22379f08
                                                  • Instruction ID: d9925e4b9a2ed49122cc7fb0dc5d72aecfe18c348312ade4d96c332f5b342a72
                                                  • Opcode Fuzzy Hash: 8902ead9c02bc733e7016fe6144117ed68cd36cbc7c3d5c06982d80d22379f08
                                                  • Instruction Fuzzy Hash: 1D426565B0864A86F720AF7A94542B967A1FB4CB98F804633CE0E17774DE3CE645C350
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcmp
                                                  • String ID: array$number overflow parsing '$object$object key$object separator
                                                  • API String ID: 969624648-85532522
                                                  • Opcode ID: 623aaf1b0571fdbc6ed5cfa9a2dbc8a8409b7c797931c1fe6483345ef50fe88b
                                                  • Instruction ID: 03cd1e4dcbcdd7139d353dc49e48bd795f9b078270a465188710b5ea76c73aa5
                                                  • Opcode Fuzzy Hash: 623aaf1b0571fdbc6ed5cfa9a2dbc8a8409b7c797931c1fe6483345ef50fe88b
                                                  • Instruction Fuzzy Hash: E5928762A18B4985EB20EBBCD4443AD7762FB457A4F801331DA6D07AF9DF79E294C310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateNameOpenString
                                                  • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                                  • API String ID: 561913010-2037819326
                                                  • Opcode ID: aa642634a254af1ffcd2ad2ea0f61ab5314722c02f0035306fbb413ac3b6e6fd
                                                  • Instruction ID: d9661f3279aafd7c5c841dfb52daa0e6b1817a705a03c83c59f9e21e495d2ddd
                                                  • Opcode Fuzzy Hash: aa642634a254af1ffcd2ad2ea0f61ab5314722c02f0035306fbb413ac3b6e6fd
                                                  • Instruction Fuzzy Hash: DC426271A0C64A85E734AB39E4442A9B7A1FB48B94F944337DA5D077B4DF3CE648C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastcallocfreegetsockname
                                                  • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                                  • API String ID: 2454324209-2383553807
                                                  • Opcode ID: 10b29650d1a06bd4ec3ec31fc93c34fc74a05537e4d60ad3d080947db4e395c3
                                                  • Instruction ID: 66bc26210b8cd09b7c82aa170f0712fd8fd86b8599243e69e2aae3eeab39cf16
                                                  • Opcode Fuzzy Hash: 10b29650d1a06bd4ec3ec31fc93c34fc74a05537e4d60ad3d080947db4e395c3
                                                  • Instruction Fuzzy Hash: 9C22C861A0C78A81EB70BB3994402BAA761FB49784FC45237DA4E477B9DE7CE744C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemallocstrncmp
                                                  • String ID: public key hash: sha256//%s$-----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----$;sha256//$sha256//
                                                  • API String ID: 1436789207-471711153
                                                  • Opcode ID: 123a2d98d960ab42c595b3404186a2c4f6b30392ae679493633638e105c1701b
                                                  • Instruction ID: d470ee766a8441cf5e1e3334a24937856862d5d340c097697f75d0a4f55ac19d
                                                  • Opcode Fuzzy Hash: 123a2d98d960ab42c595b3404186a2c4f6b30392ae679493633638e105c1701b
                                                  • Instruction Fuzzy Hash: A2A18421A0E64A81FA31AB3D9455279E692AF49FD0FC44132DE2E077B5DE3CF645C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CreateFile_errnofree
                                                  • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                                  • API String ID: 1377488173-902404565
                                                  • Opcode ID: 5f69d122047e2c93b312fbddcd9ba13982a2583ee777278e12dd14ed1ca70259
                                                  • Instruction ID: 797e32dd912a1065c6d19f71068cf1eae86e253ef44bcede3313e077e9713577
                                                  • Opcode Fuzzy Hash: 5f69d122047e2c93b312fbddcd9ba13982a2583ee777278e12dd14ed1ca70259
                                                  • Instruction Fuzzy Hash: BCB19561B1C74982E734AB79E4446A9A7A2BB4D794FC00237DD8D47BB8DE7CE7048720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$strchr$_strdupmemsetreallocstrncpy$EnvironmentVariabletolower
                                                  • String ID: ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy$memory shortage$no_proxy
                                                  • API String ID: 1339443121-1021110354
                                                  • Opcode ID: f4164ee39dae3ce523d14cc156f7bad89d2e8f770c8633ff7de6cee049dff039
                                                  • Instruction ID: 95ace298a247a1ffeb79d076b7567dd296d3cc658f4d7cc4bf57976d6c95b55e
                                                  • Opcode Fuzzy Hash: f4164ee39dae3ce523d14cc156f7bad89d2e8f770c8633ff7de6cee049dff039
                                                  • Instruction Fuzzy Hash: 6802926160D78985EA71EB39A8443B9A7A5EB4D788F890237DA4D177B5DF3CE204C330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                                  • String ID: $CurrentUser$schannel: Failed to import cert file %s, password is bad
                                                  • API String ID: 4221717217-4282655970
                                                  • Opcode ID: 606fce838f325d9a22f8bd7fbe2373a4342e9e48cf8c19a5f72ee2543fa2c872
                                                  • Instruction ID: a3499d6e4c06969ed19ff1ddd8b0c241bdb9a397680e38a453ac7e48d6e99d94
                                                  • Opcode Fuzzy Hash: 606fce838f325d9a22f8bd7fbe2373a4342e9e48cf8c19a5f72ee2543fa2c872
                                                  • Instruction Fuzzy Hash: 11817821B0964E82FB75EF399854379A695BF49794F844236CA2E467F0EF3CE6448330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                                  • String ID: CurrentUser$schannel: Failed to import cert file %s, password is bad
                                                  • API String ID: 4221717217-1887299029
                                                  • Opcode ID: 18ad62f4a5a0cd3de7887efa181fed8ee0f51499181116489963c520c539ff20
                                                  • Instruction ID: f3cf0b03fe61bcbbc2c66710cf8b293ef050daece91c63733689b836fe32d218
                                                  • Opcode Fuzzy Hash: 18ad62f4a5a0cd3de7887efa181fed8ee0f51499181116489963c520c539ff20
                                                  • Instruction Fuzzy Hash: 6E818821B0964E82FB75EF399850279A695BF49794F844236CA2E467F0EF3CE644C330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_errno
                                                  • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                                  • API String ID: 3939687465-1752685260
                                                  • Opcode ID: db281f68b38cbdc177fe78e3b8ce9259576fae544cc566fc18b4b21884f897dc
                                                  • Instruction ID: f255b0d38fedc1f264de037cd7244b4bb667d6b2b5400968114dc3c80c89cd8e
                                                  • Opcode Fuzzy Hash: db281f68b38cbdc177fe78e3b8ce9259576fae544cc566fc18b4b21884f897dc
                                                  • Instruction Fuzzy Hash: 8051A521A0D68A85E731AB78A4513B9B7A7FB48781FC44536DA5D026B5DF3CF7048B30
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _errno$strtol
                                                  • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                                  • API String ID: 3596500743-988243589
                                                  • Opcode ID: 29359ff11a13169c6bbd87f5d4eca36891b4094a7d179d7bfb86092fac4ccb88
                                                  • Instruction ID: bfe07fb0c928c9f357c9f24435b6172e8b953110d5ef24eeab8b47069f2b2b1d
                                                  • Opcode Fuzzy Hash: 29359ff11a13169c6bbd87f5d4eca36891b4094a7d179d7bfb86092fac4ccb88
                                                  • Instruction Fuzzy Hash: 68F1C772F1451A9AEB34EB7C94001BCB7A1AB88758F904337DE1E577F4DE38AA058760
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyReleasememset
                                                  • String ID: @
                                                  • API String ID: 2041421932-2766056989
                                                  • Opcode ID: bb794aa40aa15490590f884502f6a567689bfb5528de3085bcc22d0726435027
                                                  • Instruction ID: 9bf387f83f6be3975901bf63d1d09bfa2504e466782c7517605ee28e55c5a221
                                                  • Opcode Fuzzy Hash: bb794aa40aa15490590f884502f6a567689bfb5528de3085bcc22d0726435027
                                                  • Instruction Fuzzy Hash: 7731503261968586EB70EF25E44866ABB65FBC8BC0F444236DE8D53A74DF3CD5068B10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                                  • String ID: @
                                                  • API String ID: 3606780921-2766056989
                                                  • Opcode ID: 429e55f396393fe66fea98e7d9a8171e41cdb5e0e9661a133493c8119aebbe06
                                                  • Instruction ID: d4f39d637b55338884b9dc8b9a9df8e79e2807555370867b9f84f44c8eea05fe
                                                  • Opcode Fuzzy Hash: 429e55f396393fe66fea98e7d9a8171e41cdb5e0e9661a133493c8119aebbe06
                                                  • Instruction Fuzzy Hash: 6421723261868986E770AF25F45166AB761FBCCBC5F805236EA8E07E38CF3CD5058B10
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 313767242-0
                                                  • Opcode ID: fc71f2e38170f003502fc35b1a2a6786915c9dce6f2c40117b586646fb8be62b
                                                  • Instruction ID: 23bcd8e77b7ad414bb3977d73d1204417162a1658dabd86e2a10a908e0998ab9
                                                  • Opcode Fuzzy Hash: fc71f2e38170f003502fc35b1a2a6786915c9dce6f2c40117b586646fb8be62b
                                                  • Instruction Fuzzy Hash: 5A315072608B858AEB70AF64E8403ED7762FB49745F40453ADA4D47BA4DF38D648C710
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                                  • String ID: @
                                                  • API String ID: 3016261861-2766056989
                                                  • Opcode ID: d1a0f4d578b41c1f0fd4322c77e50cfad5c7b58d9a61eee987650c72cdb935cc
                                                  • Instruction ID: 9ead54704c6d2690c529b9de1f712671a5ee6b22d093fb5fcb0ef921994f25f6
                                                  • Opcode Fuzzy Hash: d1a0f4d578b41c1f0fd4322c77e50cfad5c7b58d9a61eee987650c72cdb935cc
                                                  • Instruction Fuzzy Hash: EC41A122B086908EF7209B75E4513EE7FB1F74A389F444126DE8D17A69CB3CC21AD750
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: calloc$ErrorLastbind
                                                  • String ID: bind() failed; %s
                                                  • API String ID: 2604820300-1141498939
                                                  • Opcode ID: e15b84cf266a0d3863325db1c3b911d02269c6867c01246adfe307a2724578bf
                                                  • Instruction ID: c389aac751855054d8a9d07227cf2b665780f2f6e19957e555995b5edf492547
                                                  • Opcode Fuzzy Hash: e15b84cf266a0d3863325db1c3b911d02269c6867c01246adfe307a2724578bf
                                                  • Instruction Fuzzy Hash: 1251E272A0878986FB24AB39D4443A9B7A0FB48B84F440136CB4E4B7B1DF7CE655C720
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                                  • API String ID: 0-2102732564
                                                  • Opcode ID: 9e3df054a61aa0eb03b6dd8be6f9dbe41523f465c4aa00b2132ff3c3a2bcd120
                                                  • Instruction ID: 6fa59f04dc41ad284c24e89155f070594a49043f0247bc6f560caf027e355f48
                                                  • Opcode Fuzzy Hash: 9e3df054a61aa0eb03b6dd8be6f9dbe41523f465c4aa00b2132ff3c3a2bcd120
                                                  • Instruction Fuzzy Hash: A1213091A0995E87FF28E6BDA5117F482635B8C781ED40633EC0E167B1DEBCA6468270
                                                  APIs
                                                  Strings
                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF79B74016B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                  • API String ID: 1848478996-631824599
                                                  • Opcode ID: c81a61da6dff62d5fc6ebe2dd06c259fdb3328391505df66370617ea3a97fde8
                                                  • Instruction ID: 02320b7f0dc18dfc1bf06a7d0d4c2e4646c042589116e7a140e6ddd233bd0151
                                                  • Opcode Fuzzy Hash: c81a61da6dff62d5fc6ebe2dd06c259fdb3328391505df66370617ea3a97fde8
                                                  • Instruction Fuzzy Hash: CF116032A1874593E764AB39D54537972A3FB08752F80423AC64D83970EF3CE674C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Crypt$Context$Release$AcquireRandom
                                                  • String ID: @
                                                  • API String ID: 2916321625-2766056989
                                                  • Opcode ID: c7f578bda8b6bce57ac1e3404d80283eda79a9cd9b89e485504ba2bfd3618192
                                                  • Instruction ID: 68d81561281b44e6c275810b70047e38d82e66e771231b57f61ff3f4f4c1d683
                                                  • Opcode Fuzzy Hash: c7f578bda8b6bce57ac1e3404d80283eda79a9cd9b89e485504ba2bfd3618192
                                                  • Instruction Fuzzy Hash: A2F08665B0868582E720AB65F44532AEB61EFCC7D5F844132DE8C47A78DE7CC2858710
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8.2$8117cf7ad254a9a5d0d88f66a496a899a0f91b99fcda9b68c5bcd64eda7e1913$9WIvTVJa9m$https://keyauth.win/api/1.2/$loader principal
                                                  • API String ID: 0-222467820
                                                  • Opcode ID: 32abd01a937e002e2e3925644fec68693e22a4a1a78138759f0befe3a84fc7c8
                                                  • Instruction ID: 8997ff017c426499c40f6d35dab56d5db4d1cf61e461afd753151a23b443e57c
                                                  • Opcode Fuzzy Hash: 32abd01a937e002e2e3925644fec68693e22a4a1a78138759f0befe3a84fc7c8
                                                  • Instruction Fuzzy Hash: 51122622D2DB964AF713A73D98011A4E7569FA7784F80D337ED5831DB2EF2973928204
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                  • String ID:
                                                  • API String ID: 2933794660-0
                                                  • Opcode ID: 81fecbbe110443faa4b077698657e2e73d1f9485f01ab5ea6c5b974c73907ae6
                                                  • Instruction ID: d1148ccc17b74d38f6628306106700b861e8a0ef4ab0a9ea44d3c39554994e5e
                                                  • Opcode Fuzzy Hash: 81fecbbe110443faa4b077698657e2e73d1f9485f01ab5ea6c5b974c73907ae6
                                                  • Instruction Fuzzy Hash: DE117022B18F058AEB10EF74E8442B973A4F71D758F840E32DA6D86BB4DF78D2548350
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                                  • String ID:
                                                  • API String ID: 2110207923-0
                                                  • Opcode ID: 02d6728af480e93390640167c9fa586169bdde8592af3eb17ab05705ac4cfc00
                                                  • Instruction ID: 3e74737d9fc9427754aa3e43bbd89b3fc3d9b4916dde459513ca45ca66990948
                                                  • Opcode Fuzzy Hash: 02d6728af480e93390640167c9fa586169bdde8592af3eb17ab05705ac4cfc00
                                                  • Instruction Fuzzy Hash: 6201523550864582EB20DF78E455329B731FB89BC5F544636DA4906A78CF3DD6448B10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Crypt$AcquireContextCreateHash
                                                  • String ID: @
                                                  • API String ID: 1914063823-2766056989
                                                  • Opcode ID: d3aecc2a83fcad7f21cce8e17703ccbdcebab1f6873e292a1b1d6d83fa72973c
                                                  • Instruction ID: f451bae131cf104ecd32b2b4319d69b06535cbf2ec7168379042bbeb8ef4f846
                                                  • Opcode Fuzzy Hash: d3aecc2a83fcad7f21cce8e17703ccbdcebab1f6873e292a1b1d6d83fa72973c
                                                  • Instruction Fuzzy Hash: 55E04861B1469683F7709B79E401B16A751FB98B89F844131CE4C4BE78DF3DC2558B14
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _getpidhtons
                                                  • String ID:
                                                  • API String ID: 3416910171-0
                                                  • Opcode ID: f1bcb4e527c274ed3cbf9794bca566d4a3f943d6d6479211d1b0b4b49af623e0
                                                  • Instruction ID: d44c872e1d12db2f806b950ec6eb6125992d6a4979dc8d87ca578dea6ca60316
                                                  • Opcode Fuzzy Hash: f1bcb4e527c274ed3cbf9794bca566d4a3f943d6d6479211d1b0b4b49af623e0
                                                  • Instruction Fuzzy Hash: 31117022A247D0CAD304DF35E4001AD7770FB5CB84F44962AFB8987B28DB78C690C705
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Xbad_function_call@std@@
                                                  • String ID:
                                                  • API String ID: 1029415015-0
                                                  • Opcode ID: c92a89784e0bb41f92a25d6217957aa46eb730cd7c89ea4a0d75b9e7a24e9cc6
                                                  • Instruction ID: 6fbb1f24fbe38d8553593c11f05b84a60d8248a01660f84131f6b687a94bd773
                                                  • Opcode Fuzzy Hash: c92a89784e0bb41f92a25d6217957aa46eb730cd7c89ea4a0d75b9e7a24e9cc6
                                                  • Instruction Fuzzy Hash: 0081BB22B09B9988EB10DBBDD4843AC7771E715B88F944026DF9D477A5DF3AE191C320
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Xbad_function_call@std@@
                                                  • String ID:
                                                  • API String ID: 1029415015-0
                                                  • Opcode ID: 77c627124564cc66c38cfea15e0c09a4efde3085504205c740e35cf6ffa449cf
                                                  • Instruction ID: bb8f7c7185008e94b9b6626347cd68f4d87afaa524a09ca932c18bf4a3875c08
                                                  • Opcode Fuzzy Hash: 77c627124564cc66c38cfea15e0c09a4efde3085504205c740e35cf6ffa449cf
                                                  • Instruction Fuzzy Hash: AC81AE22B19B8989EB10DBBDD0843BC6772E714B88F984422CF9D477A5DF3AE154C360
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ec087bc7bd37833f0647a48c282789a3b2250800aa32e4b4276ab159c278acc
                                                  • Instruction ID: 0e8895e4f0acf5a25530ae4bb6979cc31eb43234ddb420e06371a6dc042ded84
                                                  • Opcode Fuzzy Hash: 4ec087bc7bd37833f0647a48c282789a3b2250800aa32e4b4276ab159c278acc
                                                  • Instruction Fuzzy Hash: 83612562B08B4882DA20DB6DE440279A3A2FB597D4F909231DF6D47798EF3EF2518310
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                                  • Instruction ID: a417a1ac8bdbc630e3b869ed6cadf0731dfecb970cdd575d235aa6335c0ea3f6
                                                  • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                                  • Instruction Fuzzy Hash: 17F08C2932476BBEFE50853B5624FBD5E419BD0701FA379758C80020CB869E5493D724
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6b45453525f5d2fc62c84d77ad13ef48ef9287eb9f94b9dd3c8197f5f60b5b06
                                                  • Instruction ID: a839a331b16a4d5c430d3090e8828679d78fc98ad079994bcfab16f43d46fcdd
                                                  • Opcode Fuzzy Hash: 6b45453525f5d2fc62c84d77ad13ef48ef9287eb9f94b9dd3c8197f5f60b5b06
                                                  • Instruction Fuzzy Hash: 34A01221A0984980D3205714E150D105651E78C7153404022840C01830CD3485418200
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c401d5e77b82380336c64bbbff34b4c62b1207d4b576ecca6d801e95cf74b783
                                                  • Instruction ID: 0ee474e5051868c568e9947cf33611ac4ef839e390537cb92ddb7fcba4a2239c
                                                  • Opcode Fuzzy Hash: c401d5e77b82380336c64bbbff34b4c62b1207d4b576ecca6d801e95cf74b783
                                                  • Instruction Fuzzy Hash: E4A0012191CC0B90E624AB28A950430A626AB5A381B810632C51D454709E2DA604C221
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strcmp$strncpy$strchr
                                                  • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER
                                                  • API String ID: 1395212091-3550120021
                                                  • Opcode ID: 5b9f595ee7f3ca4ffd702705bcba5db95776521ceb982a28a691c4140223d490
                                                  • Instruction ID: ed893a8851dfc3a36e72d74d6733401d0e2d4def124f310f075136ecde5d636d
                                                  • Opcode Fuzzy Hash: 5b9f595ee7f3ca4ffd702705bcba5db95776521ceb982a28a691c4140223d490
                                                  • Instruction Fuzzy Hash: 9312C710B1C55B91FA30F738D8481B9A267AB98789FC05233D90E965F5EE2CE70AD330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$CounterPerformanceQuery
                                                  • String ID: Closing connection %ld
                                                  • API String ID: 3490100708-2599090834
                                                  • Opcode ID: eb9022106fa48ef0e48b7552785da4dbc1585c49f9124965ca0ddee36b5df991
                                                  • Instruction ID: 38e6a677aefa50ae9471a7455a7b895b180aac1862334f4282c63520a726cd08
                                                  • Opcode Fuzzy Hash: eb9022106fa48ef0e48b7552785da4dbc1585c49f9124965ca0ddee36b5df991
                                                  • Instruction Fuzzy Hash: 92C1FF35508B85C2E750AF35E8912AC7365FB89F58F880236DEAD077B9CF7892958330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                                                  • API String ID: 1294909896-2200874227
                                                  • Opcode ID: ae1e4fcc06bd7d9f04feea2aa870c001feb33b1b7f8d8a18fdde67d1064cfb35
                                                  • Instruction ID: 98e9e8e5fb04054dcc09ffc7f14e1ce1f7a3a9b389d46e0de704b345723c2342
                                                  • Opcode Fuzzy Hash: ae1e4fcc06bd7d9f04feea2aa870c001feb33b1b7f8d8a18fdde67d1064cfb35
                                                  • Instruction Fuzzy Hash: 89025521A0978A95EA74EB39A5403B9B391EF48784F840237DE4D477B5EF3CE7458720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfree$strpbrk
                                                  • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                                  • API String ID: 2737852498-2994854565
                                                  • Opcode ID: 9f3ae06b9d67fe3e04b5c85581cf7496fb5af4bc220afe7f1755c54301e1dd65
                                                  • Instruction ID: 067f9375d93e3cf14ff797cd8d5c5664523873588aba41f1590c31a0a215f312
                                                  • Opcode Fuzzy Hash: 9f3ae06b9d67fe3e04b5c85581cf7496fb5af4bc220afe7f1755c54301e1dd65
                                                  • Instruction Fuzzy Hash: 8FD17B21A09B5A85FA31EB3998546B9A3B1EF49B84FC40233DD4D177B5EF3CA645C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc$memcpy$htonl
                                                  • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                                  • API String ID: 82385936-242323837
                                                  • Opcode ID: 122f7fd80c8594248d113e32287b9eb9e9d1154b8ca574f645f8e3e0c2da2698
                                                  • Instruction ID: ed3dd3420273f81ce1eb4dfee3c5c1f477e15e37452669326fedb0bd00b0b02b
                                                  • Opcode Fuzzy Hash: 122f7fd80c8594248d113e32287b9eb9e9d1154b8ca574f645f8e3e0c2da2698
                                                  • Instruction Fuzzy Hash: 25C14331A08B4686E724AB79E8802ADB7A5FB48B94F804236DE5D47774DF7CD648C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$_dclass
                                                  • String ID: array$number overflow parsing '$object
                                                  • API String ID: 1391767211-579821726
                                                  • Opcode ID: 49bad17305f210d6756fb996981a7dfa2863f23b8915e32a00217a397da20321
                                                  • Instruction ID: 051a5656001481005eda8f00e3f2f2f519731147db2979c9c815a05b1dbe4cdc
                                                  • Opcode Fuzzy Hash: 49bad17305f210d6756fb996981a7dfa2863f23b8915e32a00217a397da20321
                                                  • Instruction Fuzzy Hash: 9022B962A18B8985EB20EBBCD4443AD7762FB857A4F804332D66D06AF5DF7DE194C310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: calloc$_strdupfreehtonsmemset
                                                  • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                                  • API String ID: 130798683-4053692942
                                                  • Opcode ID: 7cec8a530bab6e4e14e36d90609d07fde7477cf563e6d6e9dc01247cd4815aea
                                                  • Instruction ID: 7e1fce22d980f8f7f38376068ea60aee1c0fa82336ba7acf18d1b4c4606a6bf9
                                                  • Opcode Fuzzy Hash: 7cec8a530bab6e4e14e36d90609d07fde7477cf563e6d6e9dc01247cd4815aea
                                                  • Instruction Fuzzy Hash: 46E18432A0868A86E770AF39E4443A9B765FB48B84F854237DA4D47775DF3CE648C720
                                                  APIs
                                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DB96
                                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DBBC
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DBCD
                                                  • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DC3B
                                                  • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DC6C
                                                  • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DC8C
                                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DC9E
                                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DD00
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DD71
                                                  • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DD88
                                                  • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DE43
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DEB7
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF79B72D2CF), ref: 00007FF79B72DEC0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strchr$free$_strdupcalloc
                                                  • String ID: LDAP$base$one$onetree$sub$subtree
                                                  • API String ID: 112326314-884163498
                                                  • Opcode ID: c441c14a2b1bdea0e04bcdcd83fc73141006c477e6a67313454cb6bf718cf366
                                                  • Instruction ID: 9eaafaf954cf3129794847905eea2369d940d298ccc52cabbd14d1a184c82cae
                                                  • Opcode Fuzzy Hash: c441c14a2b1bdea0e04bcdcd83fc73141006c477e6a67313454cb6bf718cf366
                                                  • Instruction Fuzzy Hash: 8DB17521A09B8A86EA75AB399450279A391FF8D780FC44237DE4D477B4EF3CE645C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memchrstrtol
                                                  • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                                  • API String ID: 1626215102-895336422
                                                  • Opcode ID: e72314628692c8f67b7c30d7b4dec522e30d90b8ff87010d58779c3d96bd0464
                                                  • Instruction ID: 6ca3300940053256516efef342905ba53d2b2949a50a479925e3da621387d55e
                                                  • Opcode Fuzzy Hash: e72314628692c8f67b7c30d7b4dec522e30d90b8ff87010d58779c3d96bd0464
                                                  • Instruction Fuzzy Hash: 1A617D60A0864E85EB34AB39A8442B9B752EF487A0FD04733D96E477F5DE3CE7458720
                                                  APIs
                                                    • Part of subcall function 00007FF79B6F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B6FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B6F1B61), ref: 00007FF79B6F5757
                                                    • Part of subcall function 00007FF79B6F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B6FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B6F1B61), ref: 00007FF79B6F5763
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B6FC094
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B6FC09C
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B6FC0C3
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B6FC0CC
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B6FC150
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B6FC159
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                                  • API String ID: 1294909896-1595554923
                                                  • Opcode ID: fa43ea9e0a126be4bef8fb6f7ed3e76991f67a2a80a70aa702e2070dbb11514f
                                                  • Instruction ID: 7d517a802712442e826a37d914c6f319de9771c7128add7a52f975b202c4d265
                                                  • Opcode Fuzzy Hash: fa43ea9e0a126be4bef8fb6f7ed3e76991f67a2a80a70aa702e2070dbb11514f
                                                  • Instruction Fuzzy Hash: 8DE1C622B0964A92FA74AB3994012B5B7A2FF44B84FC84135CE6D43671DF3CF655C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$Authorization$Authorization:$Authorization: Bearer %s$Basic$Bearer$CONNECT$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                                                  • API String ID: 1294909896-115817326
                                                  • Opcode ID: 5103666079e0895649055ce2dfff0de9951619527c72c7acf41ad06290363e95
                                                  • Instruction ID: 69d2d487fbe0676fb2c2e92b96840f39e4f7aa0ce63b360dcc8100863e65f576
                                                  • Opcode Fuzzy Hash: 5103666079e0895649055ce2dfff0de9951619527c72c7acf41ad06290363e95
                                                  • Instruction Fuzzy Hash: 58915221A0CA9B91FA70EB399450379A395EB8AB94F944237DA4C076B1DF2CE645C730
                                                  APIs
                                                    • Part of subcall function 00007FF79B6E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B6E4341
                                                  • memcpy.VCRUNTIME140 ref: 00007FF79B6E6486
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF79B6E6518
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF79B6E6559
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E66A3
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E66E2
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E6730
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E6771
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E67CE
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E6888
                                                    • Part of subcall function 00007FF79B73F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF79B6E43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B73F20A
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E68C9
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E6996
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E69D7
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF79B6E69FA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                                                  • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                                                  • API String ID: 264867259-3075834232
                                                  • Opcode ID: 08d3399ec8f940c4a03e1f46e61cfcb17744a78f9cb9d73cd223b47bae6f47fe
                                                  • Instruction ID: 66f4923195c3b9ba605d1d9d1368c1546875c938265e5e7c2577b46efee118d0
                                                  • Opcode Fuzzy Hash: 08d3399ec8f940c4a03e1f46e61cfcb17744a78f9cb9d73cd223b47bae6f47fe
                                                  • Instruction Fuzzy Hash: 9A12E862F08A4985FB20AB78E44436DA762EB447E8F804731DA6D176F9DF7DE294C310
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                                  • String ID:
                                                  • API String ID: 1087521380-0
                                                  • Opcode ID: 178b2be9fe900d882fbf4bec64a10ac822553494956453af857de872257d8abc
                                                  • Instruction ID: 828e5ce37c2fa9adbe3383b0171ebf371d495902aa8bc549e88e08c375fc41dc
                                                  • Opcode Fuzzy Hash: 178b2be9fe900d882fbf4bec64a10ac822553494956453af857de872257d8abc
                                                  • Instruction Fuzzy Hash: 8EB1A321A0AB4A41EB75AF399559279A7A2AF06B94F980131CE6D033F4DF3CF654C330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strchrstrrchr$_strdupstrstr
                                                  • String ID: .$/$/$/$?
                                                  • API String ID: 2325335452-1821401756
                                                  • Opcode ID: fe309d15e1c9ad468805ff72253f153e950cdde515967c5eaefca60ef4d9a424
                                                  • Instruction ID: 4119557f27c5523a8a647b6d2cda71478fdea702a161eb62585b7ed6421ee59a
                                                  • Opcode Fuzzy Hash: fe309d15e1c9ad468805ff72253f153e950cdde515967c5eaefca60ef4d9a424
                                                  • Instruction Fuzzy Hash: A881B312A0C28A46FB756739950037DEAD2EF4DB85FC84236DE8D063F6DE3CA6458320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strchr$free
                                                  • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.70.0%sQUIT$CLIENT libcurl 7.70.0DEFINE %s %sQUIT$CLIENT libcurl 7.70.0MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                                                  • API String ID: 3578582447-31095704
                                                  • Opcode ID: 53b1f1ff83ba49730adffc0f43e93e22a6af339cda8417398f2a0793a2bb7f02
                                                  • Instruction ID: 41ca2e0f452f72f551f86f90f8fe9ca13d5531d3c4f979cb896c57e7522b682f
                                                  • Opcode Fuzzy Hash: 53b1f1ff83ba49730adffc0f43e93e22a6af339cda8417398f2a0793a2bb7f02
                                                  • Instruction Fuzzy Hash: C4814D11A0C68A45FA75AB3999542B9F692EF4DBC4FC84233DD4D477B6DE2CEB01C220
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 9c8d84b23c23547d3dcbb69ecb8177644d1ee1b27293fab0f9f33d95997fbe09
                                                  • Instruction ID: 32cecab668260c729c28e278bcb448c792cb42eaf386bafd128e911902825c79
                                                  • Opcode Fuzzy Hash: 9c8d84b23c23547d3dcbb69ecb8177644d1ee1b27293fab0f9f33d95997fbe09
                                                  • Instruction Fuzzy Hash: BA91D436618B85D3E7499F35E9912ACB368F749F48F440236EFAD47364CF74A2A58320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                                                  • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                                  • API String ID: 3103143820-2414412286
                                                  • Opcode ID: bd80529c0a055b40eb949fe60fbfac290892e4a6154919f81aed75a89cf498cd
                                                  • Instruction ID: 9c6ece9736a36e7d86d86fa2fbccf0e9eac5f342bbcb25f4baf0b2f70c35f5b6
                                                  • Opcode Fuzzy Hash: bd80529c0a055b40eb949fe60fbfac290892e4a6154919f81aed75a89cf498cd
                                                  • Instruction Fuzzy Hash: 76D19522A0C68A96EA34AB39D5406B9F7A1FB49794F840133DA4D07BB5DF3CE754C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                                                  • API String ID: 1294909896-874090715
                                                  • Opcode ID: 6b2f688943a9e32c43d9c8cdf6eaed92e1136cbf8a329590702e2aec2510cadf
                                                  • Instruction ID: 4a4b649c55e04105a69f3cbc1431b874e4130f96c883caeca8d854dc2e5afb82
                                                  • Opcode Fuzzy Hash: 6b2f688943a9e32c43d9c8cdf6eaed92e1136cbf8a329590702e2aec2510cadf
                                                  • Instruction Fuzzy Hash: 30A19F22E0864A85FB20EB7AD8405BDA7B5AB4C794F84063BDE0D576B5DF38E7448360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                                                  • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                                                  • API String ID: 2243338858-131330169
                                                  • Opcode ID: 6763ac52683adc2b30a8790578e0db2f895b694b4c0befe19cf29afa3948292b
                                                  • Instruction ID: a4ab5721e4938d36ca93bf31faebbcb57811e88f48c698174f220ec6a94526ce
                                                  • Opcode Fuzzy Hash: 6763ac52683adc2b30a8790578e0db2f895b694b4c0befe19cf29afa3948292b
                                                  • Instruction Fuzzy Hash: D891C621B08B8986EA78AB39D444279B3A1FB49B90F844237DB5E037B4DF3DD6458731
                                                  APIs
                                                  • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B7010B9,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B6FA403
                                                  • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B7010B9,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B6FA47D
                                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B7010B9,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B6FA4A1
                                                  • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B7010B9,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B6FA4F0
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B7010B9,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B6FA52A
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B7010B9,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B6FA53C
                                                  • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B7010B9,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B6FA54F
                                                  • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B7010B9,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B6FA56A
                                                  • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B7010B9,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B6FA580
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B7010B9,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B6FA589
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$fclose$__acrt_iob_func_unlinkcallocfputsqsort
                                                  • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                                  • API String ID: 1368378007-4087121635
                                                  • Opcode ID: ec21716dceaff2b7029e21b4bdcd17de1c33046af72defe3cfa22fc0696f2635
                                                  • Instruction ID: 292f9f2f77b7754083c2cce9f36ca2943c3591ded95e02d9626f3dedd1ca7226
                                                  • Opcode Fuzzy Hash: ec21716dceaff2b7029e21b4bdcd17de1c33046af72defe3cfa22fc0696f2635
                                                  • Instruction Fuzzy Hash: 8C517011A0D64E81FE75BB39981527AA3B2AF49BC5FC44532CD6E467B0EE3CF6058630
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Failed to resolve "%s" for SOCKS4 connect.$Failed to send SOCKS4 connect request.$SOCKS4 communication to %s:%d$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 non-blocking resolve of %s$SOCKS4 reply has wrong version, version should be 0.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$SOCKS4: Failed receiving connect request ack: %s$SOCKS4: too long host name$Too long SOCKS proxy name, can't use!$[
                                                  • API String ID: 0-3760664348
                                                  • Opcode ID: a9838e1c531df5b224806c47af8f7eb581c4b624720c16989e9d2bc795b1fd96
                                                  • Instruction ID: aba3120ca5a1dfb239f23022c0020d0d18e6374c1f789671bf6b24985c1497b3
                                                  • Opcode Fuzzy Hash: a9838e1c531df5b224806c47af8f7eb581c4b624720c16989e9d2bc795b1fd96
                                                  • Instruction Fuzzy Hash: B0E1B16190C2898AE774EF399444379BBA2EB89784F848237DA4D477B5DE3CE644C730
                                                  APIs
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E55CE
                                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79B6E55FC
                                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79B6E560A
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E5644
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E5695
                                                  • memset.VCRUNTIME140 ref: 00007FF79B6E54C3
                                                    • Part of subcall function 00007FF79B6E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B6E4341
                                                    • Part of subcall function 00007FF79B6E6310: memcpy.VCRUNTIME140 ref: 00007FF79B6E6486
                                                    • Part of subcall function 00007FF79B6E1FB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2121
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E5802
                                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79B6E582E
                                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79B6E583C
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E5877
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E58CA
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E59B1
                                                  • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF79B6E59C9
                                                  • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF79B6E59D6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                                                  • String ID: value
                                                  • API String ID: 2102519606-494360628
                                                  • Opcode ID: e6abd9e33a740746a936d1a104757d02c94551415d371e3f2cc947af29df2850
                                                  • Instruction ID: a9ac48b4561a10e24a4dc6e031468339e4f8ebc06cb13a87898a20b4203af633
                                                  • Opcode Fuzzy Hash: e6abd9e33a740746a936d1a104757d02c94551415d371e3f2cc947af29df2850
                                                  • Instruction Fuzzy Hash: 16F1FC22A1868585FB20EB7CE4443ADA762FB457A4F504332E6AD03AF5DF3CE295C710
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Cert$CertificateCertificatesContextEnumFreeStore
                                                  • String ID: ALPN, server did not agree to a protocol$http/1.1$schannel: ALPN, server accepted to use %.*s$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                                                  • API String ID: 2572311694-3353508759
                                                  • Opcode ID: d125e29cbc53f20c62fd678dc5c24584fcb7469be373689906402c056d156694
                                                  • Instruction ID: e72261f67d0c830547e9075d5fdf448a705310da2e1e9d51a982b6b6868a9adf
                                                  • Opcode Fuzzy Hash: d125e29cbc53f20c62fd678dc5c24584fcb7469be373689906402c056d156694
                                                  • Instruction Fuzzy Hash: 5DB18321A08A4A85EB70EB3DD8543B9B391EB8CB95F844233D94D477B4DF3CD6458720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$strchr$_strdup
                                                  • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                                  • API String ID: 1922034842-2519073162
                                                  • Opcode ID: 9420c540ce49b788537a1560c0a8b2960d2ad3b97e9a1f39b48959878ce98d9c
                                                  • Instruction ID: e01cfeea15b11715e1d0c3b3b4b0b17a73c5ccd8fe4bda4cb44ce1054280c227
                                                  • Opcode Fuzzy Hash: 9420c540ce49b788537a1560c0a8b2960d2ad3b97e9a1f39b48959878ce98d9c
                                                  • Instruction Fuzzy Hash: E9919921A0964B45FB71EA3A9440379E791AF89B84FC44233D94D4AEF5EE2DE741C330
                                                  APIs
                                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF79B72FD2F), ref: 00007FF79B73D02D
                                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0000000100000000,?,00007FF79B72FD2F), ref: 00007FF79B73D04F
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF79B72FD2F), ref: 00007FF79B73D060
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF79B72FD2F), ref: 00007FF79B73D08E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdupmalloc
                                                  • String ID: ../$/..$/../$/./
                                                  • API String ID: 111713529-456519384
                                                  • Opcode ID: f19d3bbf4f657fe2a39777922c2588bd535b1b954c8ccd3c424f95d841e483cd
                                                  • Instruction ID: f6fde4d7ae44dbaaf030a4a42621f41a9f7dea021a05d8797dcbf590404ee043
                                                  • Opcode Fuzzy Hash: f19d3bbf4f657fe2a39777922c2588bd535b1b954c8ccd3c424f95d841e483cd
                                                  • Instruction Fuzzy Hash: D871AB21E0D68E52FB727B39A540279EB51AB1AB94F844233CA5D026F0DF2CE759C321
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdup
                                                  • String ID:
                                                  • API String ID: 2653869212-0
                                                  • Opcode ID: c5af31e6bfdd5c7defb84974b0b43b731949193f68c51d1a7fd0e98afda8c353
                                                  • Instruction ID: 7e111eb1ca53f91da0ad94b1fcb899d8820f9ca8f0218a46524651df03b04d13
                                                  • Opcode Fuzzy Hash: c5af31e6bfdd5c7defb84974b0b43b731949193f68c51d1a7fd0e98afda8c353
                                                  • Instruction Fuzzy Hash: 49B16F32A0AB8987EA759F2DE551369B3A1FB44B54F940135CBAD43760DF3CF2648360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdupmalloc
                                                  • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                                  • API String ID: 111713529-3006446216
                                                  • Opcode ID: c052995a42e6b728a69c439b8f9efaad45d5159dd0512a59b113cd4f6ac561c8
                                                  • Instruction ID: 422343ee52ab4efdf1996e3f99d0c98a8834f75f8d313d66800d5913d579fca6
                                                  • Opcode Fuzzy Hash: c052995a42e6b728a69c439b8f9efaad45d5159dd0512a59b113cd4f6ac561c8
                                                  • Instruction Fuzzy Hash: 9E71A766A0D6C585E721AB3DA4442B9BBA1EF49748FD84633CA4D07372DE3DD349C321
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc
                                                  • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                                  • API String ID: 2190258309-1086287758
                                                  • Opcode ID: c9cf272a14080f984a1e5b17b6d9c33fcb4d42b5607d30e6d9f2944a95de6c96
                                                  • Instruction ID: d81c2f07bc9d1fe77e09ce6b1a6a114ffbf9c136eac13b3c597f73b90a608b18
                                                  • Opcode Fuzzy Hash: c9cf272a14080f984a1e5b17b6d9c33fcb4d42b5607d30e6d9f2944a95de6c96
                                                  • Instruction Fuzzy Hash: BBB10532A08B4986E7209B79E8902ADB7A4FB4C794F800236DE4D47B78DF7CD649C750
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                                  • API String ID: 1294909896-1220118048
                                                  • Opcode ID: 8e597e9a321645fbd1e646547d860fffd9a743d79f84a05bd7a1f386ba8e9fa4
                                                  • Instruction ID: 54e31f25f71165861e32c29f549997dfa9c926648d998ba0e9c43d73a4e4d031
                                                  • Opcode Fuzzy Hash: 8e597e9a321645fbd1e646547d860fffd9a743d79f84a05bd7a1f386ba8e9fa4
                                                  • Instruction Fuzzy Hash: E9710051B0C74E42EA34AB79A5401B9A362EB8DB84F844633DE4D477B9EE3CD709C760
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdupmalloctolower
                                                  • String ID: %%%02x
                                                  • API String ID: 1244608590-4020994737
                                                  • Opcode ID: b1bdd30bba7c06ed5a90474b3ff21456d1dc9d6e3bc5ba75029f1b5d07c933d7
                                                  • Instruction ID: 7e191e95b6892c325af64afc84e78cbbad1bf8ebc5cf11f74012a3dc9bbb7421
                                                  • Opcode Fuzzy Hash: b1bdd30bba7c06ed5a90474b3ff21456d1dc9d6e3bc5ba75029f1b5d07c933d7
                                                  • Instruction Fuzzy Hash: 89A1C41190D28A45FB75AB399410379ABD1EF4DB84FC84673DA8E4A3F5DE2DE6048330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memcmp
                                                  • String ID: $CAPABILITY$EXAMINE$EXPUNGE$FETCH$LIST$LSUB$NOOP$PREA$SEARCH$SELECT$STORE$UID$Unexpected continuation response
                                                  • API String ID: 1475443563-555813803
                                                  • Opcode ID: 6a2bea4392b2130e34a27003928b1a1b59b2f45c4f6fe4f375bb331a3221da70
                                                  • Instruction ID: ed078e16eb8ea67b227bf5b1f2f4a78b5d532a31889d6c36cfb4c42b0ea596f2
                                                  • Opcode Fuzzy Hash: 6a2bea4392b2130e34a27003928b1a1b59b2f45c4f6fe4f375bb331a3221da70
                                                  • Instruction Fuzzy Hash: 61D19E21A0C25A51FB35FA3DC4442B8E691AF89B94FC44233DE1D165B5EEACFB018B31
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdupmalloc
                                                  • String ID:
                                                  • API String ID: 111713529-0
                                                  • Opcode ID: 65d70c2820eccc7ad6d5e07aa6e6552cb9b250ec8001ae131bdda7340f47216e
                                                  • Instruction ID: b7dc674b6b369fb0304b18a77ed854227524865bea78c70a2a98bb055b471cf4
                                                  • Opcode Fuzzy Hash: 65d70c2820eccc7ad6d5e07aa6e6552cb9b250ec8001ae131bdda7340f47216e
                                                  • Instruction Fuzzy Hash: A5615D66A09B4583E625DF2AE444529B3A4FB8CB90B854236CF4E43770EF7CE595C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                                  • API String ID: 1294909896-2312071747
                                                  • Opcode ID: 4f8d1fe6c507fc75a8a7447a995cc6d66b45d7b9cd231fe4e4829fdd3982d9d9
                                                  • Instruction ID: d4319f5eba2dde55faeb34236f9158e7f020520b9f104326e755f921a7132cdc
                                                  • Opcode Fuzzy Hash: 4f8d1fe6c507fc75a8a7447a995cc6d66b45d7b9cd231fe4e4829fdd3982d9d9
                                                  • Instruction Fuzzy Hash: 22D18321A0C68A85EE74AB39D5503B9A361FB49794FC00337CA6D07AF1DF7CE6958321
                                                  APIs
                                                    • Part of subcall function 00007FF79B6E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B6E4341
                                                    • Part of subcall function 00007FF79B6E6310: memcpy.VCRUNTIME140 ref: 00007FF79B6E6486
                                                    • Part of subcall function 00007FF79B6E1FB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2121
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6EC0E0
                                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79B6EC10E
                                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79B6EC11C
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6EC156
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6EC1B3
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6EC26C
                                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79B6EC29A
                                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF79B6EC2A8
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6EC2E2
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6EC333
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6EC37D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                                  • String ID: value
                                                  • API String ID: 3212548336-494360628
                                                  • Opcode ID: 7b5888238a4a09ec30c6fc2f10e1af56b51de82c7d8bee0120de3219e1912078
                                                  • Instruction ID: 3af77de9cc6558470bbaf23f379493589b2c7b51fe22dd926cb4730789cc9153
                                                  • Opcode Fuzzy Hash: 7b5888238a4a09ec30c6fc2f10e1af56b51de82c7d8bee0120de3219e1912078
                                                  • Instruction Fuzzy Hash: 64A1A722A18A4985EB10EBBCE4443ADA762FB457B4F801332DA6D06EF5DF7DE195C310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                                  • String ID: Set-Cookie:$ignoring failed cookie_init for %s$none
                                                  • API String ID: 4109794434-4095489131
                                                  • Opcode ID: 88899a74057057c88eedf4ad62886504cfa5c0b3359586eb28e03194c433b762
                                                  • Instruction ID: 9e135e3f99349b0d64354ca9002f4be77e4ffd481c2c8d3d7375372a280aaed7
                                                  • Opcode Fuzzy Hash: 88899a74057057c88eedf4ad62886504cfa5c0b3359586eb28e03194c433b762
                                                  • Instruction Fuzzy Hash: 8461C521A0C78E81EA71EB3994052B9A7A6BF49B84FC94135DE9D077B1DE3DF6018320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_errno$strrchr$__sys_nerrstrerrorstrncpy
                                                  • String ID: Unknown error %d (%#x)
                                                  • API String ID: 4262108436-2414550090
                                                  • Opcode ID: 386f49717ce799f2919e61c9b6ba69ab02c74faa75e865e0592e627e6c6b58d9
                                                  • Instruction ID: facc1cfd0ef367717f8e050cfddb93762eb7f6a75c435155503665c192f59672
                                                  • Opcode Fuzzy Hash: 386f49717ce799f2919e61c9b6ba69ab02c74faa75e865e0592e627e6c6b58d9
                                                  • Instruction Fuzzy Hash: 3731972160C65986EA257F75A41523DE653AF88F81FC80135D91E477B5DE3CF6018B20
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$calloc$malloc
                                                  • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                                  • API String ID: 3103867982-1477229593
                                                  • Opcode ID: 9b585e6bd0feb1063935b59970e61f5a74aa7bdd2576848c92edd7d7f5558c6b
                                                  • Instruction ID: cecd9b52389f4e440e997c3fe6f3f676afc4c9e14d0f9af4320f6152a5f22a00
                                                  • Opcode Fuzzy Hash: 9b585e6bd0feb1063935b59970e61f5a74aa7bdd2576848c92edd7d7f5558c6b
                                                  • Instruction Fuzzy Hash: 11C16E32A08B5986EB24EF79E4402ADB7A4FB48B88F800636DE4D47778DF78D645C750
                                                  APIs
                                                  • memset.VCRUNTIME140 ref: 00007FF79B729D8B
                                                  • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF79B729EB5
                                                    • Part of subcall function 00007FF79B6F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B6FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B6F1B61), ref: 00007FF79B6F5757
                                                    • Part of subcall function 00007FF79B6F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B6FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B6F1B61), ref: 00007FF79B6F5763
                                                  • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF79B729E6F
                                                    • Part of subcall function 00007FF79B6F5690: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF79B6F56A0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freestrncpy$_strdupmemset
                                                  • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                                  • API String ID: 3826632026-748038847
                                                  • Opcode ID: da2cc46d67d0a219d26850ebc5348b5f8784cef6f8666290cff01ef196f61833
                                                  • Instruction ID: 1989f1120947da79ed8da26a397661a1486619c76cce76e5070e2d978e11dd11
                                                  • Opcode Fuzzy Hash: da2cc46d67d0a219d26850ebc5348b5f8784cef6f8666290cff01ef196f61833
                                                  • Instruction Fuzzy Hash: AD715E32A08ACA95EB31AF28D4456F9B361FF88784FC80233DA4C46675DF78E645C760
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: sendto$ErrorLast
                                                  • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                                  • API String ID: 4042023021-4197595102
                                                  • Opcode ID: 2c42f4589fd93ccc31a9c772dbb528ab0ebb5ca0010053bde185be85adee39dc
                                                  • Instruction ID: 1ceb66baa9efc4c450f06ce0f602e487b2d1e7e5105c1fac5b9c134ba31b790b
                                                  • Opcode Fuzzy Hash: 2c42f4589fd93ccc31a9c772dbb528ab0ebb5ca0010053bde185be85adee39dc
                                                  • Instruction Fuzzy Hash: 20B17B72608686C6E725AF39D4402A9B7A1FB8CB89F854233CE4D4B778DE38D641C760
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: sendto$_time64
                                                  • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                                  • API String ID: 2327272419-1785996722
                                                  • Opcode ID: f659e7d6293575dd460c02bea57d72e403e3cd8a9ca2c00b7ad585d6ee1076f9
                                                  • Instruction ID: 9eeb0af97242bb9f2c1b4178fd9d682efdbb59f94167aa0f1504fba5b2470b29
                                                  • Opcode Fuzzy Hash: f659e7d6293575dd460c02bea57d72e403e3cd8a9ca2c00b7ad585d6ee1076f9
                                                  • Instruction Fuzzy Hash: C5913A72608685C6E7619F3DD4503A97BA1FB9CB88F848232DA4D47778DF39D606C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdup$freestrchrstrncmpstrtol
                                                  • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                                  • API String ID: 2070079882-2404041592
                                                  • Opcode ID: c0389e6460597208a1fcbcc33ceaf34b3b224a0e2a46fa55c8373790c4765b53
                                                  • Instruction ID: d0b72a165a2835a16d12780d008e78132e9a1fbd1788da0956355d723f71aab9
                                                  • Opcode Fuzzy Hash: c0389e6460597208a1fcbcc33ceaf34b3b224a0e2a46fa55c8373790c4765b53
                                                  • Instruction Fuzzy Hash: 7151E661A0C68A46EB31AB3D9C60379E7F19F0D794FC94233DA4D466B1DE6CE6458330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                                  • String ID: Set-Cookie:$none
                                                  • API String ID: 4109794434-3629594122
                                                  • Opcode ID: 3b281a9d8fec38794cab6deb469b12af5d61e8eb2c6cb3d8728870ef85f7b18c
                                                  • Instruction ID: b34da9cfbbe8eab5d35b1f107d06577827b451a88caf8f8fd5b3e128c7674867
                                                  • Opcode Fuzzy Hash: 3b281a9d8fec38794cab6deb469b12af5d61e8eb2c6cb3d8728870ef85f7b18c
                                                  • Instruction Fuzzy Hash: D851C421A0D78A41FB75BB396515279E692AF4AB80F884131DEAE027F1DF3CF6458331
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                                  • API String ID: 3510742995-1652449680
                                                  • Opcode ID: d8d1418f8031cba0bf6fb4262a2c68856d9d2c7bea2d3532c97021ddabc94649
                                                  • Instruction ID: d3ac4357fbb02dffc73fd795d05f6f7302d39d290bbf05aef417ff2c0e05a76f
                                                  • Opcode Fuzzy Hash: d8d1418f8031cba0bf6fb4262a2c68856d9d2c7bea2d3532c97021ddabc94649
                                                  • Instruction Fuzzy Hash: D1A16431A18A8A81E760EF39D8403F9B7A1EB89794F844233DD5D4B3B5DE7CE6459320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                                  • API String ID: 1294909896-3146291949
                                                  • Opcode ID: 7504568c3eadcb67795fcc710138e6e92c1df6eea46f795b5d6e6b2f2caaf592
                                                  • Instruction ID: 8b4156567b27cc0648bcd706150d1101572832eb563601df98c2dc05b86d177a
                                                  • Opcode Fuzzy Hash: 7504568c3eadcb67795fcc710138e6e92c1df6eea46f795b5d6e6b2f2caaf592
                                                  • Instruction Fuzzy Hash: 4A918821B0C64A85EB74EB399490379A3A1EF8D784F844637DA4D472B1DF6CEA44C770
                                                  APIs
                                                    • Part of subcall function 00007FF79B6E2370: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2469
                                                    • Part of subcall function 00007FF79B6E2370: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E24A8
                                                    • Part of subcall function 00007FF79B6E4310: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B6E4341
                                                    • Part of subcall function 00007FF79B6E3BB0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF79B6E1D8B), ref: 00007FF79B6E3BF6
                                                    • Part of subcall function 00007FF79B6E5DD0: memcpy.VCRUNTIME140(?,?,?,00007FF79B6E1DBA), ref: 00007FF79B6E5E61
                                                    • Part of subcall function 00007FF79B6E3C30: memcpy.VCRUNTIME140 ref: 00007FF79B6E3C83
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2121
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2171
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E21C2
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2202
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2254
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2293
                                                  • __std_exception_copy.VCRUNTIME140 ref: 00007FF79B6E22E6
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2337
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                                  • String ID: parse error$parse_error
                                                  • API String ID: 2484256320-1820534363
                                                  • Opcode ID: a32d99771af3680ddee151660196c7aed460eb1df2c5b25a283ec20f4fe15231
                                                  • Instruction ID: 96ce97a6fb75950a7addc725e657a01d8779702b80643cf8d29a326e31de3c2f
                                                  • Opcode Fuzzy Hash: a32d99771af3680ddee151660196c7aed460eb1df2c5b25a283ec20f4fe15231
                                                  • Instruction Fuzzy Hash: A6B1A562A04B4985FB10EBB8E4443AD6762FB457A8F905731DB6D02AF9DF38E2D0C310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc$_time64calloctolower
                                                  • String ID: :%u$Shuffling %i addresses
                                                  • API String ID: 133842801-338667637
                                                  • Opcode ID: 4114e8447836235a13a173b76bc0726135e8d9328521724c093da3439fb84ab4
                                                  • Instruction ID: 8cb8a17cbccb1e29969d1a4080cde6d7424d02431deaa60890fd56c62bdb47a3
                                                  • Opcode Fuzzy Hash: 4114e8447836235a13a173b76bc0726135e8d9328521724c093da3439fb84ab4
                                                  • Instruction Fuzzy Hash: C671A672A08A4681EB34AB29E8447A9B761FB4CB94F844633DE4E077B0DF3CD645C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfree
                                                  • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                                  • API String ID: 1865132094-1312055526
                                                  • Opcode ID: b941f56203112eb735e749685b5e095cafadd7fb3b5203ee30a478e70944225f
                                                  • Instruction ID: 8a3e8d07c3ecdf449ba2a6e797bc3f939e7894f3471a2123159b7af363688fde
                                                  • Opcode Fuzzy Hash: b941f56203112eb735e749685b5e095cafadd7fb3b5203ee30a478e70944225f
                                                  • Instruction Fuzzy Hash: 7971A661A0868A84E770AB3C98402BDB7A1EB49B94F980237DE4D4B7B5DF7DD6418370
                                                  APIs
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B700FED
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70100A
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70101E
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70103A
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B701057
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70107A
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70108E
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B7010A2
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B7010C8
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B7010DC
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B7010F0
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70113F
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B70114C
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B7015F5), ref: 00007FF79B701175
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 31be3772069e500a7aef819516f3faf0ac6f02a24d8bfe9d18ec5130e08255e8
                                                  • Instruction ID: 38f6d20b71f579373d81a48360db7a42645440110b856142cb3bcbd2521b4dbd
                                                  • Opcode Fuzzy Hash: 31be3772069e500a7aef819516f3faf0ac6f02a24d8bfe9d18ec5130e08255e8
                                                  • Instruction Fuzzy Hash: 8C51ED31509A8681EB24EF35D8912FDA3A1FF89F94F880132DE5E4B775CE78A6458330
                                                  APIs
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B72F0FB
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B72F161
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B72F16F
                                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B72F26D
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B72F2D6
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B72F2EE
                                                    • Part of subcall function 00007FF79B72E240: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF79B72E250
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B72F316
                                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B72F32D
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B72F352
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B72F39F
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B72F3B4
                                                    • Part of subcall function 00007FF79B72F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F4FC
                                                    • Part of subcall function 00007FF79B72F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F506
                                                    • Part of subcall function 00007FF79B72F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F510
                                                    • Part of subcall function 00007FF79B72F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F51A
                                                    • Part of subcall function 00007FF79B72F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F524
                                                    • Part of subcall function 00007FF79B72F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F52E
                                                    • Part of subcall function 00007FF79B72F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F538
                                                    • Part of subcall function 00007FF79B72F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F542
                                                    • Part of subcall function 00007FF79B72F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F54C
                                                    • Part of subcall function 00007FF79B72F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F556
                                                    • Part of subcall function 00007FF79B72F4F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F560
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$calloc$_strdup
                                                  • String ID: ,$:
                                                  • API String ID: 2460172880-4193410690
                                                  • Opcode ID: 720a0cab02216bd014dea907fac7775497998a3dfb4afdeff2ebf6ce69ee974d
                                                  • Instruction ID: 02949fa76ef0286409a35f2c258b680b173555f01679a6e202fab691b2f34218
                                                  • Opcode Fuzzy Hash: 720a0cab02216bd014dea907fac7775497998a3dfb4afdeff2ebf6ce69ee974d
                                                  • Instruction Fuzzy Hash: 6D516312E08A8A42F731AB3D95512BDA391FB5EB88F845736CE8D15672DF6CF2C48310
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdup$free$strrchr$_access_stat64
                                                  • String ID:
                                                  • API String ID: 2557200964-0
                                                  • Opcode ID: 65c608ef1fe535978de831929790de7b27f3758338418f5053a35891be0bad24
                                                  • Instruction ID: b98c6aadeba41352ec06dbfbd3f32bc4075259c825b1530b7eb8409d9bc15240
                                                  • Opcode Fuzzy Hash: 65c608ef1fe535978de831929790de7b27f3758338418f5053a35891be0bad24
                                                  • Instruction Fuzzy Hash: B9416721709B4A86FA30FB29A491279A2A1FF48B90F844135DE5D477B4EF3CF655C260
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$mallocmemcpy$strchr
                                                  • String ID:
                                                  • API String ID: 1615377186-0
                                                  • Opcode ID: 423932c48b670e7d4c08b2c511fcb01a71418cb138ea8a2e2a5fa0a09370d790
                                                  • Instruction ID: 76dee44fd02cf3e2260426805ac301095490a49077ecdee60c6e569c5593e4aa
                                                  • Opcode Fuzzy Hash: 423932c48b670e7d4c08b2c511fcb01a71418cb138ea8a2e2a5fa0a09370d790
                                                  • Instruction Fuzzy Hash: E651A72570978986DA75AF29A904279E2A1BF4DBC4F884633EE4D07B74DF3CE605C320
                                                  APIs
                                                  Strings
                                                  • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF79B703D09
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdup
                                                  • String ID: Couldn't find host %s in the .netrc file; using defaults
                                                  • API String ID: 2653869212-3983049644
                                                  • Opcode ID: 68ac9eeb43db9e5fab4e5cb7431107d5fc0a2d7964483fdef9680f4b84830d14
                                                  • Instruction ID: bfd70331d53014d2df22108441db7bae4fd300495630e9b3a7cf56821a719aca
                                                  • Opcode Fuzzy Hash: 68ac9eeb43db9e5fab4e5cb7431107d5fc0a2d7964483fdef9680f4b84830d14
                                                  • Instruction Fuzzy Hash: 3271AE22A08A8A86E775AB39D85436AA7A0FB4C744F460237DB4D473B0DF7DE654D330
                                                  APIs
                                                  Strings
                                                  • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF79B703D09
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdup
                                                  • String ID: Couldn't find host %s in the .netrc file; using defaults
                                                  • API String ID: 2653869212-3983049644
                                                  • Opcode ID: 409e8ccf2cd3c48ddd194ed0cbd5bbb9f08e90a8da56c531e43f24badbebf168
                                                  • Instruction ID: ffda9d4b36027e35f75039e590545e5cf1cf0ac70c381df8b530940e8b556392
                                                  • Opcode Fuzzy Hash: 409e8ccf2cd3c48ddd194ed0cbd5bbb9f08e90a8da56c531e43f24badbebf168
                                                  • Instruction Fuzzy Hash: D3618262A08A8686E7259B39D854369A7B0FB4CB44F8A4237CB9D473B0DF3CE555C730
                                                  APIs
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF79B71450A), ref: 00007FF79B70851F
                                                  • strchr.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF79B71450A), ref: 00007FF79B708571
                                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF79B71450A), ref: 00007FF79B708595
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF79B71450A), ref: 00007FF79B7085E5
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF79B71450A), ref: 00007FF79B708628
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdupstrchr
                                                  • String ID: %.*s$%sAuthorization: Digest %s$Digest$Proxy-
                                                  • API String ID: 153040452-3976116069
                                                  • Opcode ID: 0f0d1023f35f98c3c0a34dc26ceb475acd9aa810923e54976b2dd0c2c34d3d66
                                                  • Instruction ID: de5d351a33720d7b05963cab627e1d2e22b6cb9d8832d051cfe19d32d8c8ca69
                                                  • Opcode Fuzzy Hash: 0f0d1023f35f98c3c0a34dc26ceb475acd9aa810923e54976b2dd0c2c34d3d66
                                                  • Instruction Fuzzy Hash: 66419622609B8992E730AF29E8403AAB760FB49B84F940137DE8D477B5DF7CD656C310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                                  • API String ID: 600764987-1381340633
                                                  • Opcode ID: 867b3c2889ea910bc82d5d4d60626029d6c103a08cfe34e10975424c7ee76e4e
                                                  • Instruction ID: fe2854e1ebb5b991670e1981584af4db8e8752d873cfc215c4e64fc9bd8599d3
                                                  • Opcode Fuzzy Hash: 867b3c2889ea910bc82d5d4d60626029d6c103a08cfe34e10975424c7ee76e4e
                                                  • Instruction Fuzzy Hash: 5A31822260C7C585E731AB74A4513AEF7A6FB89741FC40136DA9D02AB5CF3CE604CB20
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                                  • API String ID: 600764987-3862749013
                                                  • Opcode ID: e21ee0f88ee939b7acd86ddd09091f8135850e0e83f13a8bc41a40d40aa2e6f4
                                                  • Instruction ID: cefcae1064261aefe8f67d95967cc877c082a8cd728859821f146626b1f0356b
                                                  • Opcode Fuzzy Hash: e21ee0f88ee939b7acd86ddd09091f8135850e0e83f13a8bc41a40d40aa2e6f4
                                                  • Instruction Fuzzy Hash: 1C31822260C7C985E731AB74A4513AEF7A6FB89741FC40136DA9D02AB5CF3CE644CB20
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                                  • API String ID: 600764987-1502336670
                                                  • Opcode ID: 22f5f913cf0be7411f16a76cd575f268f1e4d73e328349b01835e54fb8980df1
                                                  • Instruction ID: 43f3074adf9bf10ee520f47e554c0a45974cae87e5c8585217e30daa1bcc3d62
                                                  • Opcode Fuzzy Hash: 22f5f913cf0be7411f16a76cd575f268f1e4d73e328349b01835e54fb8980df1
                                                  • Instruction Fuzzy Hash: D731822260C7C985E731AB74A4513AEF7A6FB89741FC40136DA9D02AB5CF3CE604CB20
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                                  • API String ID: 600764987-2628789574
                                                  • Opcode ID: d674bc91ab309861c4f229d8fb5e2326304ccee02d36cd07337ee2d10ece94b6
                                                  • Instruction ID: d9454d7977374813989c5e107b6e04f4b566ae9cf825bb76bb0f19a331b5ab72
                                                  • Opcode Fuzzy Hash: d674bc91ab309861c4f229d8fb5e2326304ccee02d36cd07337ee2d10ece94b6
                                                  • Instruction Fuzzy Hash: A631822260C7C585E731AB74A4513AEF7A6FB89741FC40136DA9D02AB5CF3CE644CB20
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                                  • API String ID: 600764987-1965992168
                                                  • Opcode ID: 21007d3461f6208895004d40506dbe1f915b5f9fd6c49eefa50c2d29984a337d
                                                  • Instruction ID: 0d30da54ebc22dff43044df7d64482dd1bbaf61849f2da3ed74635eaf87a2a53
                                                  • Opcode Fuzzy Hash: 21007d3461f6208895004d40506dbe1f915b5f9fd6c49eefa50c2d29984a337d
                                                  • Instruction Fuzzy Hash: 4531822260C7C585E731AB74A4513AEF7A6FB89741FC40136DA9D02AB5CF3CE604CB20
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                                  • API String ID: 600764987-1052566392
                                                  • Opcode ID: 040bb05f0cf7cd9878106aad1305948eb5ac86463c693ab4e214be405d518435
                                                  • Instruction ID: a131641f257aed01173986fb2a0a7d982341c461d3f79cc76df0438ef18be529
                                                  • Opcode Fuzzy Hash: 040bb05f0cf7cd9878106aad1305948eb5ac86463c693ab4e214be405d518435
                                                  • Instruction Fuzzy Hash: FD31822260C7C585E731AB74A4513AEF7A6FB89741FC40136DA9D02AB5CF3CE604CB20
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                                  • API String ID: 600764987-2710416593
                                                  • Opcode ID: e72c6dac9182f083b27a246ce7e39daeaee275ef12f8df3a52750dc7f20c32e7
                                                  • Instruction ID: 267885de4fd1ab06a9ea1fd3ac9b67a2d3e6a4b085d2626d219f7f5ad7208949
                                                  • Opcode Fuzzy Hash: e72c6dac9182f083b27a246ce7e39daeaee275ef12f8df3a52750dc7f20c32e7
                                                  • Instruction Fuzzy Hash: 4D31822260C7C585E731AB74A4513AEF7A6FB89741FC40136DA9D02AB5CF3CE644CB20
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                                  • API String ID: 600764987-618797061
                                                  • Opcode ID: 16bb4725a52e87406c64d7570a0d1708fd42835543bc5ceca5d1af16b41e7555
                                                  • Instruction ID: e7161d81c30000d3e769cca7b6f7f3133b3ba2b485ef3f17321c5973ba796900
                                                  • Opcode Fuzzy Hash: 16bb4725a52e87406c64d7570a0d1708fd42835543bc5ceca5d1af16b41e7555
                                                  • Instruction Fuzzy Hash: 8F31622260C7C585EB31AB74A4453AEB7A6FB89741FC40536DA9D02A75DF3CE644CB20
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_time64
                                                  • String ID:
                                                  • API String ID: 3087401894-0
                                                  • Opcode ID: d0da0f097b5d80642ff36406b4892f59b7423f49bcee82ad23568ad6ef708db7
                                                  • Instruction ID: 42bd8f8b4e987e43fcdcbc20f116a185a786bca2e2749dd1eaaff8c2a66da4fa
                                                  • Opcode Fuzzy Hash: d0da0f097b5d80642ff36406b4892f59b7423f49bcee82ad23568ad6ef708db7
                                                  • Instruction Fuzzy Hash: 9221FF36A08A49C2DB20AF36E945129A771FB48F94F854132DE9E03774DF7CE585C360
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                                  • API String ID: 0-808606891
                                                  • Opcode ID: 9448450eb3de28253e4df0924c4658d0be0a605a21eefad039d6e15a47a5022b
                                                  • Instruction ID: 923f8967b47f31fd1533057f22745baf31c5bd4d21a482ffdf798a4f139312c4
                                                  • Opcode Fuzzy Hash: 9448450eb3de28253e4df0924c4658d0be0a605a21eefad039d6e15a47a5022b
                                                  • Instruction Fuzzy Hash: 98B16262508A49C1EB349F7CD44827CB763FB15B58FA44535C66E022E8DF3AFAA5C360
                                                  APIs
                                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B73E30A
                                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B73E358
                                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B73E3BB
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B73E4F9
                                                    • Part of subcall function 00007FF79B7322A0: strchr.VCRUNTIME140(00000000,?,?,00007FF79B73185F), ref: 00007FF79B7322E6
                                                    • Part of subcall function 00007FF79B7322A0: strchr.VCRUNTIME140(00000000,?,?,00007FF79B73185F), ref: 00007FF79B7322F6
                                                    • Part of subcall function 00007FF79B7322A0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,00007FF79B73185F), ref: 00007FF79B732320
                                                    • Part of subcall function 00007FF79B7322A0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B732355
                                                    • Part of subcall function 00007FF79B7322A0: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF79B73237A
                                                    • Part of subcall function 00007FF79B7322A0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF79B73239C
                                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF79B73E584
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdup$callocmallocstrchr$freestrncpy
                                                  • String ID: GSSAPI$GSSAPI handshake failure (empty challenge message)$Kerberos
                                                  • API String ID: 370574955-353107822
                                                  • Opcode ID: 97e1b16efe85accf3280f51b2dfd9503afd202376f1122c1dcbf4fd5d76c7b35
                                                  • Instruction ID: 15e42680ced0ee711ff9871e45a7a828d43d2fb2e11be179d86fa7a11c3a2839
                                                  • Opcode Fuzzy Hash: 97e1b16efe85accf3280f51b2dfd9503afd202376f1122c1dcbf4fd5d76c7b35
                                                  • Instruction Fuzzy Hash: 05A15232A08B5986EB609F79E8402ADB7A5FB48B44F800236DE4D57778EF38D549C760
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdup
                                                  • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                                  • API String ID: 1169197092-2292467869
                                                  • Opcode ID: 885132bfc6f569fa9e4364d0e212aa131c61de749b27f2b2bd18638b8e276b83
                                                  • Instruction ID: 194b7964bcb90566bd00a9a909befadcee476b5bc214bd91c3f982dc5d74a33b
                                                  • Opcode Fuzzy Hash: 885132bfc6f569fa9e4364d0e212aa131c61de749b27f2b2bd18638b8e276b83
                                                  • Instruction Fuzzy Hash: 75916222E0C78A45FF75A739944A379E7A2AF56754F840136CA9E026F1DF2CF644C360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdup
                                                  • String ID: Authentication problem. Ignoring this.$Basic$Bearer$Digest$Ignoring duplicate digest auth header.$NTLM$Negotiate
                                                  • API String ID: 1169197092-907567932
                                                  • Opcode ID: fd8626e724c16117a797dc353e5ebe47805927aaa71765aefca5cfb5a68c864c
                                                  • Instruction ID: cf19e79058323495e4b15738eb0297efb4cd5ef783b6958def45c6d38f74bb51
                                                  • Opcode Fuzzy Hash: fd8626e724c16117a797dc353e5ebe47805927aaa71765aefca5cfb5a68c864c
                                                  • Instruction Fuzzy Hash: 3771F76190C28E46FB34EB799940276F6D1AB89788F844137DE4A466F2DF2CE7648730
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdup
                                                  • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$__Host-$__Secure-
                                                  • API String ID: 1169197092-978722393
                                                  • Opcode ID: 39dff23ab9e62df8e455a59c0b7cf5ca0842b95295e71ffbebd87fca4db492d1
                                                  • Instruction ID: dbdcc0c57a0b5a619d369c3fa6d4f51e464b2df618358eb263ab3871d2284710
                                                  • Opcode Fuzzy Hash: 39dff23ab9e62df8e455a59c0b7cf5ca0842b95295e71ffbebd87fca4db492d1
                                                  • Instruction Fuzzy Hash: 51716122E0C78A45FF75AB39944A37AE7A2AF56754F840136CA9D026F1DF2CF644C360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$strchrstrtol
                                                  • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                                                  • API String ID: 137861075-1224060940
                                                  • Opcode ID: b1d23da1f6448ceea52aefbd53d22620ef15af7bfc877e12de7476ea10bbd4ea
                                                  • Instruction ID: a68bee2e1efbf3b8882b1cf08e7946d28e83de624258993c669c71ef03659a24
                                                  • Opcode Fuzzy Hash: b1d23da1f6448ceea52aefbd53d22620ef15af7bfc877e12de7476ea10bbd4ea
                                                  • Instruction Fuzzy Hash: 4C518622A08AC695EB31AB29AC403B9A7B1FB49B94F844237DE5D077B5CE3DD745C310
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: ALL$FLUSH$RELOAD$SESS$Set-Cookie:
                                                  • API String ID: 1294909896-1147549499
                                                  • Opcode ID: 567cec5eb1f694fa24dd200d27c250479e4804b01726046d216b7bbc46925cfe
                                                  • Instruction ID: 3f70e21593124258e03b7fb688d2e4c85bcc27b1b82d6364f8cf5303ffa8e80d
                                                  • Opcode Fuzzy Hash: 567cec5eb1f694fa24dd200d27c250479e4804b01726046d216b7bbc46925cfe
                                                  • Instruction Fuzzy Hash: 7B416511B0C50A42FA34BB3E59522B9D2A75F88BC0FD40136DA1D47AB6DE3DF7119270
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdup$callocfreestrrchr
                                                  • String ID: Wildcard - Parsing started
                                                  • API String ID: 2641349667-2274641867
                                                  • Opcode ID: 88b144cc56bc3fe35c4db0f39c44eab320178b2b170d387642b05e09fc603901
                                                  • Instruction ID: a15477d244a99727b4e42c51676058febc99db1a1193d2914c763c9cabbb58df
                                                  • Opcode Fuzzy Hash: 88b144cc56bc3fe35c4db0f39c44eab320178b2b170d387642b05e09fc603901
                                                  • Instruction Fuzzy Hash: 64515136A08B8AC5EB25EF29E4441B8B3A5FB88B50F854237CA4E47374DF38D655C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdup
                                                  • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                                  • API String ID: 2653869212-3672398475
                                                  • Opcode ID: e343febf516ec9d38bf4e5ff34aca985b545a36e1131153d014cfbc99d8ea65a
                                                  • Instruction ID: 045ac4dc12b4c51d7e6b72a215018dddc6ce5c33acc4732aa51ca21e2a73e858
                                                  • Opcode Fuzzy Hash: e343febf516ec9d38bf4e5ff34aca985b545a36e1131153d014cfbc99d8ea65a
                                                  • Instruction Fuzzy Hash: 38418592B0978A45EB35AB7DA4441F9A761BB09784F840637DE4E07776DF3CE2488320
                                                  APIs
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F4FC
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F506
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F510
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F51A
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F524
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F52E
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F538
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F542
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F54C
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F556
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B72E522,?,?,00000000,00007FF79B70562B,?,?,00000000,00007FF79B701073,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B72F560
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 4bd9b4a64c6f4928f2aeb53d54435eee89f370362724c80c36f7871448125e9d
                                                  • Instruction ID: 2b0433b1222112dd9b0d73235ec734ae4a08a24e6efe2db06d2454e059cd2f09
                                                  • Opcode Fuzzy Hash: 4bd9b4a64c6f4928f2aeb53d54435eee89f370362724c80c36f7871448125e9d
                                                  • Instruction Fuzzy Hash: AD01B526A14909C3D724AF3AEC960386330FF8CF59B941132CE6E46234DE78D999C360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: mallocmemcpy
                                                  • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                                  • API String ID: 4276657696-1832275178
                                                  • Opcode ID: b4658a80f4914b881289cdf9ec249ecfe85db5b317b3999fd571b759e4aeb899
                                                  • Instruction ID: 53a9ba788e59c333ab6de8b2a5f30991701599a646f0654da015b00fe08432ad
                                                  • Opcode Fuzzy Hash: b4658a80f4914b881289cdf9ec249ecfe85db5b317b3999fd571b759e4aeb899
                                                  • Instruction Fuzzy Hash: 5CA1536160DB8A85EA75AF29A5403B9B3A5FB48784F844237DE9D03774DF3CE644C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memcpy$freemalloc
                                                  • String ID: 8$Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed
                                                  • API String ID: 3313557100-1003742340
                                                  • Opcode ID: 0c6c6a0736584b422a8591f061b5560b5f3385543d772d987b64fcb1468f111b
                                                  • Instruction ID: b5385f0901a2d938152ea7f14cc285db252d0e160481d0f8c79ae241214f8129
                                                  • Opcode Fuzzy Hash: 0c6c6a0736584b422a8591f061b5560b5f3385543d772d987b64fcb1468f111b
                                                  • Instruction Fuzzy Hash: 3681D522608B89C1DA64AB3AE4813ADA3A0FB49B84F844533DF4E47771DF3DD695C350
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$mallocmemcpy
                                                  • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                                  • API String ID: 3401966785-2901970132
                                                  • Opcode ID: 675581fe95d70d56e8e3699e3a784245db5b4a778fe3a8afeca15a521e899947
                                                  • Instruction ID: 3bc8c1fd83d67be239be348baba6ae664f2ac782704e805f93f9100a0210ad84
                                                  • Opcode Fuzzy Hash: 675581fe95d70d56e8e3699e3a784245db5b4a778fe3a8afeca15a521e899947
                                                  • Instruction Fuzzy Hash: 3B611851A0828A55EB28A73DA4541B9A762BB0D794FC44737CE5E077F5EE3CE3488320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$mallocmemcpy
                                                  • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                                  • API String ID: 3401966785-517259162
                                                  • Opcode ID: d4e23496baadb6999b3355ec43cb5b2942b84d7c3c397044e5b8f182b07cf7af
                                                  • Instruction ID: 068010425be9eafcaf4a42a6dbca3c9eb209dc75095f153848af8360166b80be
                                                  • Opcode Fuzzy Hash: d4e23496baadb6999b3355ec43cb5b2942b84d7c3c397044e5b8f182b07cf7af
                                                  • Instruction Fuzzy Hash: FA61F651A0C68A45EB3DA73DA4541B9A762BF09794F844737CA1F077B5DE3CE24C8320
                                                  APIs
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF79B7144E8), ref: 00007FF79B731010
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF79B7144E8), ref: 00007FF79B731047
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF79B7144E8), ref: 00007FF79B73106E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                                  • API String ID: 1294909896-3948863929
                                                  • Opcode ID: 72266c120b509359db8940e29d2bafec9ecaf846b70da79a858558816950a900
                                                  • Instruction ID: d31aca0421f62539405d31ada918d957fc11d7c25cfbac0361a0a61d9bd119e2
                                                  • Opcode Fuzzy Hash: 72266c120b509359db8940e29d2bafec9ecaf846b70da79a858558816950a900
                                                  • Instruction Fuzzy Hash: 37617132A09B8985E7709F29E8443AAB3A5F748B84F840237DA8D47778DF3CD645C721
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                                  • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                                  • API String ID: 1392894463-1168109407
                                                  • Opcode ID: 5dbef2c0e756209cfb9fc127f82bb29073db9982edaea3d0de072ac830874615
                                                  • Instruction ID: 0511d9e07693f74400c1567858187f9e5f5ca8b29f65a12d8786436e5ad2a014
                                                  • Opcode Fuzzy Hash: 5dbef2c0e756209cfb9fc127f82bb29073db9982edaea3d0de072ac830874615
                                                  • Instruction Fuzzy Hash: 50418925A0C68A52EB30AB3995403B9B7A1EF49BC4FC44233DA5D473F5DE2CEA45C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strchr$mallocrealloc
                                                  • String ID: 0123456789-$<DIR>$APM0123456789:
                                                  • API String ID: 359134164-4291660576
                                                  • Opcode ID: 047adec88dde980229124f4fd7082d4da4df1b56da47dff766f1abbd12e4aa1d
                                                  • Instruction ID: ec1e0a3f106c46edf7564f93f28d138ef840f01f8360ae1223a1e20b099d2589
                                                  • Opcode Fuzzy Hash: 047adec88dde980229124f4fd7082d4da4df1b56da47dff766f1abbd12e4aa1d
                                                  • Instruction Fuzzy Hash: F0B14336A0874A86EB34AF39E050339B7A0FB48B48F944636DE4D473B4DF39E558C660
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: malloc$Ioctlsetsockopt
                                                  • String ID: Failed to alloc scratch buffer!$We are completely uploaded and fine
                                                  • API String ID: 3352517165-607151321
                                                  • Opcode ID: e2ceac293bc38cfc6401fe599847d51af5e2f73ddbacb73f764438157330c9ce
                                                  • Instruction ID: 158112cad9c132ab925288ea4c780a6e6a50db775d119ac8d38b34f7f551b377
                                                  • Opcode Fuzzy Hash: e2ceac293bc38cfc6401fe599847d51af5e2f73ddbacb73f764438157330c9ce
                                                  • Instruction Fuzzy Hash: 2DB17532A08B8A85EB75AF38D4443F9B7A1EB48B58F480237CE5D067B5DF389595C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdupmalloc
                                                  • String ID: %s?%s$Failed sending Gopher request
                                                  • API String ID: 111713529-132698833
                                                  • Opcode ID: a013fedfb617cc9a1fc5f7efd404d02ecf69d67da94e41bc437126c761a08cd8
                                                  • Instruction ID: e14740e048883d02fa67c01ba6a37a5b6358fc8275fa22c7c8a195b5015a32df
                                                  • Opcode Fuzzy Hash: a013fedfb617cc9a1fc5f7efd404d02ecf69d67da94e41bc437126c761a08cd8
                                                  • Instruction Fuzzy Hash: C351A921A0DA8A81E635AB7DA8401A9E390FB4D7E4F940333DE6D477F5DE3CD6428714
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                                  • String ID: value
                                                  • API String ID: 1346393832-494360628
                                                  • Opcode ID: 97e38a9986d9bdf8435950d5b4a80c9bd010422f81a48876227f4709c98979ce
                                                  • Instruction ID: e40cf928f27f81146e4524e44cac09a573a654b1cd557db38fa59cf176d845e9
                                                  • Opcode Fuzzy Hash: 97e38a9986d9bdf8435950d5b4a80c9bd010422f81a48876227f4709c98979ce
                                                  • Instruction Fuzzy Hash: F261CB22A18A8985FB20EBBCE4443ED6762FB453A4F401331DA6D46AF5DF7DE195C310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                                  • String ID: value
                                                  • API String ID: 1346393832-494360628
                                                  • Opcode ID: 1df533f3d1511cc28e379b8087a97bc006e143fa80d0134b1a7219debd586b90
                                                  • Instruction ID: 6e8ba5b055941b5a55d58b7be82953a849a28a5ea700872862b57f720905c3d5
                                                  • Opcode Fuzzy Hash: 1df533f3d1511cc28e379b8087a97bc006e143fa80d0134b1a7219debd586b90
                                                  • Instruction Fuzzy Hash: B261C632A18A8985EB20EB7CE8443ED6762EB453A4F504331DA6D06AF5DF7DE291C310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _close$_fstat64_openstrchr
                                                  • String ID: Can't get the size of %s$Can't open %s for writing
                                                  • API String ID: 423814720-3544860555
                                                  • Opcode ID: d58b5c5ccc483598e4832854e43a540fe0e2e1d4e81638e85a20253436b34479
                                                  • Instruction ID: b43c21cb853bb21330dba79500ffac9741143cccc0108a8bde12489763b23361
                                                  • Opcode Fuzzy Hash: d58b5c5ccc483598e4832854e43a540fe0e2e1d4e81638e85a20253436b34479
                                                  • Instruction Fuzzy Hash: 68518661708A8E81EE35BB3994502B9A391FB8CBD0F844237DE5D473B5DE3CE6419720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc$_strdupstrtol
                                                  • String ID: %%%02x
                                                  • API String ID: 2999891020-4020994737
                                                  • Opcode ID: bdf0f05f73a0858c45583dfff4fa5f00b36286e0bbb8b8d5827946e5d5b25b73
                                                  • Instruction ID: df6241e589753f1c41c5eea9ff4f777d2d9be28079a5b3554be057ce81a45b8b
                                                  • Opcode Fuzzy Hash: bdf0f05f73a0858c45583dfff4fa5f00b36286e0bbb8b8d5827946e5d5b25b73
                                                  • Instruction Fuzzy Hash: 1651C212A0D28A45FB76AB399010379AA91DF4D790F880777DA9E0A7F1DE3DE6448331
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc$_strdup
                                                  • String ID: %%%02x
                                                  • API String ID: 1496848336-4020994737
                                                  • Opcode ID: a8ab935ad872045f021220b571eaedcfb8e3157dc64c221794b8d50643bb9222
                                                  • Instruction ID: 2a1e05c5cc967cd29637770d1648a3b814e74c0f3b88b276276258876bfe25b5
                                                  • Opcode Fuzzy Hash: a8ab935ad872045f021220b571eaedcfb8e3157dc64c221794b8d50643bb9222
                                                  • Instruction Fuzzy Hash: C241C51290D68A45FA76AB399014379AB91DF4D750F880777DE9E063F1DE3DE6448330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdupmalloc
                                                  • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                                  • API String ID: 111713529-517259162
                                                  • Opcode ID: d10775beb8856261a6a377fe09b1f7ea7cce4b85b7cdecb8f317ba190c89088c
                                                  • Instruction ID: c6cbf6662a550379d5608a70fffae90d648cef2bb1bb9397d91fc07033cef30d
                                                  • Opcode Fuzzy Hash: d10775beb8856261a6a377fe09b1f7ea7cce4b85b7cdecb8f317ba190c89088c
                                                  • Instruction Fuzzy Hash: 6A316691A0978A45EB25AB7DA4441F9A7626F0D784FC40A37DD0E17376DE3CA3488321
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy
                                                  • String ID:
                                                  • API String ID: 3063020102-0
                                                  • Opcode ID: 25bffaccdbf079d0b25b2b393a5857c2e1190dff62f2c70122fadb49677ce188
                                                  • Instruction ID: d2ba399346ba7105218302176dfbc20fa69848e6ba8fd0ac0265263eb9d1dffc
                                                  • Opcode Fuzzy Hash: 25bffaccdbf079d0b25b2b393a5857c2e1190dff62f2c70122fadb49677ce188
                                                  • Instruction Fuzzy Hash: 83B1D522B18B4985EB20EBB9E4043AD6762EB487A4F804631DE7D07BE5CF3DE255D350
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                                  • API String ID: 1294909896-599393795
                                                  • Opcode ID: 63857b9f88c73a3064a1e0c02ff08f03428f3bc832e62006535a3ca44d91489c
                                                  • Instruction ID: 82b060e47eb091a399f7e72af297717354a0163922a92b563d51d73113f86598
                                                  • Opcode Fuzzy Hash: 63857b9f88c73a3064a1e0c02ff08f03428f3bc832e62006535a3ca44d91489c
                                                  • Instruction Fuzzy Hash: DF61B5A1A0C69A44EB34AB3DA4441B9EBA2EB09784FC44637D94D077B5DF3CE748D320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc$memcpy
                                                  • String ID: Signature: %s$Signature
                                                  • API String ID: 901724546-1663925961
                                                  • Opcode ID: 345c0efb75e5f5e3bfb360a7d56e46c10df3a749cc31020d7aafd10691290c92
                                                  • Instruction ID: d68c0d47c1b32672a11126dee4c8b4d8fadebd38badf417f8245d3c8b160b9ec
                                                  • Opcode Fuzzy Hash: 345c0efb75e5f5e3bfb360a7d56e46c10df3a749cc31020d7aafd10691290c92
                                                  • Instruction Fuzzy Hash: C0512A11A0968A42EE39A73DA4542B9A791FB497E0F844737CA5F077F5EE3CD2498320
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdup
                                                  • String ID:
                                                  • API String ID: 1169197092-0
                                                  • Opcode ID: 47633c79588f7ee5fbe3b141cbb66ca3a80cc9efcd521e0df166b97a8c85c563
                                                  • Instruction ID: e74db3315ae1c0414d079434ab9055e973a68855f3cc4095139b59c6899e8e41
                                                  • Opcode Fuzzy Hash: 47633c79588f7ee5fbe3b141cbb66ca3a80cc9efcd521e0df166b97a8c85c563
                                                  • Instruction Fuzzy Hash: 1C517622A1AB4182EB65CF69F041128B7A4FB48F84B481136EF9D03765EF38F5E18750
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                                                  • API String ID: 1294909896-3876350232
                                                  • Opcode ID: 78f50a21b7f34b2d023b796abcd60e340b68c6140382275490a97a3042a013e5
                                                  • Instruction ID: 416307fa3f3ce89030381486572cf7f055969c5d50fe61557b30903648460f89
                                                  • Opcode Fuzzy Hash: 78f50a21b7f34b2d023b796abcd60e340b68c6140382275490a97a3042a013e5
                                                  • Instruction Fuzzy Hash: 78516361A0D78A84EB24AB7DA4401F9E762BB09784FC84637DA4D17375DF3CE7488320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$mallocmemcpy
                                                  • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                                  • API String ID: 3401966785-2901970132
                                                  • Opcode ID: 6033982258b0eef9005531746be83ee8e6b9dd8905cea50568e3603bd33cd3c7
                                                  • Instruction ID: fdc7e0579f9e46e5f3d55d86f0c6286a4bd61270d577ecf5b737b35a555a796d
                                                  • Opcode Fuzzy Hash: 6033982258b0eef9005531746be83ee8e6b9dd8905cea50568e3603bd33cd3c7
                                                  • Instruction Fuzzy Hash: 49418261A0878A55EA25AB7DA8441F9A7A2BF0D794FC40637CD1D077B5EE3CA3088320
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 1e9cdfff36ca690872912e0e694f6311f5828980c35702adb4f25b4d88f6cc40
                                                  • Instruction ID: 13add519591d6a101410ddf4aee5aad3c8745db5b7d2a7375c04224967e1e71e
                                                  • Opcode Fuzzy Hash: 1e9cdfff36ca690872912e0e694f6311f5828980c35702adb4f25b4d88f6cc40
                                                  • Instruction Fuzzy Hash: 28413D22908B56C2E771EF799480228B7A4FB8DF94F844236DA8D57374CF38DA90C760
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 2235685d1bd13b24c76ffc2ea7d855fa4edaccd02b99331bdd79d568c78d06ab
                                                  • Instruction ID: 66a94c46924657734d20eff6edf06b74584f4ce0f13ef6e6419af0a65378e91b
                                                  • Opcode Fuzzy Hash: 2235685d1bd13b24c76ffc2ea7d855fa4edaccd02b99331bdd79d568c78d06ab
                                                  • Instruction Fuzzy Hash: B6312D36A08A55C2D720AF26E845129B360FB89FD4F880132DEAD03B78CF7CE545C710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 734636d28ebe92a552abe8424702d892e2a077f184f451bb8255f658a3df093b
                                                  • Instruction ID: 2b4dc00f21fe0766a1cdc01231292a08ef07405679a5bb6f6a8f3adf1a469f20
                                                  • Opcode Fuzzy Hash: 734636d28ebe92a552abe8424702d892e2a077f184f451bb8255f658a3df093b
                                                  • Instruction Fuzzy Hash: EA017925614A05C2DB24AF36ED95028A321FF8CF95B841132CD9E43774CE7CE999C360
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$mallocmemcpymemset
                                                  • String ID:
                                                  • API String ID: 1579693990-0
                                                  • Opcode ID: acd390c1a12e34a85b50b4d437532fee1f9e274726e5f98373e38d2a703eb18b
                                                  • Instruction ID: 392fecb0ed8c6e7ed2dafd26bd9ada069f946757a7232e7301af507f2eda73d1
                                                  • Opcode Fuzzy Hash: acd390c1a12e34a85b50b4d437532fee1f9e274726e5f98373e38d2a703eb18b
                                                  • Instruction Fuzzy Hash: D191C751B0C74A42FE78BA3A6491379E2A1AF49BC4F84413ADE5D477B5DF2CF6058320
                                                  APIs
                                                  • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF79B708FA8), ref: 00007FF79B7090F5
                                                  • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF79B708FA8), ref: 00007FF79B70910F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strncmp
                                                  • String ID: I32$I64$Internal error removing splay node = %d
                                                  • API String ID: 1114863663-13178787
                                                  • Opcode ID: bd4a6c465e0bce7c2a912e253289e6a8022db79ca8432d680972d7c5c4570fb2
                                                  • Instruction ID: 04e4b5ec050ecdcb7a4ed24b4d4c77044e96261858bc736b73fcd3f28e81666a
                                                  • Opcode Fuzzy Hash: bd4a6c465e0bce7c2a912e253289e6a8022db79ca8432d680972d7c5c4570fb2
                                                  • Instruction Fuzzy Hash: EDA17332A1864685E731AB29D85877DBBB4FB49B48F854237CA9D422B4DF3CD308C750
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                                  • API String ID: 1294909896-116363806
                                                  • Opcode ID: 04335c42e9716a653529e3186ffeb2a35cc4dcf0e502c88fabcf4ef4218a83d3
                                                  • Instruction ID: d0e8817d6bc6808f8a2434e3341a21de405a3ca97d06b73e8aa0da4279f3578c
                                                  • Opcode Fuzzy Hash: 04335c42e9716a653529e3186ffeb2a35cc4dcf0e502c88fabcf4ef4218a83d3
                                                  • Instruction Fuzzy Hash: 47915A32604B8986EB20DF29D8846AE77B5FB88B85F840636CE4D47774DF38D645CB20
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdup
                                                  • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                                  • API String ID: 1169197092-2292467869
                                                  • Opcode ID: 3875f451a44e613a8e67258952ab03e6a0daf9c8b0667900e878cf160189b3a0
                                                  • Instruction ID: 403c1352db81792f1de8c82c79b8b7a3407b1977db8453a065681cec1d2bc951
                                                  • Opcode Fuzzy Hash: 3875f451a44e613a8e67258952ab03e6a0daf9c8b0667900e878cf160189b3a0
                                                  • Instruction Fuzzy Hash: 87618322E0C78A45FF75AB39944A37AA7A2EF56754F840136CB9D026F1DF2CF6448360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdup$strchr
                                                  • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                                  • API String ID: 3404610657-2292467869
                                                  • Opcode ID: 0d0281a6a9d33203c78245d65f35b1779298f9b59731c09605da70b9a7b7bc01
                                                  • Instruction ID: 0105d8aaf658263b68a907787e34b0fff26d2a3f7f99a960b62adc6c1838523f
                                                  • Opcode Fuzzy Hash: 0d0281a6a9d33203c78245d65f35b1779298f9b59731c09605da70b9a7b7bc01
                                                  • Instruction Fuzzy Hash: 72618262E0C78A45FF75AB39944937AA7A2EF56754F880036CB9D026F1DF2CF6448360
                                                  APIs
                                                  • memcpy.VCRUNTIME140(?,?,?,00007FF79B6E1DBA), ref: 00007FF79B6E5E61
                                                  • memcpy.VCRUNTIME140(?,?,?,00007FF79B6E1DBA), ref: 00007FF79B6E5EA5
                                                  • memcpy.VCRUNTIME140(?,?,?,00007FF79B6E1DBA), ref: 00007FF79B6E5EBD
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF79B6E1DBA), ref: 00007FF79B6E5F42
                                                    • Part of subcall function 00007FF79B73F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF79B6E43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B73F20A
                                                  • memcpy.VCRUNTIME140(?,?,?,00007FF79B6E1DBA), ref: 00007FF79B6E5F74
                                                  • memcpy.VCRUNTIME140(?,?,?,00007FF79B6E1DBA), ref: 00007FF79B6E5F8F
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF79B6E5FAC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                                  • String ID:
                                                  • API String ID: 1155477157-0
                                                  • Opcode ID: 294cce447d60880335344067cce1c8243e8d16be0f0136f9d3ef8275642a61a9
                                                  • Instruction ID: 343c9b3117ab1536bfce1bf85cdf874efa5ad897ce2f55c0aa1f08922a7280e1
                                                  • Opcode Fuzzy Hash: 294cce447d60880335344067cce1c8243e8d16be0f0136f9d3ef8275642a61a9
                                                  • Instruction Fuzzy Hash: 7551B032A04B8981EB24AF79A504269A362FB15BD4F944A31DF3D073E1CF79F2A5C350
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strstr
                                                  • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                                                  • API String ID: 1392478783-2096918210
                                                  • Opcode ID: 2ce98bc489eaaa130b1f53256a2192507bea2260cd7937c79d1f3d34b8a997a0
                                                  • Instruction ID: 1f48bd5852fdb8072d4540cbc4f2a94bf9dbea68e66954e2ef287f34fa2a246f
                                                  • Opcode Fuzzy Hash: 2ce98bc489eaaa130b1f53256a2192507bea2260cd7937c79d1f3d34b8a997a0
                                                  • Instruction Fuzzy Hash: B351C862A0868E45EB35AA7DA4442B8E291EB49774FC50333DA5D026F1DF7CD6818730
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freememcpy$malloc
                                                  • String ID: Failed to alloc scratch buffer!
                                                  • API String ID: 169112436-1446904845
                                                  • Opcode ID: 3c4ee3d818aefcc12f05579da5f42aec1d72f971d4148dd9a8586e3dbcbacbf3
                                                  • Instruction ID: 9ac652203a1c12a8ca75aafaa9a1d7eff2cb0bdd2dd47be3610413aed625f18a
                                                  • Opcode Fuzzy Hash: 3c4ee3d818aefcc12f05579da5f42aec1d72f971d4148dd9a8586e3dbcbacbf3
                                                  • Instruction Fuzzy Hash: AF518F6261878596EA359B79E4402AAB7A5FB09B84F840236DF8D07775DF3CE254C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc
                                                  • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                                                  • API String ID: 2190258309-3231818857
                                                  • Opcode ID: ed2e198dcc3b011cc1bfcec88ea1bc6807998eeb1b1d636bf5459b77496cbc5e
                                                  • Instruction ID: 0bedbef89e0251958f6f090a4f7904e40a1ee5509609fcf206bf3ce604d4c11c
                                                  • Opcode Fuzzy Hash: ed2e198dcc3b011cc1bfcec88ea1bc6807998eeb1b1d636bf5459b77496cbc5e
                                                  • Instruction Fuzzy Hash: 2951B362A0C6CA95EA319B38A4446B9F7A5FB49B90FD44633DA8D03774DF3CD649C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastfreememcpy
                                                  • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout!
                                                  • API String ID: 1248052217-2335292235
                                                  • Opcode ID: ce28b440fd80e79cfb3aed570fb15752ff3ab504073fe0e5eae86e39c7bb4890
                                                  • Instruction ID: d241b4da487f47c3dd13f4cd2789fddff3be3a3a36caf671168704f741bb67a3
                                                  • Opcode Fuzzy Hash: ce28b440fd80e79cfb3aed570fb15752ff3ab504073fe0e5eae86e39c7bb4890
                                                  • Instruction Fuzzy Hash: 5751B612B0C68A89FB74AA3D94443B99291FB497A4F854337DE4D872F2EE2CD7458320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Digest$stale$true
                                                  • API String ID: 1294909896-2487968700
                                                  • Opcode ID: 9c368709f1f09b1f824c1af219295fc4c46f9f3305e656098ea766e5a388719d
                                                  • Instruction ID: 69c344266e97e15c38fd218dfcc5f5604f27e96f598ce7ecd4327cb550678e8b
                                                  • Opcode Fuzzy Hash: 9c368709f1f09b1f824c1af219295fc4c46f9f3305e656098ea766e5a388719d
                                                  • Instruction Fuzzy Hash: 3E515521A08A4A81EA30AF79F950379A3A1FF4C784F944233DA9D476F1DF2CD659C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memchrmemcpyrecvfrom
                                                  • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                                  • API String ID: 3107918033-477593554
                                                  • Opcode ID: d3f428e3e3a515e8a76563d932edcfca6e7b97f94956f80ba8286d8b94d8e803
                                                  • Instruction ID: 55e5c5df996dd1aab9aa499bb1dd7be7078847fa962daff85f2e6f2a45edd90f
                                                  • Opcode Fuzzy Hash: d3f428e3e3a515e8a76563d932edcfca6e7b97f94956f80ba8286d8b94d8e803
                                                  • Instruction Fuzzy Hash: 8E51F671A0858A85EB78AF3998513B9B390FB49B84F844233DE4D477B5DE3CE645C720
                                                  APIs
                                                    • Part of subcall function 00007FF79B6E6DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF79B6E23CB), ref: 00007FF79B6E6E4E
                                                    • Part of subcall function 00007FF79B6E6DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF79B6E23CB), ref: 00007FF79B6E6E5C
                                                    • Part of subcall function 00007FF79B6E6DD0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF79B6E23CB), ref: 00007FF79B6E6E72
                                                    • Part of subcall function 00007FF79B6E3BB0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF79B6E1D8B), ref: 00007FF79B6E3BF6
                                                    • Part of subcall function 00007FF79B6E5DD0: memcpy.VCRUNTIME140(?,?,?,00007FF79B6E1DBA), ref: 00007FF79B6E5E61
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2469
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E24A8
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E24F6
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF79B6E2544
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                                                  • String ID: at line $, column
                                                  • API String ID: 2665656946-191570568
                                                  • Opcode ID: 890430c40e95218a1fdb9aaefb85cacc871825cb6ea1bef2638f859bbf7e9c6c
                                                  • Instruction ID: 39fa2d923f72c625a4638da98a0d123991fe8a85fae4b2c2eff4fc259f97cd47
                                                  • Opcode Fuzzy Hash: 890430c40e95218a1fdb9aaefb85cacc871825cb6ea1bef2638f859bbf7e9c6c
                                                  • Instruction Fuzzy Hash: 9E519362B04A4985FB10EBB8E5443AC6323EB447E8F405331DA6D13BF9DE39E6959350
                                                  APIs
                                                  • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,00000000,?,?,00007FF79B6E314B,?,?,?,00007FF79B6E3104), ref: 00007FF79B6E4A93
                                                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF79B6E314B,?,?,?,00007FF79B6E3104), ref: 00007FF79B6E4AE7
                                                  • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,00000000,?,?,00007FF79B6E314B,?,?,?,00007FF79B6E3104), ref: 00007FF79B6E4B0E
                                                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF79B6E314B,?,?,?,00007FF79B6E3104), ref: 00007FF79B6E4B36
                                                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,00000000,?,?,00007FF79B6E314B,?,?,?,00007FF79B6E3104), ref: 00007FF79B6E4B7C
                                                  • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,00000000,?,?,00007FF79B6E314B,?,?,?,00007FF79B6E3104), ref: 00007FF79B6E4B83
                                                  • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,00000000,?,?,00007FF79B6E314B,?,?,?,00007FF79B6E3104), ref: 00007FF79B6E4B90
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                                                  • String ID:
                                                  • API String ID: 1492985063-0
                                                  • Opcode ID: 0c3c29c63cd06146ca5ecee81e73198a965743d98a4285f15d7b0596151f576b
                                                  • Instruction ID: 78a4165e8f4cb7af0739e3016c4ecaffb6cbcd06ae4030cc6ced4a25d8faa5e9
                                                  • Opcode Fuzzy Hash: 0c3c29c63cd06146ca5ecee81e73198a965743d98a4285f15d7b0596151f576b
                                                  • Instruction Fuzzy Hash: FF51862260864581EB309F7ED18023CE7A2EB84F95F55C235CA6E437B4CF3EE6568714
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                                  • API String ID: 1294909896-1255959952
                                                  • Opcode ID: e970562c74868112c6df1a03012bf8c95489708dae6951303b259dec22d0baf0
                                                  • Instruction ID: a79b3ced3e242f19e5f7820878c640e206209247384c061b57c2fc733d0e71ce
                                                  • Opcode Fuzzy Hash: e970562c74868112c6df1a03012bf8c95489708dae6951303b259dec22d0baf0
                                                  • Instruction Fuzzy Hash: 8F51C82290864A96FB21DB39E4803FDA791FB45B54F880133DA4D436B1DF3DE659C361
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc$_strdup
                                                  • String ID: %%%02x
                                                  • API String ID: 1941130848-4020994737
                                                  • Opcode ID: 86de3d7c9fee03b22631dcbbad5bbc54ee5ca30d69bbecc19bfd3f20b0975ccf
                                                  • Instruction ID: 1509e78396314216701c5597adefcbed1b290d3f1491bc5d670d3504f537cf7c
                                                  • Opcode Fuzzy Hash: 86de3d7c9fee03b22631dcbbad5bbc54ee5ca30d69bbecc19bfd3f20b0975ccf
                                                  • Instruction Fuzzy Hash: 2141C21290D2CA45FA76AB399010379AA91EF4D794F880777DA9E0A3F1DE3DE6048330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc$_strdup
                                                  • String ID: %%%02x
                                                  • API String ID: 1941130848-4020994737
                                                  • Opcode ID: e87370a5869864d495002ca49e55217450b4e01ac38c04b7491b294906ca183f
                                                  • Instruction ID: 9794f8a1507f576a82e71968a6100cf9fdff598b6a4150102b9bcf8e8c4509d4
                                                  • Opcode Fuzzy Hash: e87370a5869864d495002ca49e55217450b4e01ac38c04b7491b294906ca183f
                                                  • Instruction Fuzzy Hash: DC41D20290D2CA45FA76AB399014379AA91DF0D790F880777DA9E0A3F1DE3DE6448330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc$_strdup
                                                  • String ID: %%%02x
                                                  • API String ID: 1941130848-4020994737
                                                  • Opcode ID: 9dce3a1e02d3dd0decdb27a30e4dbabf375221b931b30d07f11530cfea0de688
                                                  • Instruction ID: a5917352a2d9d259b52ba581499ad6b760e8e1590dc2ae089fef16dc52bdc8c9
                                                  • Opcode Fuzzy Hash: 9dce3a1e02d3dd0decdb27a30e4dbabf375221b931b30d07f11530cfea0de688
                                                  • Instruction Fuzzy Hash: 1741D30290D28A45FA76AB399014379AA91DF0D790F880777DE9E0A3F1EE3DE6448330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc$_strdup
                                                  • String ID: %%%02x
                                                  • API String ID: 1941130848-4020994737
                                                  • Opcode ID: eb8acf01f820f75c68904246a9ece804f2211bd47c51cec25c3a42db63dbcaa7
                                                  • Instruction ID: 480bab8ec164b447c4802cdf1a94e2048977fc250875f99b7855482db7dbb757
                                                  • Opcode Fuzzy Hash: eb8acf01f820f75c68904246a9ece804f2211bd47c51cec25c3a42db63dbcaa7
                                                  • Instruction Fuzzy Hash: 7941C31290D2DA45FA76AB399014379AA91DF0D790F880777DE9E0A3F1DE3DE6448331
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc$_strdup
                                                  • String ID: %%%02x
                                                  • API String ID: 1941130848-4020994737
                                                  • Opcode ID: e7d4bbfd5b38bbbd6d8bf0e475cbd4f94a9fc81eb8a3b1b531cbd017f784b84c
                                                  • Instruction ID: e6c8f41f76e21c247c0bb90f5e6764ca29eedbef0c223b7ea1599265bc3463a9
                                                  • Opcode Fuzzy Hash: e7d4bbfd5b38bbbd6d8bf0e475cbd4f94a9fc81eb8a3b1b531cbd017f784b84c
                                                  • Instruction Fuzzy Hash: 2E41C31290D29A45FA76AB395014379AA91DF0D790F880777DE9E0A3F1DE3DE6448331
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc$_strdup
                                                  • String ID: %%%02x
                                                  • API String ID: 1941130848-4020994737
                                                  • Opcode ID: eeb42b2a52bbdab434df15e2a6555f120b688906af1e5a0ec8f7357212fa5c02
                                                  • Instruction ID: 58f67c1158b7985940847b508a1732e10f688ac41fc3958ba6a3e51c8ad54aa8
                                                  • Opcode Fuzzy Hash: eeb42b2a52bbdab434df15e2a6555f120b688906af1e5a0ec8f7357212fa5c02
                                                  • Instruction Fuzzy Hash: 0141C312D0D29A45FA76AB395014379AA91DF0D790F880777DE9E0A3F1DE3DE6448331
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc$_strdup
                                                  • String ID: %%%02x
                                                  • API String ID: 1941130848-4020994737
                                                  • Opcode ID: 89f36e15c459582ef8a19abe2e0c0d18899e06bfa663bf0be4ff2b53d824261c
                                                  • Instruction ID: 95ec6b1a3fa62120a85d5d7b6c4ec4ff2d356a9727cd3decc85d9ea4e372613e
                                                  • Opcode Fuzzy Hash: 89f36e15c459582ef8a19abe2e0c0d18899e06bfa663bf0be4ff2b53d824261c
                                                  • Instruction Fuzzy Hash: B241C41290D29A45FA76AB399014379AB91DF0D790F880777DE9E0A3F1DE3DE6448331
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _time64
                                                  • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                                  • API String ID: 1670930206-870032562
                                                  • Opcode ID: 816daf6425511fafc4144085c150fa208d6ed39076a45b0587e0b95dc59eac6e
                                                  • Instruction ID: c9356d16446bb66cc0db7eb64bfed7d2799bf634e454435096448a9be3628408
                                                  • Opcode Fuzzy Hash: 816daf6425511fafc4144085c150fa208d6ed39076a45b0587e0b95dc59eac6e
                                                  • Instruction Fuzzy Hash: A241A276B1465986DB34DF3EE040568A7A4F79CB88F905133DE0C87BA4DE39E681CB40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strchr
                                                  • String ID: 100-continue$Expect$Expect:$Expect: 100-continue
                                                  • API String ID: 2830005266-711804848
                                                  • Opcode ID: 9df210bce6356ebbc1900224a2991696d1098ea7454d5676cb9223a8ecd7a2ea
                                                  • Instruction ID: b9644dc83a661068a2442034d06fc5ca301874243a4e93411c75ac11b1766693
                                                  • Opcode Fuzzy Hash: 9df210bce6356ebbc1900224a2991696d1098ea7454d5676cb9223a8ecd7a2ea
                                                  • Instruction Fuzzy Hash: 7D41DD2170C68A85EA74EB3EA4411B8E391DF8EB84F88017ADA4D07776DD1DE7458B30
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: fseek
                                                  • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                                  • API String ID: 623662203-959247533
                                                  • Opcode ID: 42c73441279c7bc3c13bc8b1da7d29b7dc595c7bd794b2308826b465c98e32a3
                                                  • Instruction ID: cbe5ff955e5f5fb5dbf3f9eca013ae7aa7b4af98b5175514d59d7743d6fa1281
                                                  • Opcode Fuzzy Hash: 42c73441279c7bc3c13bc8b1da7d29b7dc595c7bd794b2308826b465c98e32a3
                                                  • Instruction Fuzzy Hash: 9341A961B1864942F764EF3D98443B857A2FB88B94F881133DE0D4B7B9DE3DE5858720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc
                                                  • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                                                  • API String ID: 2190258309-3662781045
                                                  • Opcode ID: 3423c50565629b261c04f200d569919f8545122c186ea242b1492fb3335ace71
                                                  • Instruction ID: 84f55272227b6dc52f27e7f215e7bc58fb181ee7609899c71155552353ff6282
                                                  • Opcode Fuzzy Hash: 3423c50565629b261c04f200d569919f8545122c186ea242b1492fb3335ace71
                                                  • Instruction Fuzzy Hash: D9417262A09A8A91EA31AB39E4401B9E3A1FB49794FD40633DA4D07775DF3CD649C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                                  • API String ID: 1294909896-659367561
                                                  • Opcode ID: 3a79513afe6aea4f96036019143dff1e5783e73f1d6728b543c147c9c275da5b
                                                  • Instruction ID: d2f220f552758375885f21d15c383dcdb491c7bffc764abaa295e5fca99f066b
                                                  • Opcode Fuzzy Hash: 3a79513afe6aea4f96036019143dff1e5783e73f1d6728b543c147c9c275da5b
                                                  • Instruction Fuzzy Hash: D2417551B0D78A45EE35AB7DA4441F9A7A2AB0D784FC44A37DE0E07776DE3DE2488320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfree
                                                  • String ID: .
                                                  • API String ID: 1865132094-916926321
                                                  • Opcode ID: 56123e3a473889bf9ea8c9488b22fdc8ba33d670e3acbcf3f2f06b941ca91a8c
                                                  • Instruction ID: d20479b5bb1fb2ecce9331cc76d53c3938c0468ff84f5fb250ef361e065290e5
                                                  • Opcode Fuzzy Hash: 56123e3a473889bf9ea8c9488b22fdc8ba33d670e3acbcf3f2f06b941ca91a8c
                                                  • Instruction Fuzzy Hash: F241B722A08B4986E630EB399800279F294FB8DB50F844633EA0D4B675DF7CF6458370
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$mallocmemcpy
                                                  • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                                  • API String ID: 3401966785-517259162
                                                  • Opcode ID: 460a80e6cf153cb36f8422525b8caca0178bcd542308400b50d5b32dc07c46c2
                                                  • Instruction ID: 4de267b69073b2e6fc05af6999bff25ab4433e8734b669d98350600b33457f98
                                                  • Opcode Fuzzy Hash: 460a80e6cf153cb36f8422525b8caca0178bcd542308400b50d5b32dc07c46c2
                                                  • Instruction Fuzzy Hash: 93417291B0978A45EB25AB7DA4441B9A762BF09B88FC44637CD0E1B775DE3CE7488320
                                                  APIs
                                                    • Part of subcall function 00007FF79B71BF40: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B7004B9,?,?,?,?,00007FF79B6FF85B), ref: 00007FF79B71BF68
                                                    • Part of subcall function 00007FF79B71BF40: GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF79B7004B9,?,?,?,?,00007FF79B6FF85B), ref: 00007FF79B71BF8E
                                                    • Part of subcall function 00007FF79B71BF40: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B7004B9,?,?,?,?,00007FF79B6FF85B), ref: 00007FF79B71BFAF
                                                    • Part of subcall function 00007FF79B71BF40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B7004B9,?,?,?,?,00007FF79B6FF85B), ref: 00007FF79B71BFC0
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B7304CF
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B730518
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B730521
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$realloc$EnvironmentVariable
                                                  • String ID: %s%s.netrc$%s%s_netrc$HOME
                                                  • API String ID: 4174189579-3384076093
                                                  • Opcode ID: 54c11f7cbaf3faf9c12b184cb10970793f3f21641160a230d0a02d4eafe50fe1
                                                  • Instruction ID: b1978b59654e545a93ca20bebcf37a38899d6d0fd904faacb3daa367e3220925
                                                  • Opcode Fuzzy Hash: 54c11f7cbaf3faf9c12b184cb10970793f3f21641160a230d0a02d4eafe50fe1
                                                  • Instruction Fuzzy Hash: 48316521A09B4991DA30EB3AB84056AE2A5BF4CFD4F840233ED4D47775EF3CE6498720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc$memcpy
                                                  • String ID: Signature: %s$Signature
                                                  • API String ID: 3519880569-1663925961
                                                  • Opcode ID: fb3880e822f44cd4eb53f69da3d9ae151aad4d879054bdaf5fecb74b28bac563
                                                  • Instruction ID: 4135f87b73ed3b90716ef32f3de3f6a9dfb420870946a58ae5da8b7aeacf14b5
                                                  • Opcode Fuzzy Hash: fb3880e822f44cd4eb53f69da3d9ae151aad4d879054bdaf5fecb74b28bac563
                                                  • Instruction Fuzzy Hash: DA31A965B0978641EE75AB39A4442B9E391BF8DBD4F840633CE5D07775EE3CD2458310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: __stdio_common_vsscanf_strdupfree
                                                  • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                                  • API String ID: 860312144-3309259123
                                                  • Opcode ID: 5a4ee0cb38acc090a0fbedc4f51c1d267081722fb7daa94e28cba8e938d1c70d
                                                  • Instruction ID: 93873d3fc3ceabbfdcd6c78beb4cfe1ae4228d4134eda76c3399dcbf40379333
                                                  • Opcode Fuzzy Hash: 5a4ee0cb38acc090a0fbedc4f51c1d267081722fb7daa94e28cba8e938d1c70d
                                                  • Instruction Fuzzy Hash: D0314C32E0D65A86EA74FB3894401B9A361BB88794FD00633CA4E17271DF2CEA528371
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfree
                                                  • String ID: Start Date: %s$FALSE$Start Date$TRUE
                                                  • API String ID: 1865132094-176635895
                                                  • Opcode ID: ae907500a812d25586cfa41279ce18986c9e2021419cb2cd90361f473d061923
                                                  • Instruction ID: ae96c2af4901774cc3e752089c9de52a9c23d71a7231d45199bed27e8af761de
                                                  • Opcode Fuzzy Hash: ae907500a812d25586cfa41279ce18986c9e2021419cb2cd90361f473d061923
                                                  • Instruction Fuzzy Hash: CB216292A096CA95EB359B39A4446B5A762BB09B94FC44633CA4D07775DF3CE2888320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc$_strdup
                                                  • String ID: Signature: %s$Signature
                                                  • API String ID: 1941130848-1663925961
                                                  • Opcode ID: a68dbb86ef700e451aeb603a4cad13e7e7929bfbccc6980a137ba8f38b9cdaa9
                                                  • Instruction ID: 20eaee53e4b7fa641441fff3ae8989a537b35292948e8982cff171a37864d7f6
                                                  • Opcode Fuzzy Hash: a68dbb86ef700e451aeb603a4cad13e7e7929bfbccc6980a137ba8f38b9cdaa9
                                                  • Instruction Fuzzy Hash: 21214866A08A8682EA719B39A4442AAA365FF89794F840533DE4D17735DF3CD245C710
                                                  APIs
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B702856), ref: 00007FF79B6FF061
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B702856), ref: 00007FF79B6FF071
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B702856), ref: 00007FF79B6FF07F
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B702856), ref: 00007FF79B6FF08D
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B702856), ref: 00007FF79B6FF09B
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B702856), ref: 00007FF79B6FF0A9
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B702856), ref: 00007FF79B6FF0B7
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B702856), ref: 00007FF79B6FF0C5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 8c00d13d1d1400f5b02d6f8230e4e97fdd4fc61512994be1568aed62c2dc6e4e
                                                  • Instruction ID: a3ca7a1e9906470742ae05e44174b70f799d49b157ea31fb12b135aa7f5aa50e
                                                  • Opcode Fuzzy Hash: 8c00d13d1d1400f5b02d6f8230e4e97fdd4fc61512994be1568aed62c2dc6e4e
                                                  • Instruction Fuzzy Hash: 20018336508B05C2D714AF35E9D513CB3B4FB8CF997901226CE9E42728CF78D5A9C260
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memcmpmemcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                                  • String ID:
                                                  • API String ID: 2846809682-0
                                                  • Opcode ID: 49b5f4042f119bf13c2d0537c53921af1756849f60883125eca213191498a486
                                                  • Instruction ID: b3b8f7c6ea0f4c4d436870496aa410c98988737038907266a2d73b0c83ff19cf
                                                  • Opcode Fuzzy Hash: 49b5f4042f119bf13c2d0537c53921af1756849f60883125eca213191498a486
                                                  • Instruction Fuzzy Hash: 46A1F822604A8986EB20EF69D444269A362FB48BD4F944535DFAD077E5DF3DF2A1C310
                                                  APIs
                                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF79B70299B), ref: 00007FF79B702137
                                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF79B70299B), ref: 00007FF79B702168
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: calloc
                                                  • String ID:
                                                  • API String ID: 2635317215-0
                                                  • Opcode ID: bc82dee56741fcdb2a61ea5e49477a01e532ce5743e5ef1c6ec771a3a7dfbefc
                                                  • Instruction ID: 42a5d42ad82b417315087a6eb5c044c29bfab0ea94d5e297b36238387a93bf89
                                                  • Opcode Fuzzy Hash: bc82dee56741fcdb2a61ea5e49477a01e532ce5743e5ef1c6ec771a3a7dfbefc
                                                  • Instruction Fuzzy Hash: 67917026609BC589D7559F7898403A9B7A0F759B28F480336CFAC073E5DF2992A4C731
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$mallocmemcpy
                                                  • String ID: Start Date: %s$Start Date
                                                  • API String ID: 3401966785-2389359183
                                                  • Opcode ID: 43c8fc675016b9b2ceeb9040cc625f4d7a15d27ad60510833526c650f4f11900
                                                  • Instruction ID: 00fb78a2960e6083e806b3f73b46982c720e3170818dcfc2745f80c377fe3140
                                                  • Opcode Fuzzy Hash: 43c8fc675016b9b2ceeb9040cc625f4d7a15d27ad60510833526c650f4f11900
                                                  • Instruction Fuzzy Hash: EE416A51A092CA52EF3C673D9054679AB52EB0DBA1F844737CA2F077F1ED2CE2488320
                                                  APIs
                                                  • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF79B6E3C25,?,?,?,?,?,00007FF79B6E1D8B), ref: 00007FF79B6E4FA3
                                                  • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF79B6E3C25,?,?,?,?,?,00007FF79B6E1D8B), ref: 00007FF79B6E4FB1
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,0000000F,00007FF79B6E3C25,?,?,?,?,?,00007FF79B6E1D8B), ref: 00007FF79B6E4FEA
                                                  • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF79B6E3C25,?,?,?,?,?,00007FF79B6E1D8B), ref: 00007FF79B6E4FF4
                                                  • memcpy.VCRUNTIME140(?,?,00000000,?,?,0000000F,00007FF79B6E3C25,?,?,?,?,?,00007FF79B6E1D8B), ref: 00007FF79B6E5002
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF79B6E5031
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 1775671525-0
                                                  • Opcode ID: 42d60c75d1112fdc259fec253ef63a0733e48c8f420e9c4017af811e9afa4f59
                                                  • Instruction ID: 71c7be656af4eeeddfd4e5ade0cade019cc0f6186b2c779b04fbae07e49d56c6
                                                  • Opcode Fuzzy Hash: 42d60c75d1112fdc259fec253ef63a0733e48c8f420e9c4017af811e9afa4f59
                                                  • Instruction Fuzzy Hash: F541D42270964985EA34AB7AA90426DE352AB48FE4F940735DF7D0BBE5CE3DF2518310
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupstrchr$mallocstrncpy
                                                  • String ID:
                                                  • API String ID: 2121287944-0
                                                  • Opcode ID: 23a04994a60635d3b02b638b8d77e01a4870b3d6c760ab4438332988ab63ab11
                                                  • Instruction ID: 7e1faa5c94229682a094deefa88dc161508163cb361ffb52aab41ef7ecc1a6f7
                                                  • Opcode Fuzzy Hash: 23a04994a60635d3b02b638b8d77e01a4870b3d6c760ab4438332988ab63ab11
                                                  • Instruction Fuzzy Hash: 93317421A09B8586EA65EF666840279F6A1AB4DBD0F485736DE8E037B5DF3CE2448310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                                  • API String ID: 1294909896-517259162
                                                  • Opcode ID: 2dab462f5145bc0738b088c235cea5b0e6c2d607e6670f6eefb5e99da21a05ee
                                                  • Instruction ID: 7e852cb747d789c4f212695596a56a32f9cc99f402fe291c9872c2194ceb7411
                                                  • Opcode Fuzzy Hash: 2dab462f5145bc0738b088c235cea5b0e6c2d607e6670f6eefb5e99da21a05ee
                                                  • Instruction Fuzzy Hash: C8418A61B0878A45EB25AB7994441F9A761BB0DBC8F884637DD0E17775DE3CD3488320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: callocfreememcpystrchr
                                                  • String ID: CAPA$Got unexpected pop3-server response
                                                  • API String ID: 2887963327-1591402739
                                                  • Opcode ID: 201f3c32be0abebb09fcfe128f2889ecaff817daab1915a220306004f407a3d4
                                                  • Instruction ID: 61c74cb6561b54c1a71cb49efc0b74e0be109ad9acf203922672e28cfa15bf2b
                                                  • Opcode Fuzzy Hash: 201f3c32be0abebb09fcfe128f2889ecaff817daab1915a220306004f407a3d4
                                                  • Instruction Fuzzy Hash: 5631B661B0D78A51EA25EB3D90442B9A291BB8A790F800B37CA1E172F1CF3CF655C331
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc
                                                  • String ID: Signature: %s$%s%lx$Signature
                                                  • API String ID: 2190258309-1406629954
                                                  • Opcode ID: 77be2812b9aa8131dd145d23130a352d1c51842506ecc649404dfcaa3bb354b8
                                                  • Instruction ID: 0757b4c393eb9b0a4877bbe27939640d5faa28235f13455cc0381bd7abf69fec
                                                  • Opcode Fuzzy Hash: 77be2812b9aa8131dd145d23130a352d1c51842506ecc649404dfcaa3bb354b8
                                                  • Instruction Fuzzy Hash: CE31A762B0868A85EE30AB3DE4442B9A7A1FB4D794FD40633DE4D07775EE3DD2448760
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupcallocfree
                                                  • String ID:
                                                  • API String ID: 1236595397-0
                                                  • Opcode ID: dbe26967cade26745424e45a6319db95d222da19376eea92ed94aec5f69a9b41
                                                  • Instruction ID: ac451ad0ea82cff55168579f98cacc20dfe32b0f316752aab03bd6effc8e4a92
                                                  • Opcode Fuzzy Hash: dbe26967cade26745424e45a6319db95d222da19376eea92ed94aec5f69a9b41
                                                  • Instruction Fuzzy Hash: CB31DB32A05B8982EB61DB38D45037DB3A0EB8AB84F980132DE4D077B4DF3DD6459720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                                  • API String ID: 1294909896-517259162
                                                  • Opcode ID: 6747ec776cf2ce8da402bad2bb84dfc54471b3caf19a89f9e193f5818a58486c
                                                  • Instruction ID: eb3d708ff8798c7c3826df223dfe1a97c56eac77ca258a2f0d297217181154f8
                                                  • Opcode Fuzzy Hash: 6747ec776cf2ce8da402bad2bb84dfc54471b3caf19a89f9e193f5818a58486c
                                                  • Instruction Fuzzy Hash: A9317591A0978A45EB25AB7DA4440F9A761AF0D784FC40A37DD4E07376DE3DE3488320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc
                                                  • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                                  • API String ID: 3061335427-517259162
                                                  • Opcode ID: 430c93e604ecb33b3ff84b76402e8b8dd37a4f1645805b06affe485f7e029d85
                                                  • Instruction ID: 249b65c125b6472cb520268a5dde055c4a6b2ab779b0274ecd8c4e085d63d4ad
                                                  • Opcode Fuzzy Hash: 430c93e604ecb33b3ff84b76402e8b8dd37a4f1645805b06affe485f7e029d85
                                                  • Instruction Fuzzy Hash: 31317691A0978A45EB25AB7DA4440F9A7617F09784FC40A37DD0E17376DE3CE3488321
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc
                                                  • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                                  • API String ID: 3061335427-517259162
                                                  • Opcode ID: f38fd06d586284ddde5e18db3b0b80492eb2fbc1132887621bdcaf4423ed1ca7
                                                  • Instruction ID: 70da99fb3b603899cbc07d94664515d4d8df26c4a0cb45ce796e56874b0ab078
                                                  • Opcode Fuzzy Hash: f38fd06d586284ddde5e18db3b0b80492eb2fbc1132887621bdcaf4423ed1ca7
                                                  • Instruction Fuzzy Hash: 82315491A0978A45EB25AB7DA4441F9A7627F09784FC40A37DD0E17776DE3CE3488321
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemalloc
                                                  • String ID: OS/400$SITE NAMEFMT 1
                                                  • API String ID: 3061335427-2049154998
                                                  • Opcode ID: 924411b33166fe90b7481d7a5f125ceca56f5dad428a03f15fc2c6138f981451
                                                  • Instruction ID: 4f212818f28dd4192962215b97fa0a20907a79f65e6a53b8a3930d6f057a4d50
                                                  • Opcode Fuzzy Hash: 924411b33166fe90b7481d7a5f125ceca56f5dad428a03f15fc2c6138f981451
                                                  • Instruction Fuzzy Hash: 01317321A0C68A86F771AB3DA4513B8A760EB4D794FC04133CADD576B5DE3CE646C720
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                                  • String ID:
                                                  • API String ID: 469868127-0
                                                  • Opcode ID: 024514fa3772a8c69e18930f2edb36f8a4a7b61728b80ad75d0dc27bfabe14dc
                                                  • Instruction ID: dc663423592d7c644f3fc3f33b8cb4eaf2a7400d3e6584dd7f562e18ab249156
                                                  • Opcode Fuzzy Hash: 024514fa3772a8c69e18930f2edb36f8a4a7b61728b80ad75d0dc27bfabe14dc
                                                  • Instruction Fuzzy Hash: D6210036608A4586E630EF26E581269B771FB89B90F844132DF9D03B60DF39F5A58720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _errno_strdup
                                                  • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                                  • API String ID: 2151398962-2292467869
                                                  • Opcode ID: 1ac06dbd2ac643af919a8a1c0870491cd17c02b6a37efbd7478a018ba558be9d
                                                  • Instruction ID: 987569cda4dc5f59269191fe31c9dabd1681dcc5dae802f489e120c1357107b4
                                                  • Opcode Fuzzy Hash: 1ac06dbd2ac643af919a8a1c0870491cd17c02b6a37efbd7478a018ba558be9d
                                                  • Instruction Fuzzy Hash: F8618422E0C78A45FF75AB39944937AA7A2AF56744F880036CB9D026F1DF2CF644C360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupstrchr
                                                  • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                                  • API String ID: 3727083984-2292467869
                                                  • Opcode ID: 4f0c939df82d7b43fab082bb6525a08e8300e4ce4fbde8d1ccc17e0cd0df8090
                                                  • Instruction ID: 5333c6b03a6139ec331f4e805e11dd9ca21df2d57487e4d33cc19eef0b185398
                                                  • Opcode Fuzzy Hash: 4f0c939df82d7b43fab082bb6525a08e8300e4ce4fbde8d1ccc17e0cd0df8090
                                                  • Instruction Fuzzy Hash: C8618522E0C78A45FF75AB39944937AE7A2AF56754F840036CB9D026F1DF2CF6448360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfree
                                                  • String ID: Forcing HTTP/1.1 for NTLM$The requested URL returned error: %d
                                                  • API String ID: 1865132094-1204028548
                                                  • Opcode ID: 0ac72df66ab4c027b73ad8c1e291aa7b7e431376b96568b432ac0126ac761b8a
                                                  • Instruction ID: 6b3fcd957ad15fcb1f28e3b4a6090bd6e00f5849f10e25736eb2813719f9d26d
                                                  • Opcode Fuzzy Hash: 0ac72df66ab4c027b73ad8c1e291aa7b7e431376b96568b432ac0126ac761b8a
                                                  • Instruction Fuzzy Hash: D451A872A0C6CA81FB74EA7894402BDA791EB89748F980237DA4D466B5DF2CE6508730
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: tolower$_time64
                                                  • String ID: :%u$Hostname in DNS cache was stale, zapped
                                                  • API String ID: 4068448496-2924501231
                                                  • Opcode ID: b3832e9ae83c2f818d8e5f20c02279ad86dc294354eb5af68b8479754fb5ab38
                                                  • Instruction ID: 9df4d28358095e1bf3c0124b1db53e51135e9d0d3ed609a99983bb0492a7e84f
                                                  • Opcode Fuzzy Hash: b3832e9ae83c2f818d8e5f20c02279ad86dc294354eb5af68b8479754fb5ab38
                                                  • Instruction Fuzzy Hash: A541A562A1868695EB71EB29E8403B9A761EB4CB94F844333DE5D077B5DF3CE205C710
                                                  APIs
                                                  • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B6E4341
                                                  • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B6E4406
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B6E445A
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF79B6E4461
                                                    • Part of subcall function 00007FF79B73F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF79B6E43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B73F20A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                                  • String ID: https://keyauth.win/api/1.2/
                                                  • API String ID: 1155477157-3933380396
                                                  • Opcode ID: 4ea7c51fdb8f9a2c9775b8b296350226727eb1bfe8f31a4f5527755d1e351525
                                                  • Instruction ID: e8255c8e01a8572c1cb5574f0aa9f0b9a8704b324183b9bb960431bb4e697089
                                                  • Opcode Fuzzy Hash: 4ea7c51fdb8f9a2c9775b8b296350226727eb1bfe8f31a4f5527755d1e351525
                                                  • Instruction Fuzzy Hash: 0131EA23B0564984EE25ABBA955427C9252DB04FE4F940735CE3D07BF5DE7DF1928310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_close_openmalloc
                                                  • String ID: Couldn't open file %s
                                                  • API String ID: 3412525164-447283422
                                                  • Opcode ID: 95857b77417a878704d7fdb905165e311696dfc49cd5d2f0f3364ef33b98184e
                                                  • Instruction ID: 3c1a53dcff11883d9d6d6bb46af03641693cc631e8b66c88002975e0c8391639
                                                  • Opcode Fuzzy Hash: 95857b77417a878704d7fdb905165e311696dfc49cd5d2f0f3364ef33b98184e
                                                  • Instruction Fuzzy Hash: 5D41A42560C68981EB249F39E840269E7B1FB4DBD4F948233DA9D477B8DF7CE6418710
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$_errnofreememcpyrecv
                                                  • String ID: Recv failure: %s
                                                  • API String ID: 267823591-4276829032
                                                  • Opcode ID: be7537aced1d6328b3c5947b8cb48486490fdd45464f7ecb243888b41117e164
                                                  • Instruction ID: d8cc9bd8b938ab2aba484e7532a0d6f152ff029602be1d28d71ab0c961ae5f1e
                                                  • Opcode Fuzzy Hash: be7537aced1d6328b3c5947b8cb48486490fdd45464f7ecb243888b41117e164
                                                  • Instruction Fuzzy Hash: F331C272B0574985EB20AF29E8842A9A361BB5CFD8F804237DE5D0B7A4DE3CD655C350
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfreemalloc
                                                  • String ID: Unrecognized content encoding type. libcurl understands %s content encodings.$identity
                                                  • API String ID: 3985033223-1703240927
                                                  • Opcode ID: 26f14fbb27155c8bc7ba93293dcc76db4dac3620f58a1eef8e9075d1de7a8ec8
                                                  • Instruction ID: 7a977ebda02d5c3d56c8c7620f511d07a69acbcaf8a213f6f551824b3dd236e7
                                                  • Opcode Fuzzy Hash: 26f14fbb27155c8bc7ba93293dcc76db4dac3620f58a1eef8e9075d1de7a8ec8
                                                  • Instruction Fuzzy Hash: F6418321A09A4D81EB219B29D940278E771BF59BE4F845333CE5D477F4DF2CD6428720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: isupper$_strdupfree
                                                  • String ID: FALSE
                                                  • API String ID: 3359907120-3701058176
                                                  • Opcode ID: 27150f918a5bdf8d9ea0c3bde6371381d8e274e9a0ff9633156916c9ff9c2044
                                                  • Instruction ID: fdecb2f2ca9b665812c2ae829b3086923beb9451758c3d76812ad6066b4c8c32
                                                  • Opcode Fuzzy Hash: 27150f918a5bdf8d9ea0c3bde6371381d8e274e9a0ff9633156916c9ff9c2044
                                                  • Instruction Fuzzy Hash: 7031B262A0D59E45FB32EA3CA458338AB919B89765F840733C69F416F1CE2CD689C330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfreestrpbrk
                                                  • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                                                  • API String ID: 1812939018-579818044
                                                  • Opcode ID: 85d63cd334a15fffc10c553eae93822cc61512cdc19f79a5e6d0144d017ae251
                                                  • Instruction ID: 686e5af2577139024aa3d021fbd874c6486746ff9796adaff455c6d69f9bded9
                                                  • Opcode Fuzzy Hash: 85d63cd334a15fffc10c553eae93822cc61512cdc19f79a5e6d0144d017ae251
                                                  • Instruction Fuzzy Hash: 61316A52A18B8585EB11EB39E4402B9E761EB89B90F884332DA5D037F5DF7CD645C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfree
                                                  • String ID: %s: %s$FALSE$TRUE
                                                  • API String ID: 1865132094-3430445539
                                                  • Opcode ID: 27fd7b92b08e80c62ef846c0a086f2f778ba8bb1206fe5054450fd63a8227f2e
                                                  • Instruction ID: 8a2b3696bcfc011b01c29181b331c4002b3c82ce8b18b2f170f50f7ba54fabc5
                                                  • Opcode Fuzzy Hash: 27fd7b92b08e80c62ef846c0a086f2f778ba8bb1206fe5054450fd63a8227f2e
                                                  • Instruction Fuzzy Hash: 20012551A0C78A82EA75AB6DB8487B59751BB49B90FC44237CE4E133B1DF7CD2899320
                                                  APIs
                                                    • Part of subcall function 00007FF79B734290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B730D25), ref: 00007FF79B7342B6
                                                    • Part of subcall function 00007FF79B734290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B730D25), ref: 00007FF79B7342D7
                                                    • Part of subcall function 00007FF79B734290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B730D25), ref: 00007FF79B7342F2
                                                    • Part of subcall function 00007FF79B734290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B730D25), ref: 00007FF79B734300
                                                    • Part of subcall function 00007FF79B734290: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B730D25), ref: 00007FF79B734312
                                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B7343B6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc
                                                  • String ID: HTTP$NTLM
                                                  • API String ID: 2190258309-4188377180
                                                  • Opcode ID: 02a1d0cccc4e6bc93fd2e59f4e140727d9374f41d7fc12434709cd27c1760eaa
                                                  • Instruction ID: 5cfb6f1e82c8c23469093c751c7a1a28587e275f982dbded8c775265641d5b77
                                                  • Opcode Fuzzy Hash: 02a1d0cccc4e6bc93fd2e59f4e140727d9374f41d7fc12434709cd27c1760eaa
                                                  • Instruction Fuzzy Hash: CC614F32609B8982EB749F29F44066AB7A4FB88B84F944636DE8D43B74DF3CD554CB10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                                  • API String ID: 1294909896-1891748601
                                                  • Opcode ID: 64235b987dc4283eb39a3e46cb9056cdcaac1d29d970c9d48b0a8f2c00d34f7d
                                                  • Instruction ID: 0d9ff23b277d0e5e97ea88c91f7eca9e4e508c38d076490eead58ba292a9423f
                                                  • Opcode Fuzzy Hash: 64235b987dc4283eb39a3e46cb9056cdcaac1d29d970c9d48b0a8f2c00d34f7d
                                                  • Instruction Fuzzy Hash: 7C51946190D68A85EA74F739D4503B9A361FF49364F800337DAAD066F2DF7CE6858360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$mallocmemcpy
                                                  • String ID: TRUE
                                                  • API String ID: 3401966785-3412697401
                                                  • Opcode ID: 602671d3a2d94d0c58c6a2817907598d8b60c771bcf79690e693e34a726910cb
                                                  • Instruction ID: a5f0ba75b306890119b881c05b9163398c331c7c7914d4f1957e5e7700c35372
                                                  • Opcode Fuzzy Hash: 602671d3a2d94d0c58c6a2817907598d8b60c771bcf79690e693e34a726910cb
                                                  • Instruction Fuzzy Hash: F3418B52A1969905FF29563DA518379A752EB48BE0F844733CA6F433F1CD6CE289C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$mallocmemcpy
                                                  • String ID: %s: %s
                                                  • API String ID: 3401966785-1451338302
                                                  • Opcode ID: 5bb74c90d2b924d3d46db183046a0a2a57736da918594bd6e258ae812eb30cc8
                                                  • Instruction ID: a066081ca1ea1fe433d247ecb4959701c24791d6c0605d89cdb54c557435c52b
                                                  • Opcode Fuzzy Hash: 5bb74c90d2b924d3d46db183046a0a2a57736da918594bd6e258ae812eb30cc8
                                                  • Instruction Fuzzy Hash: C0416B11A0D2D946EA386A2E651C3B5D792EB49BE0F844337CEAF077F5DD2CD2499320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Start Date: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Start Date
                                                  • API String ID: 1294909896-619256714
                                                  • Opcode ID: c313071ac66f1c4f56deb5f397c2f8bd85754e4a57d7de673abe469c5ceafaca
                                                  • Instruction ID: e19771273cc8f247cc82ad582e9a488123856451fcb0fef198b7f86a1df53893
                                                  • Opcode Fuzzy Hash: c313071ac66f1c4f56deb5f397c2f8bd85754e4a57d7de673abe469c5ceafaca
                                                  • Instruction Fuzzy Hash: AC51E361B0C6DA55EB34AB3CA4445B8E7A2EB09791FC44633DA4D06674DF3CE749C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _errnofreememcpy
                                                  • String ID: Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                                                  • API String ID: 738009125-4268564757
                                                  • Opcode ID: 586ccab9439305b842b597f15da96b3fb236faa831c6eaa4294a5b49c4f9c0cc
                                                  • Instruction ID: 89d5e20835735296d408e08f721810bce315dd8db74d2f513afbf8b11c2276d6
                                                  • Opcode Fuzzy Hash: 586ccab9439305b842b597f15da96b3fb236faa831c6eaa4294a5b49c4f9c0cc
                                                  • Instruction Fuzzy Hash: 6C51956260C68A81EB34EE79D4402B9E360FB89B94F844133EE5D13675DF7CE2418321
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Start Date: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Start Date
                                                  • API String ID: 1294909896-2752585153
                                                  • Opcode ID: ecaf5d6ef0c748e97b97466dba9457b62e2f67f1070de549437da5a907efa122
                                                  • Instruction ID: ee217946f7c948b4c03bf6aba0d3c8aef83feefd7a9305fb7e21db346772c95a
                                                  • Opcode Fuzzy Hash: ecaf5d6ef0c748e97b97466dba9457b62e2f67f1070de549437da5a907efa122
                                                  • Instruction Fuzzy Hash: 02319562A0D78995EB34AF3CA4405B9E762EB49B84FC84633D64D1A275DF3CD748C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc
                                                  • String ID: Signature: %s$Signature
                                                  • API String ID: 2190258309-1663925961
                                                  • Opcode ID: 8c86ff128ba9d3563ac51cb2b2091eae2cf1052a09e38ac452feb21dadc9144c
                                                  • Instruction ID: 541754dedc84d0fd7a6a4d0daedcdfca8ddafef231689245690db49dd937a5a8
                                                  • Opcode Fuzzy Hash: 8c86ff128ba9d3563ac51cb2b2091eae2cf1052a09e38ac452feb21dadc9144c
                                                  • Instruction Fuzzy Hash: 4321B866B086C586EA209B39E4442EAA350FB48BE4F880633DE5D07775DF3CD245C710
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Failure sending QUIT command: %s$QUIT
                                                  • API String ID: 1294909896-1162443993
                                                  • Opcode ID: 7d883075aae54850d3eb03df06446082c78f0e0411fe14da9346d1acb75fded0
                                                  • Instruction ID: d911b97decf8ffd6697a64c8044ced23e8b6a5feb12fd684a59e07e5c6c74f3e
                                                  • Opcode Fuzzy Hash: 7d883075aae54850d3eb03df06446082c78f0e0411fe14da9346d1acb75fded0
                                                  • Instruction Fuzzy Hash: AE316121A0C78A81EB64EF7995412B9B361FB49B84F844237DA4D07675CF3CE255C360
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$calloc$memcpy
                                                  • String ID:
                                                  • API String ID: 3478730034-0
                                                  • Opcode ID: 4bf8c0b1074bbecaf6bde63f8eeadf00f66dcdb0cd642673e420bb0de028504a
                                                  • Instruction ID: 513e648936c7c6d689bb751a19e87db70a9f23e2caa0289ce4157a943be18ad8
                                                  • Opcode Fuzzy Hash: 4bf8c0b1074bbecaf6bde63f8eeadf00f66dcdb0cd642673e420bb0de028504a
                                                  • Instruction Fuzzy Hash: 8B21D371A09B8986E724EF29D850229A7A0FB8CB90F844336DA5E173F4DF7CD1408720
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strchr$_strdupmalloc
                                                  • String ID:
                                                  • API String ID: 4236146995-0
                                                  • Opcode ID: c75352456abeb419cddd3a203c925fb66392ab3e1bfe211039d896eef24929ac
                                                  • Instruction ID: 4b0db2e49e76ce86251ef1b4cb45db89395bedef05a6aca28c9a0307c3751e46
                                                  • Opcode Fuzzy Hash: c75352456abeb419cddd3a203c925fb66392ab3e1bfe211039d896eef24929ac
                                                  • Instruction Fuzzy Hash: 28219262A15B8986EB91DB39955036C63A1EB49B54F480236DE0D0BB64EF38DA90C331
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemallocmemcpy
                                                  • String ID: Start Date: %s$Start Date
                                                  • API String ID: 3056473165-2389359183
                                                  • Opcode ID: e73459a0b564e8f99c001fa891434a2e70ff0cfad3f7e01afc9ce51d1bf3eddf
                                                  • Instruction ID: e400a8d8842120cfdc9fe19153922e960bfb74f1a7834a97cb58ee9aa066615e
                                                  • Opcode Fuzzy Hash: e73459a0b564e8f99c001fa891434a2e70ff0cfad3f7e01afc9ce51d1bf3eddf
                                                  • Instruction Fuzzy Hash: 9521D651A0928A51EE39AB3D95042B4A6526F0DBD5F844733CD2D077B1EE3CA3488320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc
                                                  • String ID: Signature: %s$Signature
                                                  • API String ID: 2190258309-1663925961
                                                  • Opcode ID: 80d941fe8a2562cfa1d9bd5d0ddd1395d7de46f75ffb7d469e30cae601067e19
                                                  • Instruction ID: ff99ff76a1b2a331656a7526a90e1b8b4584c604f28d63f012ce3de4881650b6
                                                  • Opcode Fuzzy Hash: 80d941fe8a2562cfa1d9bd5d0ddd1395d7de46f75ffb7d469e30cae601067e19
                                                  • Instruction Fuzzy Hash: E0219766A0868A82EA31AB39E4442FAA3A0FF89794F840533DE4D07775DE3CD2458310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: malloc$free
                                                  • String ID: Signature: %s$Signature
                                                  • API String ID: 1480856625-1663925961
                                                  • Opcode ID: e9065b80354950d0c0a22d29add7bf103f3a31efd183f5bfd048baa5b73aabb4
                                                  • Instruction ID: eb3d06630c5875ccf98168e1ab8c620f77bdb23884f9d2de95e14afafd20a3ca
                                                  • Opcode Fuzzy Hash: e9065b80354950d0c0a22d29add7bf103f3a31efd183f5bfd048baa5b73aabb4
                                                  • Instruction Fuzzy Hash: C1216866B08A8686EA61DB39E4442EAA3A1FF89794F840533DE4D17735DF3CD245C710
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: malloc$free
                                                  • String ID: Signature: %s$Signature
                                                  • API String ID: 1480856625-1663925961
                                                  • Opcode ID: 351cc430754a4aa9ce224d767375869e203a95fb4cbef21fa980b6650913238a
                                                  • Instruction ID: 918f311c4c699824dd06219bab90cc61abb26af927374c36d5878133c72d7b33
                                                  • Opcode Fuzzy Hash: 351cc430754a4aa9ce224d767375869e203a95fb4cbef21fa980b6650913238a
                                                  • Instruction Fuzzy Hash: 7F216866B08A8686EA61EB39E4442EAA361FF89794F840533DE4D07735DF3CD245C710
                                                  APIs
                                                  • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF79B6F2579), ref: 00007FF79B6F2EDF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strncpy
                                                  • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                                                  • API String ID: 3301158039-3625861382
                                                  • Opcode ID: 87e7efae683d90ae9f7ffd3d2827c118d7d582aa4952cc6e8680895ff73779e2
                                                  • Instruction ID: f3d758f1f62366730f599e806117797ab7675cec8920fbabe700be9248a4f782
                                                  • Opcode Fuzzy Hash: 87e7efae683d90ae9f7ffd3d2827c118d7d582aa4952cc6e8680895ff73779e2
                                                  • Instruction Fuzzy Hash: 51113A52A0C64A40EA38E7BCF55927892A3DF08780FD85131D62E066B4CE6CF7D19A20
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                                  • String ID:
                                                  • API String ID: 469868127-0
                                                  • Opcode ID: b49ded62efcb7a132072073a24107aff30ff1d8ee3c1af8418add5c8f688a3ef
                                                  • Instruction ID: e716d2b4b44d7ee61a3a9596a798bf50f7e45a6e0610be50356582f740102c4a
                                                  • Opcode Fuzzy Hash: b49ded62efcb7a132072073a24107aff30ff1d8ee3c1af8418add5c8f688a3ef
                                                  • Instruction Fuzzy Hash: 1B112E36A08B45C6E620EF26E581229B761FB89B90F544131DF9D03B64CF39F5A18720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfree
                                                  • String ID: FALSE$TRUE
                                                  • API String ID: 1865132094-1412513891
                                                  • Opcode ID: 18f56905f20e121188a22abea656a85f17a1ee6d051de28b0ad6ada156964aaf
                                                  • Instruction ID: bf74008b888d1ae8816f12414991d44f07779c6f4c29f0fc39de547cb2c667c5
                                                  • Opcode Fuzzy Hash: 18f56905f20e121188a22abea656a85f17a1ee6d051de28b0ad6ada156964aaf
                                                  • Instruction Fuzzy Hash: F641B5E2B0D65D84FF259A7DA41837CA751AB48795F844B33CE5E463F4DE3CA6488220
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _time64$ErrorLast
                                                  • String ID: TFTP response timeout
                                                  • API String ID: 3339832089-3820788777
                                                  • Opcode ID: de519a69b9098c6e466dff899da05dd99926158094db71a0cd61adfe1146e5af
                                                  • Instruction ID: 5d0e74595560a0de3d61c184bfdf53bddecead5ca91049cfca5735c0a1fd8209
                                                  • Opcode Fuzzy Hash: de519a69b9098c6e466dff899da05dd99926158094db71a0cd61adfe1146e5af
                                                  • Instruction Fuzzy Hash: AE41B236608A4A81E770AF39D4502A9B761EB4CBA4F844333DE2D477F9DE3CD6418760
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: isupper$free
                                                  • String ID: %s%lx
                                                  • API String ID: 573759493-530121141
                                                  • Opcode ID: 39c509b3edc93c96e80e4a76a6b2e02f8b9962ae2c7a1b9d3d69e33a8fdb0241
                                                  • Instruction ID: 586a6980acf5523fce553f891649e71268f2e8bdc1a9e9fbe0ed925b0759d444
                                                  • Opcode Fuzzy Hash: 39c509b3edc93c96e80e4a76a6b2e02f8b9962ae2c7a1b9d3d69e33a8fdb0241
                                                  • Instruction Fuzzy Hash: 6E31E551A0D59E89FB32AB3CA458378EF929B49745F940733C68F41AB2CE2DD649C330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: fwrite
                                                  • String ID: ...$...
                                                  • API String ID: 3559309478-2253869979
                                                  • Opcode ID: ce52080936e4f8e8d2536faf948e6cb61c3c5a059659c50af308800804d1eb0d
                                                  • Instruction ID: 42690354aaea2422b1347b394d11d6f357e50dd2ac1b451f1cddf552ff0165da
                                                  • Opcode Fuzzy Hash: ce52080936e4f8e8d2536faf948e6cb61c3c5a059659c50af308800804d1eb0d
                                                  • Instruction Fuzzy Hash: 8531C421608A8981EB74EF25E8443F9A7A2FB88B94F844233CA5D037B4CF3DE255C750
                                                  APIs
                                                  • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B713B69), ref: 00007FF79B7141BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: realloc
                                                  • String ID: Failed to alloc memory for big header!$Rejected %zu bytes header (max is %d)!
                                                  • API String ID: 471065373-1365219457
                                                  • Opcode ID: fd2de4368d3f59bb441b9b1cd9bd76850ec27dc8a676fb8f2278394dc7b74183
                                                  • Instruction ID: 7fe8bcf901f95458aa418c754229845e922eb4f883ed02226e8eec0426a7dd73
                                                  • Opcode Fuzzy Hash: fd2de4368d3f59bb441b9b1cd9bd76850ec27dc8a676fb8f2278394dc7b74183
                                                  • Instruction Fuzzy Hash: EF215E32B08A8986DB14EB29E5802ADA361FB89FC4F444136EF5D03B69CF38D5A1C750
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdup
                                                  • String ID: :
                                                  • API String ID: 2653869212-336475711
                                                  • Opcode ID: 31519cfa42e057218d48b548fc77e7d7d02da04528d7c751b0ee5b42c6aaaf33
                                                  • Instruction ID: b216d7e2e4af474f51f5ed2b678f065b0de8ff70d8ae4d57dca94b433587566e
                                                  • Opcode Fuzzy Hash: 31519cfa42e057218d48b548fc77e7d7d02da04528d7c751b0ee5b42c6aaaf33
                                                  • Instruction Fuzzy Hash: 70216723609B8985EB759F2AE5413A5B3A1FB44754F884135CF9C43BA4EF3CF6548720
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %s%s$LIST "%s" *
                                                  • API String ID: 0-1744359683
                                                  • Opcode ID: 9ad9c9c743700dca674b2ef310e13197ed19483ca3184e6ea3a8d7b69f8cecd6
                                                  • Instruction ID: e1b68f8f1b93ee0f8006b9ded19ff9f9243181532fb31eb04b62572cb3754503
                                                  • Opcode Fuzzy Hash: 9ad9c9c743700dca674b2ef310e13197ed19483ca3184e6ea3a8d7b69f8cecd6
                                                  • Instruction Fuzzy Hash: 96117F21B0D64A81EA24EB6DE4401B9A361EF8CBD4F880633EE1D17775DF2CE7458760
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$_strdup
                                                  • String ID: :
                                                  • API String ID: 2653869212-336475711
                                                  • Opcode ID: 47b69c0bcc2c29523abc69405d14f96bc4afcbee578991499096d4f0677b3899
                                                  • Instruction ID: 281fc26286a544615d17c19be5d49d19c49affb59bc58ef2529b004d33203648
                                                  • Opcode Fuzzy Hash: 47b69c0bcc2c29523abc69405d14f96bc4afcbee578991499096d4f0677b3899
                                                  • Instruction Fuzzy Hash: B6115723609B4985EB759F2AE5413A5B3A1AB44754F884136CFAC437A4EF3CF6548720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastsend
                                                  • String ID: SENT$Sending data failed (%d)
                                                  • API String ID: 1802528911-3459338696
                                                  • Opcode ID: 65ff34c0cb6f044c90c2701506629150b7c1ce5c6fa9514c096fbd7930662d26
                                                  • Instruction ID: 80f699587229b667b6ff2673c87dfa5a9eb7fbce647c9b1430632e3b6bcb54c3
                                                  • Opcode Fuzzy Hash: 65ff34c0cb6f044c90c2701506629150b7c1ce5c6fa9514c096fbd7930662d26
                                                  • Instruction Fuzzy Hash: 18019622718A9AC1DB24AB2AE440459BF21FB88FC4B895232CB5D43735DE39D605C750
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfreemalloc
                                                  • String ID: Start Date: %s$Start Date
                                                  • API String ID: 3985033223-2389359183
                                                  • Opcode ID: 3be07b386cacc7944c59c3374aef9a67a22657f74a4f6992ede528647afe8043
                                                  • Instruction ID: ab0a3b15168d4e24767df259d16e89e1d6f3bf2b2b0b018f909eb99b915f4e24
                                                  • Opcode Fuzzy Hash: 3be07b386cacc7944c59c3374aef9a67a22657f74a4f6992ede528647afe8043
                                                  • Instruction Fuzzy Hash: 92018891A0D38A51EB39AB3CA4545B5A753AF0DB95FC84A37C91E06272DF3CA7488331
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strchr$mallocmemcpy
                                                  • String ID:
                                                  • API String ID: 320687583-0
                                                  • Opcode ID: b21713abedf53e94ceb737acc43def902bdbf09230bbcfd22c0860dc6f8a36b7
                                                  • Instruction ID: 91422d00a35039a2a85acab8049e0244a83a4e02ad944e88bcbfa2ef0418a58e
                                                  • Opcode Fuzzy Hash: b21713abedf53e94ceb737acc43def902bdbf09230bbcfd22c0860dc6f8a36b7
                                                  • Instruction Fuzzy Hash: E221E91160D69A41EE65EB3951102BDE6D29F89BC8F8C4232DE4D077F6EE1CD646C230
                                                  APIs
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B730D25), ref: 00007FF79B7342B6
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B730D25), ref: 00007FF79B7342D7
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B730D25), ref: 00007FF79B7342F2
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B730D25), ref: 00007FF79B734300
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B730D25), ref: 00007FF79B734312
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 2024636b2d1604517faee22fc84d3286981bba4572d67bae73b6b26a62bf0446
                                                  • Instruction ID: b6658073171ddcf6430d35d8e51d062cd2cfd8f3251b6586765a0e07f28022d1
                                                  • Opcode Fuzzy Hash: 2024636b2d1604517faee22fc84d3286981bba4572d67bae73b6b26a62bf0446
                                                  • Instruction Fuzzy Hash: FD118336604B45C2DB14AF79E99012CB3A4FB88F887444626CE5E47778CF78D995C360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                                  • API String ID: 1294909896-910067264
                                                  • Opcode ID: 02a75f58ffacef6802f716bea87759d1f8428b31b63a0010405d9e98485556c6
                                                  • Instruction ID: b88756ada4ec46d354b610e1ced9f2f5dfbe79cf4183d0252f2515a5391b9e84
                                                  • Opcode Fuzzy Hash: 02a75f58ffacef6802f716bea87759d1f8428b31b63a0010405d9e98485556c6
                                                  • Instruction Fuzzy Hash: 3051C662B0C69E44EB359B3DB5481B9E7A6AB09790FC44233DA4E027B4DF3CD649C320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                                                  • API String ID: 1294909896-2632828617
                                                  • Opcode ID: f60b2e51f519615eef786d8073e28d31358248af6a85787eb4334c3cf12e941d
                                                  • Instruction ID: f622c6607f95ecb864b6bd4c79a622cbd07b48bc2683eaa009780de7e3ba0126
                                                  • Opcode Fuzzy Hash: f60b2e51f519615eef786d8073e28d31358248af6a85787eb4334c3cf12e941d
                                                  • Instruction Fuzzy Hash: 0341B761A0C69A85EA749B39B5082B9E792FB497A0FC44233DE8D13774CF3DE649C710
                                                  APIs
                                                  • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF79B6ED198), ref: 00007FF79B6ED5AE
                                                  • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF79B6ED198), ref: 00007FF79B6ED5DC
                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF79B6ED198), ref: 00007FF79B6ED645
                                                    • Part of subcall function 00007FF79B73F1F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF79B6E43EE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF79B6E1B49), ref: 00007FF79B73F20A
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF79B6ED652
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                                  • String ID:
                                                  • API String ID: 2942768764-0
                                                  • Opcode ID: 85720bd983f436f4aa73aff36a529999d2e6a53fd0a7c81ddb3163e5256d1ca4
                                                  • Instruction ID: a103b5606df2ce2293661d5d367db746209d32f2b6ca2dc7862de59d2bcce044
                                                  • Opcode Fuzzy Hash: 85720bd983f436f4aa73aff36a529999d2e6a53fd0a7c81ddb3163e5256d1ca4
                                                  • Instruction Fuzzy Hash: 9641B472705A4985EA24AFB9D54427DA362BB48BA4F948A31CB3D077E4DF3DF2618310
                                                  APIs
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF79B71E220,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF79B73ACC3
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B73AD4C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: %s
                                                  • API String ID: 1294909896-3043279178
                                                  • Opcode ID: dce2de37e97ba3121b39420a420f3ffe21f4b37a0ee740fa9a1d3028c897691b
                                                  • Instruction ID: f17106768cb5cff79928dd3f8c8bba492b6af47561dbb1046e39365c9c44ee5a
                                                  • Opcode Fuzzy Hash: dce2de37e97ba3121b39420a420f3ffe21f4b37a0ee740fa9a1d3028c897691b
                                                  • Instruction Fuzzy Hash: 10419732618B4982EA61DB2AF4411AEF3A1FB49B90F444236DF9D43BB5DF3CE1958710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 1775671525-0
                                                  • Opcode ID: 5c85aa3a3311362c9070413258333b9d711f4247dfcae00e6bbf08e53cf1990d
                                                  • Instruction ID: 8a89020d805d925a9caee02816b760bbaa3ca167408bb11500e6402fd14da730
                                                  • Opcode Fuzzy Hash: 5c85aa3a3311362c9070413258333b9d711f4247dfcae00e6bbf08e53cf1990d
                                                  • Instruction Fuzzy Hash: AB31E72270978954EE24AB7AA50426CA352AB08BE0F980739DF7D077E5DE7DF2618310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                                  • API String ID: 1294909896-918878739
                                                  • Opcode ID: cf9aa252f422a400f87b355d1684e97f3e4706dadaf5d5527515fc444d0a9930
                                                  • Instruction ID: 630d0642dae1c4ab9fba94b376d488b017ec791d919ac2991af07c26905a50f2
                                                  • Opcode Fuzzy Hash: cf9aa252f422a400f87b355d1684e97f3e4706dadaf5d5527515fc444d0a9930
                                                  • Instruction Fuzzy Hash: 5131A362A09A8985EB209B7DE5441B9F762FB48794FC44633DA4E037B4DF3CE649C320
                                                  APIs
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B726204
                                                    • Part of subcall function 00007FF79B705AF0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF79B705C15
                                                    • Part of subcall function 00007FF79B705AF0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF79B705C30
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: fwrite$free
                                                  • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                                                  • API String ID: 3468156532-1133524294
                                                  • Opcode ID: 72e8115e190613d61a510a9022a254eb563f41d079b2800816e9a6c2228482a0
                                                  • Instruction ID: 9661bffbef0600e19fc59cb3a63f9d45d87e43cc99ac1be597da5aab33a093d5
                                                  • Opcode Fuzzy Hash: 72e8115e190613d61a510a9022a254eb563f41d079b2800816e9a6c2228482a0
                                                  • Instruction Fuzzy Hash: C0414472A08A49C5E720EF7DD8841ADA3A1FB48B85F854237DE4E4B379DE38D545C360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                                  • API String ID: 1294909896-1153420294
                                                  • Opcode ID: c8d5e4a8ff85ba13f6c5b70e3070ea00d9005e9db9aac26ba7c889d65a3b0171
                                                  • Instruction ID: 4fc85f39f2254dde41ff6b4028159c16969a6797266ee657b53febaac7dd590c
                                                  • Opcode Fuzzy Hash: c8d5e4a8ff85ba13f6c5b70e3070ea00d9005e9db9aac26ba7c889d65a3b0171
                                                  • Instruction Fuzzy Hash: 1231C361A08B8988E770AB78E4446B9B3A2FB49B80FD40233DA5E13271CF7CD749C310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemallocmemcpy
                                                  • String ID: TRUE
                                                  • API String ID: 3056473165-3412697401
                                                  • Opcode ID: 0a46df6ddcc284711443a9b7be861963df002ccb44c57c74328d9d386c14981d
                                                  • Instruction ID: 3b58cab215d55aeb54d5bad74c581fd912d57bbca436a815d9936619ef4c0ecf
                                                  • Opcode Fuzzy Hash: 0a46df6ddcc284711443a9b7be861963df002ccb44c57c74328d9d386c14981d
                                                  • Instruction Fuzzy Hash: 4B21B566B0974A44FF259A3DA508375A752AB48BE4F844633CD2F037F4DE7DE2458320
                                                  APIs
                                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B700292
                                                  • memcpy.VCRUNTIME140 ref: 00007FF79B7002CD
                                                    • Part of subcall function 00007FF79B6F5620: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B6F5635
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B700302
                                                    • Part of subcall function 00007FF79B6F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B6FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B6F1B61), ref: 00007FF79B6F5757
                                                    • Part of subcall function 00007FF79B6F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B6FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B6F1B61), ref: 00007FF79B6F5763
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$malloc$memcpy
                                                  • String ID: %s:
                                                  • API String ID: 901724546-64597662
                                                  • Opcode ID: d13fa5098978c9ff860a4a50749aa612649a5d79ab32cbef5b6c1ca183ae7892
                                                  • Instruction ID: 3f1ca025eacd5f95412a2a1d10a78c18ef7286e27e3dbbd924325ba98d94a883
                                                  • Opcode Fuzzy Hash: d13fa5098978c9ff860a4a50749aa612649a5d79ab32cbef5b6c1ca183ae7892
                                                  • Instruction Fuzzy Hash: 0A21D826A08A8981DB21DF2AE9401AAB365FB58FF4F840233DE6D077B5DF3CD6458350
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemallocmemcpy
                                                  • String ID: %s: %s
                                                  • API String ID: 3056473165-1451338302
                                                  • Opcode ID: 5220cc3d17588d35cad3d5a67b2830ac868535652abc24202a45ac1b11bc70fb
                                                  • Instruction ID: 8d66797cd935e704d85e835e45358fdce6a044b70d28ebb791b4f3e49bb01c32
                                                  • Opcode Fuzzy Hash: 5220cc3d17588d35cad3d5a67b2830ac868535652abc24202a45ac1b11bc70fb
                                                  • Instruction Fuzzy Hash: 80219551B0D78541EA75AA2A79083B5D2517B89FE0F844333CE5E17BB5DE3CD2498311
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Start Date: %s$%s%lx$Start Date
                                                  • API String ID: 1294909896-3519493645
                                                  • Opcode ID: d226b40c569d856c120d596ceab6aaf83955d24eba0c30aa2b7f35493c273657
                                                  • Instruction ID: 9c50576823c99094f76bb0ba5ba68821713c5f2464c96ed3469b5eb46b75f691
                                                  • Opcode Fuzzy Hash: d226b40c569d856c120d596ceab6aaf83955d24eba0c30aa2b7f35493c273657
                                                  • Instruction Fuzzy Hash: BE21BB51B0D29E55EE346B3DA4446F9A753AB0DB84FC45A33C91E1B672EE2DE3488320
                                                  APIs
                                                  • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF79B708FA8), ref: 00007FF79B7090F5
                                                  • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF79B708FA8), ref: 00007FF79B70910F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strncmp
                                                  • String ID: I32$I64
                                                  • API String ID: 1114863663-3980630743
                                                  • Opcode ID: 0be37fdb7193815d16d30311619a46b69f6c7193939b8a1f8b95d73bb161b846
                                                  • Instruction ID: 912d790a9cd7872997ff858d4e83e57a9711514289dcee878a2fe43296ab8166
                                                  • Opcode Fuzzy Hash: 0be37fdb7193815d16d30311619a46b69f6c7193939b8a1f8b95d73bb161b846
                                                  • Instruction Fuzzy Hash: F0219522A0C55B46E7356B39D8542B9FAA59B4DF48F898233CB49422F5DE2CD704C760
                                                  APIs
                                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B733E99,00000000,?,?,00007FF79B733456), ref: 00007FF79B733159
                                                  • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B733E99,00000000,?,?,00007FF79B733456), ref: 00007FF79B733190
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B733E99,00000000,?,?,00007FF79B733456), ref: 00007FF79B7331A2
                                                  • memcpy.VCRUNTIME140(?,?,?,00007FF79B733E99,00000000,?,?,00007FF79B733456), ref: 00007FF79B7331CA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: freemallocmemcpyrealloc
                                                  • String ID:
                                                  • API String ID: 3881842442-0
                                                  • Opcode ID: cea1445d491202ccc5f1bb3fde8ba13241085fcd7cbefc25c7e8a0734b400696
                                                  • Instruction ID: cf8a37899f52a63fc2bcc4b0b93b937f7d7c7040d9ea2b3dc5a0897208641f46
                                                  • Opcode Fuzzy Hash: cea1445d491202ccc5f1bb3fde8ba13241085fcd7cbefc25c7e8a0734b400696
                                                  • Instruction Fuzzy Hash: 78216F26609F8582DB64CF29F490229A3A0FB48FC8F888532DE5D07768EF38D595C310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strstr$calloc
                                                  • String ID: ;type=
                                                  • API String ID: 3224321581-3507045495
                                                  • Opcode ID: 503c6b424d6b1e014a1666fb9fd3bb4b3630a5bb9643ad5680baf9e24bbaafc3
                                                  • Instruction ID: 7000ccb572179bf97d8de3c272eedea34c0cbc4f103597e8fa55ab585fecdcca
                                                  • Opcode Fuzzy Hash: 503c6b424d6b1e014a1666fb9fd3bb4b3630a5bb9643ad5680baf9e24bbaafc3
                                                  • Instruction Fuzzy Hash: ED21B53150868581EB259B39E0403A867A0FB4CB84F888276DB9E477F5DF6CE6918320
                                                  APIs
                                                  • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B7004B9,?,?,?,?,00007FF79B6FF85B), ref: 00007FF79B71BF68
                                                  • GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF79B7004B9,?,?,?,?,00007FF79B6FF85B), ref: 00007FF79B71BF8E
                                                  • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B7004B9,?,?,?,?,00007FF79B6FF85B), ref: 00007FF79B71BFAF
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF79B7004B9,?,?,?,?,00007FF79B6FF85B), ref: 00007FF79B71BFC0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: realloc$EnvironmentVariablefree
                                                  • String ID:
                                                  • API String ID: 2828309815-0
                                                  • Opcode ID: 4605cc5c122742bf078e2de82160463c2c23cd3f4f401cc025448c3935667395
                                                  • Instruction ID: b9be2574ef82574a7ba14ceea4bbde81d30d0785858e1a144d8c46f23c6f477f
                                                  • Opcode Fuzzy Hash: 4605cc5c122742bf078e2de82160463c2c23cd3f4f401cc025448c3935667395
                                                  • Instruction Fuzzy Hash: 7B115421B0974646E670AB7A658023AE195BF8CBC0F940536DE4D53BB4DE7CE5404B60
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$freemalloc
                                                  • String ID:
                                                  • API String ID: 2605342592-0
                                                  • Opcode ID: 72fc4d6c210c94181f49e1ff445ae12eb0e65c64eb716051aca1f70ff3a1cb6a
                                                  • Instruction ID: cee6685f9bc390ce7771e4781413ea03fd1f37187198136a6255bbb7c0906f8f
                                                  • Opcode Fuzzy Hash: 72fc4d6c210c94181f49e1ff445ae12eb0e65c64eb716051aca1f70ff3a1cb6a
                                                  • Instruction Fuzzy Hash: 02115131B09B45C6E720AF66B94012DB7A1FB88BC0B884139DB4D47B34DF78DA058750
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID: Proxy-Connection: Keep-Alive
                                                  • API String ID: 1294909896-2835282938
                                                  • Opcode ID: 4326241e5c83e316d87656bb10da1d6c6a2a917d2c9f7d2329a89e3b1e33a2c7
                                                  • Instruction ID: b1131646efa0eb433d1856992e3f09d7d7219be8de23238e77904cb1a7aa1581
                                                  • Opcode Fuzzy Hash: 4326241e5c83e316d87656bb10da1d6c6a2a917d2c9f7d2329a89e3b1e33a2c7
                                                  • Instruction Fuzzy Hash: EE018821B0564582FA25AB69B8403B9A650AF88BF0F844331DEBD0B7F5DF7C95858360
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$CriticalDeleteSectionclosesocket
                                                  • String ID:
                                                  • API String ID: 3086658127-0
                                                  • Opcode ID: 7574a7043eeb4c3d10f9198af3bfb012d035b464662d470d139b8739ea4c5b1f
                                                  • Instruction ID: 98cc7d0aa8bfd70880bf20da7cb8def950fa1c81e53b97a6df5a4e8c43974eb4
                                                  • Opcode Fuzzy Hash: 7574a7043eeb4c3d10f9198af3bfb012d035b464662d470d139b8739ea4c5b1f
                                                  • Instruction Fuzzy Hash: 36017112D18B86C3EB24EF39C8602786321FFEDF28B456322DE6D011B59F78A6D48210
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strncmp
                                                  • String ID: I32$I64
                                                  • API String ID: 1114863663-3980630743
                                                  • Opcode ID: a1a99ecdc33e61d4c3b5d2a4525c545b489d587e5ec690a7bb14a30661bb0460
                                                  • Instruction ID: 78297e1f47d0e298d4903d19e853a3f603b981e57be4aac9736355200110417e
                                                  • Opcode Fuzzy Hash: a1a99ecdc33e61d4c3b5d2a4525c545b489d587e5ec690a7bb14a30661bb0460
                                                  • Instruction Fuzzy Hash: AAF0542171C54741E7216B3DDC58675AAA6AF4EB89F854233CA0D822F4DE6CD304C720
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: strncmp
                                                  • String ID: I32$I64
                                                  • API String ID: 1114863663-3980630743
                                                  • Opcode ID: 977122792dad126eb11d31593ba36ecddecab37dcc899c0806810c0336bfc961
                                                  • Instruction ID: 790830d12fc117b1dc0eca33e45dd30dae354ac4418e1745a08a959336442d95
                                                  • Opcode Fuzzy Hash: 977122792dad126eb11d31593ba36ecddecab37dcc899c0806810c0336bfc961
                                                  • Instruction Fuzzy Hash: ECF0541171C54741E7316B3DDC58675AAA6AF4EB89F854233CA1D822F4DE6CD304C720
                                                  APIs
                                                  • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF79B706576), ref: 00007FF79B7311D4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _errno
                                                  • String ID: %lx
                                                  • API String ID: 2918714741-1448181948
                                                  • Opcode ID: e77c4d74624f0f84d320a93ff8c7e4d2a40da779998f9b9338f448f434e8e1ad
                                                  • Instruction ID: e871f7ff9a8780ecd8371545e68a4d96d78955d6812ac03f2cd3767b0374b270
                                                  • Opcode Fuzzy Hash: e77c4d74624f0f84d320a93ff8c7e4d2a40da779998f9b9338f448f434e8e1ad
                                                  • Instruction Fuzzy Hash: DF817B22A0C1D945E7B89B3DB450279BBD0E789780F584337E69E42AF5DE3CC649C720
                                                  APIs
                                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF79B71C8C3), ref: 00007FF79B71CFB2
                                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF79B71C8C3), ref: 00007FF79B71D003
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupmalloc
                                                  • String ID: (){ %*]
                                                  • API String ID: 3515966317-731572209
                                                  • Opcode ID: 828cb0b03bfd1f9835d7e49c80cb9220c802b63348bb1293add8a6644de1a829
                                                  • Instruction ID: bd19f403479bc942f00d828e3554262a4b2942b55ec084eb3b5208c0d9811e2f
                                                  • Opcode Fuzzy Hash: 828cb0b03bfd1f9835d7e49c80cb9220c802b63348bb1293add8a6644de1a829
                                                  • Instruction Fuzzy Hash: 7031071290D69E54FE31DB7C5480379AB859F9EB94FD84332DA8E072F1CE2DAA05C630
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: mallocrealloc
                                                  • String ID:
                                                  • API String ID: 948496778-3916222277
                                                  • Opcode ID: 055651bcd441ae0d6536529a4b8216ef4b70e2bb82d3f8fecfe2edfe384afa3e
                                                  • Instruction ID: 2b29822ed03a2eb608071b3e29c80e9e247b6fabdb03475a16cb27d146d170da
                                                  • Opcode Fuzzy Hash: 055651bcd441ae0d6536529a4b8216ef4b70e2bb82d3f8fecfe2edfe384afa3e
                                                  • Instruction Fuzzy Hash: CC11A27260AB8182DB649F29F440269B3B0FB1CBD4F884637DA5D077A4EF78D590C360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: getsockoptsetsockopt
                                                  • String ID: @
                                                  • API String ID: 194641219-2726393805
                                                  • Opcode ID: 0a02be26702a17fb24d673bc1c7a38ce0ab4c02e4837c5bb589101a8385174c8
                                                  • Instruction ID: a32cae41d34c6409692a1709e1b31d91718be7022abad4a232cc50dd09d61817
                                                  • Opcode Fuzzy Hash: 0a02be26702a17fb24d673bc1c7a38ce0ab4c02e4837c5bb589101a8385174c8
                                                  • Instruction Fuzzy Hash: 55118671A0818A87E730DF29E840675F7B1FB88744F944232DA4907BB5DBBDD648CB10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfree
                                                  • String ID: %I64d-
                                                  • API String ID: 1865132094-19666937
                                                  • Opcode ID: 13fd4dfe167acea2e1c85cd6c7563738f3543cefa610d704341c827a4b5a28af
                                                  • Instruction ID: 864429895ddea9c442010353ebfa95c6b35a81dd305f332d4b1edd3dce456269
                                                  • Opcode Fuzzy Hash: 13fd4dfe167acea2e1c85cd6c7563738f3543cefa610d704341c827a4b5a28af
                                                  • Instruction Fuzzy Hash: 6111E572A06A86C1EF249F7C98853F853B2EB5CB49F584137C90C4E271DE2C96968330
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfree
                                                  • String ID: TRUE
                                                  • API String ID: 1865132094-3412697401
                                                  • Opcode ID: b9bcba089e7daf5a5108d1bf9e552f43ea53acd441afa2f1c8325fcdf4de783d
                                                  • Instruction ID: c82e71842e5c7d66847659852181a2664e18a74e7f25bc9e8b703c3a83f92ed8
                                                  • Opcode Fuzzy Hash: b9bcba089e7daf5a5108d1bf9e552f43ea53acd441afa2f1c8325fcdf4de783d
                                                  • Instruction Fuzzy Hash: 9501DB63B0965D44EB219B39F4042786762AB487A4FC40533CD0F063B4DE7CD1858320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: _strdupfreemalloc
                                                  • String ID: %s: %s
                                                  • API String ID: 3985033223-1451338302
                                                  • Opcode ID: c54095af87d9a4b0217f03e264ff0f02705c9544dec9f5f692171f7663123aa3
                                                  • Instruction ID: 1496f31a0825171731bf650ebdb5d0b31c93871d26ebb299c42b7832fcd5e322
                                                  • Opcode Fuzzy Hash: c54095af87d9a4b0217f03e264ff0f02705c9544dec9f5f692171f7663123aa3
                                                  • Instruction Fuzzy Hash: 42F03151A0D68982EA75A72AB8487B592517B49B90FC80233CE5F177769F3CD3899320
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF79B7303A8), ref: 00007FF79B73D2A1
                                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF79B7303A8), ref: 00007FF79B73D2B4
                                                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF79B7303A8), ref: 00007FF79B73D2DB
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF79B7303A8), ref: 00007FF79B73D2E8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$freemalloc
                                                  • String ID:
                                                  • API String ID: 2605342592-0
                                                  • Opcode ID: f423032592661c1c982721c03790951f0a4f6f553020798a1f396cad00f05043
                                                  • Instruction ID: 5a190462de315c3c4a24b3be982d5c97913f38922d30587ffb3a453d710467cb
                                                  • Opcode Fuzzy Hash: f423032592661c1c982721c03790951f0a4f6f553020798a1f396cad00f05043
                                                  • Instruction Fuzzy Hash: 63117321B0874682E720AB2AF44006AE6A1FF8DBD4F880636DB5D47B78DF3CD5548710
                                                  APIs
                                                    • Part of subcall function 00007FF79B6F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B6FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B6F1B61), ref: 00007FF79B6F5757
                                                    • Part of subcall function 00007FF79B6F5730: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B6FFD30,?,?,?,?,?,?,?,?,?,?,00000000,00007FF79B6F1B61), ref: 00007FF79B6F5763
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B6FBC36
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B6FBC46
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF79B6FBC54
                                                  • memset.VCRUNTIME140 ref: 00007FF79B6FBC8F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free$memset
                                                  • String ID:
                                                  • API String ID: 2717317152-0
                                                  • Opcode ID: 1e5daedeb21e13145359ccf6cb12b4fe34feceb6b44ae072303525098a0a7efc
                                                  • Instruction ID: f81fdc34390a731c210879bff0bcc245ffb9485790a66ba2eaa4407f8073d98f
                                                  • Opcode Fuzzy Hash: 1e5daedeb21e13145359ccf6cb12b4fe34feceb6b44ae072303525098a0a7efc
                                                  • Instruction Fuzzy Hash: 2C211D32E18B8593E714DB36DA812A8B360F799740F959226EB9C43A21DF74F1F1C300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: fb92b5897efe7a973630822f8ea6d2b801e1db37904bea41b264d208a555ce77
                                                  • Instruction ID: 12f3707e0003e620346252ef3454e0de32c15636c6eab4ec0e7009ca6b0592de
                                                  • Opcode Fuzzy Hash: fb92b5897efe7a973630822f8ea6d2b801e1db37904bea41b264d208a555ce77
                                                  • Instruction Fuzzy Hash: 6C11F436A08A4982EB64AF79E49123CB3A4FF98F84F944637CA4D02774CF3CD9548351
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 05884855c743f8b221a4d544d311eccb84a596cd1ba25f4f1d7d20ea28883d08
                                                  • Instruction ID: d4a080cc5b3a6e7f2c12144590cb2b73968d88bf6dd5927659d59cdc78969dbf
                                                  • Opcode Fuzzy Hash: 05884855c743f8b221a4d544d311eccb84a596cd1ba25f4f1d7d20ea28883d08
                                                  • Instruction Fuzzy Hash: AA11F836614B45C6D7509F69E580268B3A4F788F94F884136DE8E57738CF38E8A9C760
                                                  APIs
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B708405,?,?,00000000,00007FF79B7010C1,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B7321F0
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B708405,?,?,00000000,00007FF79B7010C1,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B732216
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B708405,?,?,00000000,00007FF79B7010C1,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B732224
                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF79B708405,?,?,00000000,00007FF79B7010C1,?,?,00000000,00007FF79B7015F5), ref: 00007FF79B732232
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032923730.00007FF79B6E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79B6E0000, based on PE: true
                                                  • Associated: 00000000.00000002.2032840820.00007FF79B6E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2032986911.00007FF79B741000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033004327.00007FF79B758000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2033018286.00007FF79B759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff79b6e0000_lvXRlexBnb.jbxd
                                                  Similarity
                                                  • API ID: free
                                                  • String ID:
                                                  • API String ID: 1294909896-0
                                                  • Opcode ID: 49bcb4bd4df464ddd61e42b1f9edd509c5c3826315286159958ab8f391a2e4fd
                                                  • Instruction ID: 0e2b2ef36a6c7ab7c159538ac3afb75f2c5dbfd56fa48eab4eabab63014fc594
                                                  • Opcode Fuzzy Hash: 49bcb4bd4df464ddd61e42b1f9edd509c5c3826315286159958ab8f391a2e4fd
                                                  • Instruction Fuzzy Hash: 71F0B636604B05C2DB149F75E995028B3A4FB98F887914222CA9D42774CF78C5A4C350