Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe
Analysis ID:1543362
MD5:8f8a0f2077cbfcd3629341d33bf37ce1
SHA1:40a72524fbb37571df5d6aa2ca2b92084f07d17d
SHA256:daf8cc294ba724439152137c2d028d6a54180d7f1ae98fec5a72c7bb11f9748a
Tags:exe
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe (PID: 3500 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe" MD5: 8F8A0F2077CBFCD3629341D33BF37CE1)
    • conhost.exe (PID: 6044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6180 cmdline: C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe" MD5 | find /i /v "md5" | find /i /v "certutil" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • certutil.exe (PID: 4564 cmdline: certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe" MD5 MD5: F17616EC0522FC5633151F7CAA278CAA)
      • find.exe (PID: 2228 cmdline: find /i /v "md5" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • find.exe (PID: 432 cmdline: find /i /v "certutil" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
    • cmd.exe (PID: 6640 cmdline: C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • cmd.exe (PID: 5652 cmdline: cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 4304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 6480 cmdline: timeout /t 5 MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • WerFault.exe (PID: 6768 cmdline: C:\Windows\system32\WerFault.exe -u -p 3500 -s 840 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeAvira: detected
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeReversingLabs: Detection: 65%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF68407EB60
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840BDED4 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,CloseHandle,CloseHandle,abort,0_2_00007FF6840BDED4
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840936A0 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF6840936A0
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe, 00000000.00000002.2086083684.00000158289BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe, 00000000.00000002.2086083684.00000158289BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/8n
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe, 00000000.00000002.2086083684.00000158289BC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/em
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840876900_2_00007FF684087690
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840618A00_2_00007FF6840618A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840882B00_2_00007FF6840882B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840863500_2_00007FF684086350
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF684045A3D0_2_00007FF684045A3D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF684061B500_2_00007FF684061B50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF684066B890_2_00007FF684066B89
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF684069C600_2_00007FF684069C60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840565700_2_00007FF684056570
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840685600_2_00007FF684068560
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF68405E5830_2_00007FF68405E583
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840496190_2_00007FF684049619
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840746900_2_00007FF684074690
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840626E00_2_00007FF6840626E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840697900_2_00007FF684069790
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840568900_2_00007FF684056890
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF68406489E0_2_00007FF68406489E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840969000_2_00007FF684096900
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840549000_2_00007FF684054900
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840641500_2_00007FF684064150
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840451F00_2_00007FF6840451F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF68405D22C0_2_00007FF68405D22C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840562400_2_00007FF684056240
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840622700_2_00007FF684062270
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840413300_2_00007FF684041330
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF68405D31A0_2_00007FF68405D31A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840784200_2_00007FF684078420
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF68405E45E0_2_00007FF68405E45E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840444800_2_00007FF684044480
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840914D00_2_00007FF6840914D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF684082DB00_2_00007FF684082DB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840AEEB00_2_00007FF6840AEEB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840BDED40_2_00007FF6840BDED4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840AFEE00_2_00007FF6840AFEE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF684056EE00_2_00007FF684056EE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF684055F000_2_00007FF684055F00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840940200_2_00007FF684094020
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF68409B0400_2_00007FF68409B040
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840800800_2_00007FF684080080
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840890F00_2_00007FF6840890F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF68404F9940_2_00007FF68404F994
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF684065A600_2_00007FF684065A60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF684056BB00_2_00007FF684056BB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: String function: 00007FF684085340 appears 146 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: String function: 00007FF684070230 appears 49 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: String function: 00007FF6840854C0 appears 127 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3500 -s 840
Source: classification engineClassification label: mal64.winEXE@18/1@1/2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF68406ECB0 GetLastError,_errno,FormatMessageA,strchr,strncpy,_errno,_errno,GetLastError,SetLastError,0_2_00007FF68406ECB0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6044:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4304:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6768:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\4873ecc0-53a5-4e36-8946-e9a11c50a0ddJump to behavior
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeReversingLabs: Detection: 65%
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory n
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe" MD5
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3500 -s 840
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840882B0 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF6840882B0
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-36538
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeAPI coverage: 6.2 %
Source: C:\Windows\System32\timeout.exe TID: 4164Thread sleep count: 38 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840BDED4 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,GetFileInformationByHandleEx,GetLastError,CloseHandle,abort,CloseHandle,CloseHandle,abort,0_2_00007FF6840BDED4
Source: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe, 00000000.00000002.2086083684.00000158289BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll~~
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840BF348 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF6840BF348
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840BF348 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF6840BF348
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840882B0 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF6840882B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF684072D90 GetProcessHeap,0_2_00007FF684072D90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840BEB10 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6840BEB10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_00007FF6840BDB20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840BF1C4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6840BF1C4
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF6840936A0 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF6840936A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeCode function: 0_2_00007FF684087000 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF684087000
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
12
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543362 Sample: SecuriteInfo.com.Win64.Cryp... Startdate: 27/10/2024 Architecture: WINDOWS Score: 64 32 keyauth.win 2->32 38 Antivirus / Scanner detection for submitted sample 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 Machine Learning detection for sample 2->42 44 AI detected suspicious sample 2->44 9 SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe 1 2->9         started        signatures3 process4 dnsIp5 34 keyauth.win 104.26.0.5, 443, 49708 CLOUDFLARENETUS United States 9->34 36 127.0.0.1 unknown unknown 9->36 12 cmd.exe 1 9->12         started        14 cmd.exe 1 9->14         started        16 conhost.exe 9->16         started        18 WerFault.exe 2 9->18         started        process6 process7 20 certutil.exe 3 1 12->20         started        22 find.exe 1 12->22         started        24 find.exe 1 12->24         started        26 cmd.exe 1 14->26         started        process8 28 conhost.exe 26->28         started        30 timeout.exe 1 26->30         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe66%ReversingLabsWin64.Trojan.Dacic
SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe100%AviraHEUR/AGEN.1315669
SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.2/emSecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe, 00000000.00000002.2086083684.00000158289BC000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://keyauth.win/api/1.2/8nSecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe, 00000000.00000002.2086083684.00000158289BC000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exefalse
        • URL Reputation: safe
        unknown
        https://curl.haxx.se/docs/http-cookies.html#SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exefalse
          unknown
          https://keyauth.win/api/1.2/SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe, 00000000.00000002.2086083684.00000158289BC000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            104.26.0.5
            keyauth.winUnited States
            13335CLOUDFLARENETUSfalse
            IP
            127.0.0.1
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1543362
            Start date and time:2024-10-27 18:38:14 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 47s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:16
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe
            Detection:MAL
            Classification:mal64.winEXE@18/1@1/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 90%
            • Number of executed functions: 48
            • Number of non-executed functions: 191
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • VT rate limit hit for: SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            104.26.0.5SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
              SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                  xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                    LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                      xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                        4aOgNkVU5z.exeGet hashmaliciousUnknownBrowse
                          xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                            dGuXzI4UlT.exeGet hashmaliciousUnknownBrowse
                              vjlICWbvGT.exeGet hashmaliciousUnknownBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                keyauth.winSecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                                • 104.26.1.5
                                xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                4aOgNkVU5z.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                dGuXzI4UlT.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                CLOUDFLARENETUSf6ffg1sZS2.exeGet hashmaliciousBabuk, DjvuBrowse
                                • 188.114.96.3
                                wo4POc0NG1.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                • 172.67.170.64
                                K3SRs78CAv.exeGet hashmaliciousLummaCBrowse
                                • 188.114.97.3
                                file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                • 104.21.95.91
                                file.exeGet hashmaliciousStealc, VidarBrowse
                                • 172.64.41.3
                                file.exeGet hashmaliciousLummaCBrowse
                                • 104.21.95.91
                                file.exeGet hashmaliciousLummaCBrowse
                                • 104.21.95.91
                                SecuriteInfo.com.Win64.CrypterX-gen.14264.32283.exeGet hashmaliciousLummaCBrowse
                                • 104.21.64.165
                                MilkaCheats.exeGet hashmaliciousLummaCBrowse
                                • 172.67.170.64
                                file.exeGet hashmaliciousLummaCBrowse
                                • 172.67.170.64
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                ce5f3254611a8c095a3d821d44539877SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                SecuriteInfo.com.FileRepMalware.12632.12594.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                SecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                SecuriteInfo.com.Win64.MalwareX-gen.29573.28124.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                                • 104.26.0.5
                                No context
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):908
                                Entropy (8bit):2.7140462697065146
                                Encrypted:false
                                SSDEEP:6:X6xARxNFz//7jNLjj0jxARxSBF623HZqkDeDFyF2eQj4tj9qC+tr+S4E+8n:jFz//V6BF/5qa4W2ep9qCq6Sd+G
                                MD5:434878B0D3BEDE71DA70AE4FBD6174BA
                                SHA1:ECAD00A6FCBA5B8BC49E3D41BC710FC3C12D3F92
                                SHA-256:8B085B32AF84B8680DAAC73160856C0B8847F3903AD80C4F8FBCB6E6AB30F12B
                                SHA-512:5B437CE3B1E2C885B2508EC35154708CB155C88DA7F6BEB00165203544855BF49F6A726CA3967F0D3461F2CE552FEBFBE2CC171B2DA0A3D9BD8F7F2F820E0C35
                                Malicious:false
                                Preview:.. ________ _______ __ ______ ______ _______ ________ _______ ..| \| \ | \ / \ / \ | \ | \| \ .. \$$$$$$$$| $$$$$$$\ | $$ | $$$$$$\| $$$$$$\| $$$$$$$\| $$$$$$$$| $$$$$$$\.. | $$ | $$ | $$ | $$ | $$ | $$| $$__| $$| $$ | $$| $$__ | $$__| $$.. | $$ | $$ | $$ | $$ | $$ | $$| $$ $$| $$ | $$| $$ \ | $$ $$.. | $$ | $$ | $$ | $$ | $$ | $$| $$$$$$$$| $$ | $$| $$$$$ | $$$$$$$\.. | $$ | $$__/ $$ | $$_____ | $$__/ $$| $$ | $$| $$__/ $$| $$_____ | $$ | $$.. | $$ | $$ $$ | $$ \ \$$ $$| $$ | $$| $$ $$| $$ \| $$ | $$.. \$$ \$$$$$$$ \$$$$$$$$ \$$$$$$ \$$ \$$ \$$$$$$$ \$$$$$$$$ \$$ \$$.... Copyright: 2020-2024 Tyhlu Designs, 2023-2024 TD Cheats. All rights reserved..... .... Connecting...
                                File type:PE32+ executable (console) x86-64, for MS Windows
                                Entropy (8bit):6.448209019269355
                                TrID:
                                • Win64 Executable Console (202006/5) 92.65%
                                • Win64 Executable (generic) (12005/4) 5.51%
                                • Generic Win/DOS Executable (2004/3) 0.92%
                                • DOS Executable Generic (2002/1) 0.92%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe
                                File size:678'912 bytes
                                MD5:8f8a0f2077cbfcd3629341d33bf37ce1
                                SHA1:40a72524fbb37571df5d6aa2ca2b92084f07d17d
                                SHA256:daf8cc294ba724439152137c2d028d6a54180d7f1ae98fec5a72c7bb11f9748a
                                SHA512:ac26fcfc0f095e2bf5288775271b16e70b82af94e493a46bef90b08c485bf4a779d71e1f3887fbf56828b9f27ee398539c2fe218f42e9e182f17982a22c35181
                                SSDEEP:12288:RPKyBIA3+tpT+DiDqTtWY7HCkLm387Qv3Iwmqy2:RnBI++bT4imd7HCIW8aYwmqy
                                TLSH:3FE47C6663A805FDD1A7C13ED547C613E7B2B44A131197DB03E08A792F23AE56E3E720
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......;d..............v}..i...y.e.w...y...u...y...{...y...Z...y...y...4}..d............u......kz..}...kz..}.......}.....g.~.......~..
                                Icon Hash:00928e8e8686b000
                                Entrypoint:0x14007e820
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x140000000
                                Subsystem:windows cui
                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Time Stamp:0x65F0235F [Tue Mar 12 09:41:51 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:8fde999cb346822ba72bb22b1c8eea24
                                Instruction
                                dec eax
                                sub esp, 28h
                                call 00007FA931234650h
                                dec eax
                                add esp, 28h
                                jmp 00007FA931233B27h
                                int3
                                int3
                                inc eax
                                push ebx
                                dec eax
                                sub esp, 20h
                                dec eax
                                mov ebx, ecx
                                dec eax
                                lea ecx, dword ptr [00023604h]
                                call dword ptr [00003A56h]
                                mov eax, dword ptr [00022824h]
                                dec eax
                                lea ecx, dword ptr [000235F1h]
                                mov edx, dword ptr [000235F3h]
                                inc eax
                                mov dword ptr [0002280Fh], eax
                                mov dword ptr [ebx], eax
                                dec eax
                                mov eax, dword ptr [00000058h]
                                inc ecx
                                mov ecx, 00000004h
                                dec esp
                                mov eax, dword ptr [eax+edx*8]
                                mov eax, dword ptr [000227F4h]
                                inc ebx
                                mov dword ptr [ecx+eax], eax
                                call dword ptr [00003A1Eh]
                                dec eax
                                lea ecx, dword ptr [000235AFh]
                                dec eax
                                add esp, 20h
                                pop ebx
                                dec eax
                                jmp dword ptr [000039FBh]
                                int3
                                int3
                                int3
                                inc eax
                                push ebx
                                dec eax
                                sub esp, 20h
                                dec eax
                                mov ebx, ecx
                                dec eax
                                lea ecx, dword ptr [00023598h]
                                call dword ptr [000039EAh]
                                cmp dword ptr [ebx], 00000000h
                                jne 00007FA931233CD4h
                                or dword ptr [ebx], FFFFFFFFh
                                jmp 00007FA931233CF7h
                                inc ebp
                                xor ecx, ecx
                                dec eax
                                lea edx, dword ptr [0002357Eh]
                                inc ecx
                                or eax, FFFFFFFFh
                                dec eax
                                lea ecx, dword ptr [0002356Bh]
                                call dword ptr [000039B5h]
                                jmp 00007FA931233C8Bh
                                cmp dword ptr [ebx], FFFFFFFFh
                                je 00007FA931233C90h
                                dec eax
                                mov eax, dword ptr [00000058h]
                                Programming Language:
                                • [IMP] VS2008 SP1 build 30729
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x9cf400x21c.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xa90000x1e8.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa30000x52ec.pdata
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa0000x614.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x92b600x38.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x92c000x28.rdata
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x92a200x140.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x820000xc40.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x809b00x80a0048d3b891b4de7761bff0a3a9f255bbbdFalse0.5113277453838678data6.372398896627008IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x820000x1e2c60x1e400b5d6422e18c473be8ba60a6c66ecf4a5False0.38821991219008267data5.675715594677276IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0xa10000x17f80xc008f6facb7d7af56a0506bcf1882509d8cFalse0.19986979166666666data4.142906755061736IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .pdata0xa30000x52ec0x54000f6c063fd8c7a30d976e3c4ee499be93False0.4853515625data5.808578835799168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .rsrc0xa90000x1e80x200750412ba0246dedb4b9b41d91e308d32False0.541015625data4.762595083624659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xaa0000x6140x80083536656970e1d8db73040fc9ceaff76False0.44384765625data4.623832176615856IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_MANIFEST0xa90600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                DLLImport
                                KERNEL32.dllMoveFileExA, WaitForSingleObjectEx, MultiByteToWideChar, GetEnvironmentVariableA, GetFileType, ReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, WideCharToMultiByte, OutputDebugStringW, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, EnterCriticalSection, LocalFree, FormatMessageA, SetLastError, QueryFullProcessImageNameW, GetModuleHandleW, GetModuleHandleA, GetModuleFileNameW, GetModuleFileNameA, UnmapViewOfFile, MapViewOfFile, CreateFileMappingW, VirtualProtect, CreateThread, GetCurrentProcess, DeleteCriticalSection, InitializeCriticalSectionEx, GetProcessHeap, HeapSize, HeapFree, QueryPerformanceCounter, IsDebuggerPresent, IsProcessorFeaturePresent, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetFileInformationByHandleEx, AreFileApisANSI, GetFileAttributesExW, FindFirstFileW, FindClose, CreateDirectoryW, GetCurrentDirectoryW, GetLocaleInfoEx, GetTickCount, VerifyVersionInfoA, LoadLibraryA, GetProcAddress, FreeLibrary, GetSystemDirectoryA, QueryPerformanceFrequency, SleepEx, VerSetConditionMask, HeapReAlloc, HeapAlloc, SetConsoleTextAttribute, HeapDestroy, GetLastError, CreateFileW, SetConsoleTitleA, CloseHandle, Sleep, SetFileAttributesW, GetFileAttributesW, GetStdHandle, LeaveCriticalSection
                                USER32.dllMessageBoxA
                                ADVAPI32.dllCryptAcquireContextA, AddAccessAllowedAce, GetLengthSid, GetTokenInformation, InitializeAcl, IsValidSid, SetSecurityInfo, CopySid, ConvertSidToStringSidA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptEncrypt, CryptImportKey, CryptDestroyKey, OpenProcessToken
                                SHELL32.dllShellExecuteA
                                MSVCP140.dll??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?setf@ios_base@std@@QEAAHHH@Z, ?pbase@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD0@Z, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ??Bid@locale@std@@QEAA_KXZ, _Query_perf_frequency, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z, ?_Throw_Cpp_error@std@@YAXH@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?uncaught_exception@std@@YA_NXZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?_Xout_of_range@std@@YAXPEBD@Z, ?_Winerror_map@std@@YAHH@Z, ?_Xbad_function_call@std@@YAXXZ, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?_Xlength_error@std@@YAXPEBD@Z, ?_Syserror_map@std@@YAPEBDH@Z, _Cnd_do_broadcast_at_thread_exit, _Thrd_sleep, _Query_perf_counter, _Xtime_get_ticks, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ
                                SHLWAPI.dllPathFindFileNameW
                                Normaliz.dllIdnToAscii
                                WLDAP32.dll
                                CRYPT32.dllCertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertGetCertificateChain, CertFindExtension, CertFreeCertificateChain, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertAddCertificateContextToStore, CertOpenStore
                                WS2_32.dllhtonl, setsockopt, getaddrinfo, select, accept, WSACleanup, socket, WSASetLastError, WSAIoctl, WSAStartup, closesocket, recv, send, WSAGetLastError, bind, connect, getpeername, listen, getsockname, getsockopt, htons, ntohs, freeaddrinfo, recvfrom, sendto, gethostname, ioctlsocket, __WSAFDIsSet, ntohl
                                RPCRT4.dllUuidToStringA, RpcStringFreeA, UuidCreate
                                PSAPI.DLLGetModuleInformation
                                USERENV.dllUnloadUserProfile
                                VCRUNTIME140_1.dll__CxxFrameHandler4
                                VCRUNTIME140.dll__C_specific_handler, strstr, strrchr, __current_exception, __current_exception_context, strchr, __std_exception_destroy, __std_exception_copy, __std_terminate, _CxxThrowException, memchr, memcmp, memcpy, memmove, memset
                                api-ms-win-crt-runtime-l1-1-0.dll_initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, _configure_narrow_argv, _get_initial_narrow_environment, _initterm_e, _exit, _invalid_parameter_noinfo, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, strerror, _getpid, _resetstkoflw, terminate, abort, _errno, _invalid_parameter_noinfo_noreturn, _initterm, _beginthreadex, system, __sys_nerr, exit
                                api-ms-win-crt-stdio-l1-1-0.dll_pclose, fclose, _popen, _close, fgets, fflush, fseek, feof, __acrt_iob_func, __stdio_common_vsscanf, fputs, fopen, _get_stream_buffer_pointers, _lseeki64, _fseeki64, fread, fsetpos, ungetc, setvbuf, fgetpos, fgetc, __stdio_common_vsprintf, _write, fwrite, _read, __p__commode, _set_fmode, fputc, _open, ftell
                                api-ms-win-crt-heap-l1-1-0.dllcalloc, malloc, free, _set_new_mode, realloc, _callnewh
                                api-ms-win-crt-math-l1-1-0.dll_dsign, __setusermatherr, _dclass
                                api-ms-win-crt-string-l1-1-0.dllstrpbrk, tolower, strncpy, strcmp, _strdup, strcspn, strspn, strncmp, isupper
                                api-ms-win-crt-convert-l1-1-0.dllstrtoul, strtod, strtol, atoi, strtoll, strtoull
                                api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _unlock_file, _access, _lock_file, remove, _stat64, _unlink
                                api-ms-win-crt-time-l1-1-0.dll_localtime64, _time64, _gmtime64, strftime
                                api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, localeconv, ___lc_codepage_func
                                api-ms-win-crt-utility-l1-1-0.dllrand, qsort
                                api-ms-win-crt-environment-l1-1-0.dllgetenv
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 27, 2024 18:39:08.124013901 CET49708443192.168.2.5104.26.0.5
                                Oct 27, 2024 18:39:08.124051094 CET44349708104.26.0.5192.168.2.5
                                Oct 27, 2024 18:39:08.124385118 CET49708443192.168.2.5104.26.0.5
                                Oct 27, 2024 18:39:08.137099981 CET49708443192.168.2.5104.26.0.5
                                Oct 27, 2024 18:39:08.137114048 CET44349708104.26.0.5192.168.2.5
                                Oct 27, 2024 18:39:08.761173010 CET44349708104.26.0.5192.168.2.5
                                Oct 27, 2024 18:39:08.761249065 CET49708443192.168.2.5104.26.0.5
                                Oct 27, 2024 18:39:09.628288984 CET49708443192.168.2.5104.26.0.5
                                Oct 27, 2024 18:39:09.628305912 CET44349708104.26.0.5192.168.2.5
                                Oct 27, 2024 18:39:09.628336906 CET49708443192.168.2.5104.26.0.5
                                Oct 27, 2024 18:39:09.628597021 CET44349708104.26.0.5192.168.2.5
                                Oct 27, 2024 18:39:09.628662109 CET49708443192.168.2.5104.26.0.5
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 27, 2024 18:39:08.104480028 CET5373953192.168.2.51.1.1.1
                                Oct 27, 2024 18:39:08.117630959 CET53537391.1.1.1192.168.2.5
                                Oct 27, 2024 18:39:48.529230118 CET5350789162.159.36.2192.168.2.5
                                Oct 27, 2024 18:39:49.165055037 CET53597691.1.1.1192.168.2.5
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Oct 27, 2024 18:39:08.104480028 CET192.168.2.51.1.1.10x891dStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Oct 27, 2024 18:39:08.117630959 CET1.1.1.1192.168.2.50x891dNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                Oct 27, 2024 18:39:08.117630959 CET1.1.1.1192.168.2.50x891dNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                Oct 27, 2024 18:39:08.117630959 CET1.1.1.1192.168.2.50x891dNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:13:39:05
                                Start date:27/10/2024
                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe"
                                Imagebase:0x7ff684040000
                                File size:678'912 bytes
                                MD5 hash:8F8A0F2077CBFCD3629341D33BF37CE1
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:1
                                Start time:13:39:05
                                Start date:27/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:13:39:07
                                Start date:27/10/2024
                                Path:C:\Windows\System32\cmd.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                                Imagebase:0x7ff7067a0000
                                File size:289'792 bytes
                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:13:39:07
                                Start date:27/10/2024
                                Path:C:\Windows\System32\certutil.exe
                                Wow64 process (32bit):false
                                Commandline:certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exe" MD5
                                Imagebase:0x7ff6bc610000
                                File size:1'651'712 bytes
                                MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:5
                                Start time:13:39:07
                                Start date:27/10/2024
                                Path:C:\Windows\System32\find.exe
                                Wow64 process (32bit):false
                                Commandline:find /i /v "md5"
                                Imagebase:0x7ff7f8150000
                                File size:17'920 bytes
                                MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:6
                                Start time:13:39:07
                                Start date:27/10/2024
                                Path:C:\Windows\System32\find.exe
                                Wow64 process (32bit):false
                                Commandline:find /i /v "certutil"
                                Imagebase:0x7ff7f8150000
                                File size:17'920 bytes
                                MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:7
                                Start time:13:39:09
                                Start date:27/10/2024
                                Path:C:\Windows\System32\cmd.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                Imagebase:0x7ff7067a0000
                                File size:289'792 bytes
                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:8
                                Start time:13:39:09
                                Start date:27/10/2024
                                Path:C:\Windows\System32\cmd.exe
                                Wow64 process (32bit):false
                                Commandline:cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                Imagebase:0x7ff7067a0000
                                File size:289'792 bytes
                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:9
                                Start time:13:39:09
                                Start date:27/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:12
                                Start time:13:39:09
                                Start date:27/10/2024
                                Path:C:\Windows\System32\timeout.exe
                                Wow64 process (32bit):false
                                Commandline:timeout /t 5
                                Imagebase:0x7ff6970a0000
                                File size:32'768 bytes
                                MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:13
                                Start time:13:39:09
                                Start date:27/10/2024
                                Path:C:\Windows\System32\WerFault.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\WerFault.exe -u -p 3500 -s 840
                                Imagebase:0x7ff787c60000
                                File size:570'736 bytes
                                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:5.2%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:29.7%
                                  Total number of Nodes:1991
                                  Total number of Limit Nodes:83
                                  execution_graph 34441 7ff68406ee2a 34442 7ff68406ed35 34441->34442 34454 7ff68406edbe 34441->34454 34457 7ff684073cd0 34442->34457 34444 7ff68406f247 strncpy 34446 7ff68406f25a _errno 34444->34446 34445 7ff68406f224 34448 7ff684073cd0 13 API calls 34445->34448 34450 7ff68406f265 _errno 34446->34450 34451 7ff68406f26e GetLastError 34446->34451 34449 7ff68406f245 34448->34449 34449->34446 34450->34451 34452 7ff68406f278 SetLastError 34451->34452 34453 7ff68406f280 34451->34453 34452->34453 34460 7ff6840be2f0 34453->34460 34454->34444 34454->34445 34469 7ff684074690 13 API calls 34457->34469 34459 7ff68406ed57 FormatMessageA strchr 34459->34454 34461 7ff6840be2f9 34460->34461 34462 7ff68406f293 34461->34462 34463 7ff6840beb44 IsProcessorFeaturePresent 34461->34463 34464 7ff6840beb5c 34463->34464 34470 7ff6840bed38 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 34464->34470 34466 7ff6840beb6f 34471 7ff6840beb10 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 34466->34471 34469->34459 34470->34466 34472 7ff684077348 34473 7ff684077213 34472->34473 34474 7ff6840771fd 34472->34474 34483 7ff684076d1b 34473->34483 34531 7ff68408a1c0 free 34473->34531 34474->34473 34490 7ff6840767a0 34474->34490 34478 7ff684077dc2 34479 7ff684077db3 34558 7ff684085340 19 API calls 34479->34558 34481 7ff684077f40 17 API calls 34481->34483 34483->34478 34483->34479 34483->34481 34486 7ff684076dbe 34483->34486 34489 7ff6840767a0 292 API calls 34483->34489 34524 7ff684086bc0 34483->34524 34530 7ff684085340 19 API calls 34483->34530 34532 7ff684080eb0 34483->34532 34556 7ff6840754c0 15 API calls 34483->34556 34557 7ff684093e20 22 API calls 34483->34557 34486->34483 34487 7ff684085340 19 API calls 34486->34487 34487->34486 34489->34483 34491 7ff6840767dc 34490->34491 34492 7ff6840768b2 34490->34492 34559 7ff68407a9d0 34491->34559 34495 7ff6840be2f0 8 API calls 34492->34495 34494 7ff6840767e7 free free 34496 7ff684076817 34494->34496 34497 7ff6840768e7 34495->34497 34498 7ff684076855 34496->34498 34587 7ff684093900 22 API calls 34496->34587 34497->34473 34577 7ff684077f40 34498->34577 34501 7ff68407686f 34501->34492 34502 7ff68407691c 34501->34502 34588 7ff68408db20 free free free free 34501->34588 34581 7ff68408d160 34502->34581 34506 7ff68407694b 34507 7ff684076950 free 34506->34507 34507->34507 34508 7ff68407696e 34507->34508 34509 7ff684076a9b 34508->34509 34510 7ff6840769d7 34508->34510 34512 7ff684080eb0 90 API calls 34509->34512 34511 7ff684073cd0 13 API calls 34510->34511 34513 7ff684076a36 34511->34513 34514 7ff684076acd 34512->34514 34589 7ff68407e1c0 92 API calls 34513->34589 34602 7ff684081030 292 API calls 34514->34602 34517 7ff684076a57 34518 7ff684076a5b 34517->34518 34519 7ff684076a85 34517->34519 34590 7ff6840854c0 34518->34590 34601 7ff684081030 292 API calls 34519->34601 34525 7ff684086c0a 34524->34525 34527 7ff684086c2a 34525->34527 34609 7ff68408c3f0 34525->34609 34528 7ff6840be2f0 8 API calls 34527->34528 34529 7ff684086cbe 34528->34529 34529->34483 34530->34483 34531->34483 34533 7ff684080fec 34532->34533 34535 7ff684080ed2 34532->34535 34533->34483 34534 7ff684080eff 34537 7ff68408d160 9 API calls 34534->34537 34535->34533 34535->34534 34615 7ff68408db20 free free free free 34535->34615 34538 7ff684080f12 34537->34538 34612 7ff6840af640 34538->34612 34540 7ff684080f1a 34541 7ff6840af250 7 API calls 34540->34541 34542 7ff684080f22 34541->34542 34543 7ff6840854c0 15 API calls 34542->34543 34544 7ff684080f63 34543->34544 34545 7ff68407a690 16 API calls 34544->34545 34546 7ff684080f6b 34545->34546 34547 7ff684080f97 34546->34547 34548 7ff684085fa0 closesocket free 34546->34548 34549 7ff684080fac 34547->34549 34550 7ff684085fa0 closesocket free 34547->34550 34548->34547 34551 7ff684080fc1 34549->34551 34552 7ff684085fa0 closesocket free 34549->34552 34550->34549 34553 7ff684080fd6 34551->34553 34554 7ff684085fa0 closesocket free 34551->34554 34552->34551 34555 7ff684082030 44 API calls 34553->34555 34554->34553 34555->34533 34556->34483 34557->34483 34558->34478 34560 7ff68407a9f7 34559->34560 34561 7ff68407a9e5 34559->34561 34563 7ff68407ab08 EnterCriticalSection LeaveCriticalSection 34560->34563 34564 7ff68407ab94 free 34560->34564 34561->34560 34562 7ff68407a9eb 34561->34562 34603 7ff6840979e0 WaitForSingleObjectEx CloseHandle 34562->34603 34566 7ff68407ab4b 34563->34566 34567 7ff68407ab41 CloseHandle 34563->34567 34564->34494 34569 7ff68407ab59 34566->34569 34570 7ff68407ab51 34566->34570 34571 7ff68407ab6c 34567->34571 34568 7ff68407a9f0 34568->34560 34605 7ff68407abb0 7 API calls 34569->34605 34604 7ff6840979e0 WaitForSingleObjectEx CloseHandle 34570->34604 34573 7ff68407ab81 closesocket 34571->34573 34606 7ff6840755a0 free 34571->34606 34573->34564 34576 7ff68407ab62 free 34576->34571 34578 7ff684077f90 34577->34578 34579 7ff684077f57 34577->34579 34578->34501 34607 7ff684075290 17 API calls 34579->34607 34582 7ff68408d1da 34581->34582 34586 7ff68408d181 34581->34586 34583 7ff6840be2f0 8 API calls 34582->34583 34585 7ff68407692b free 34583->34585 34584 7ff68408d1a3 _time64 34584->34582 34585->34506 34585->34508 34586->34582 34586->34584 34587->34498 34588->34502 34589->34517 34591 7ff6840854c9 34590->34591 34592 7ff684076a76 34590->34592 34599 7ff684085599 34591->34599 34608 7ff684073dd0 13 API calls 34591->34608 34600 7ff684081030 292 API calls 34592->34600 34594 7ff6840be2f0 8 API calls 34594->34592 34595 7ff68408551c 34596 7ff684085581 34595->34596 34598 7ff684073cd0 13 API calls 34595->34598 34597 7ff6840855ce fwrite fwrite 34596->34597 34596->34599 34597->34599 34598->34596 34599->34594 34603->34568 34604->34569 34605->34576 34606->34573 34607->34578 34608->34595 34610 7ff68408c402 QueryPerformanceCounter 34609->34610 34611 7ff68408c43d GetTickCount 34609->34611 34610->34527 34611->34527 34616 7ff6840b2bc0 8 API calls 34612->34616 34614 7ff6840af655 34615->34534 34616->34614 34617 7ff68406c109 34618 7ff68406c119 34617->34618 34653 7ff6840700b0 34618->34653 34620 7ff68406c498 34741 7ff684041e40 ?_Xlength_error@std@@YAXPEBD 34620->34741 34621 7ff68406c1d6 34623 7ff68406c222 34621->34623 34674 7ff68404c3c0 34621->34674 34623->34620 34717 7ff6840491b0 34623->34717 34626 7ff68406c2f0 34628 7ff6840491b0 22 API calls 34626->34628 34627 7ff68406c218 34691 7ff684065800 34627->34691 34637 7ff68406c2ff 34628->34637 34634 7ff68406c372 34635 7ff68406c3c1 34634->34635 34639 7ff68406c3bc 34634->34639 34642 7ff68406c3b5 _invalid_parameter_noinfo_noreturn 34634->34642 34640 7ff68406c40b 34635->34640 34644 7ff68406c403 34635->34644 34647 7ff68406c48a _invalid_parameter_noinfo_noreturn 34635->34647 34636 7ff68406c36d 34738 7ff6840be58c 34636->34738 34637->34634 34637->34636 34641 7ff68406c366 _invalid_parameter_noinfo_noreturn 34637->34641 34643 7ff6840be58c Concurrency::wait free 34639->34643 34645 7ff68406c451 34640->34645 34646 7ff68406c449 34640->34646 34649 7ff68406c491 _invalid_parameter_noinfo_noreturn 34640->34649 34641->34636 34642->34639 34643->34635 34648 7ff6840be58c Concurrency::wait free 34644->34648 34651 7ff6840be2f0 8 API calls 34645->34651 34650 7ff6840be58c Concurrency::wait free 34646->34650 34647->34649 34648->34640 34649->34620 34650->34645 34652 7ff68406c46f 34651->34652 34654 7ff6840700c9 34653->34654 34655 7ff6840700bf 34653->34655 34656 7ff6840700fa 34654->34656 34657 7ff6840700e2 34654->34657 34655->34621 34662 7ff684070116 34656->34662 34742 7ff684075660 calloc 34656->34742 34790 7ff684085340 19 API calls 34657->34790 34660 7ff68407011e 34660->34621 34661 7ff6840700ee 34661->34621 34662->34660 34770 7ff684075f10 34662->34770 34664 7ff684070172 34665 7ff684070178 34664->34665 34672 7ff6840701a3 34664->34672 34791 7ff6840760c0 292 API calls 34665->34791 34667 7ff6840701f8 34792 7ff6840763d0 292 API calls 34667->34792 34668 7ff684070180 34668->34621 34671 7ff684070218 34671->34621 34672->34667 34777 7ff6840763a0 34672->34777 34780 7ff684076290 34672->34780 34675 7ff68404c3e6 34674->34675 34676 7ff68404c4b1 34674->34676 34677 7ff68404c40c 34675->34677 34678 7ff68404c3f4 memcpy 34675->34678 35067 7ff684041e40 ?_Xlength_error@std@@YAXPEBD 34676->35067 34680 7ff68404c41d 34677->34680 34681 7ff68404c4b6 34677->34681 34682 7ff68404c474 34677->34682 34678->34627 35058 7ff6840be310 34680->35058 35068 7ff684041da0 __std_exception_copy Concurrency::cancel_current_task 34681->35068 34683 7ff68404c438 memcpy 34682->34683 34687 7ff6840be310 std::_Facet_Register 3 API calls 34682->34687 34683->34627 34686 7ff68404c4bc 34687->34683 34689 7ff68404c433 34689->34683 34690 7ff68404c46d _invalid_parameter_noinfo_noreturn 34689->34690 34690->34682 34692 7ff684065a4b 34691->34692 34694 7ff684065845 34691->34694 35085 7ff684041e40 ?_Xlength_error@std@@YAXPEBD 34692->35085 35071 7ff68405fa90 34694->35071 34697 7ff68406587e 34698 7ff684065898 memcpy 34697->34698 34699 7ff6840658d3 34697->34699 34700 7ff6840658f4 system 34698->34700 35084 7ff68404ce90 10 API calls 3 library calls 34699->35084 34702 7ff68406594b 34700->34702 34703 7ff684065980 34700->34703 34705 7ff68406597b 34702->34705 34708 7ff684065974 _invalid_parameter_noinfo_noreturn 34702->34708 34704 7ff6840659d6 34703->34704 34706 7ff6840659d1 34703->34706 34710 7ff6840659ca _invalid_parameter_noinfo_noreturn 34703->34710 34707 7ff684065a10 34704->34707 34712 7ff684065a08 34704->34712 34714 7ff684065a44 _invalid_parameter_noinfo_noreturn 34704->34714 34709 7ff6840be58c Concurrency::wait free 34705->34709 34711 7ff6840be58c Concurrency::wait free 34706->34711 34713 7ff6840be2f0 8 API calls 34707->34713 34708->34705 34709->34703 34710->34706 34711->34704 34715 7ff6840be58c Concurrency::wait free 34712->34715 34716 7ff684065a33 34713->34716 34714->34692 34715->34707 34716->34623 34718 7ff6840491de 34717->34718 34719 7ff6840492b9 34718->34719 34724 7ff6840491f4 34718->34724 35087 7ff684041e40 ?_Xlength_error@std@@YAXPEBD 34719->35087 34721 7ff684049202 34721->34626 34722 7ff6840492be 35088 7ff684041da0 __std_exception_copy Concurrency::cancel_current_task 34722->35088 34723 7ff68404922a 34727 7ff6840be310 std::_Facet_Register 3 API calls 34723->34727 34724->34721 34724->34722 34724->34723 34725 7ff684049284 34724->34725 34728 7ff68404928e memcpy 34725->34728 34731 7ff6840be310 std::_Facet_Register 3 API calls 34725->34731 34730 7ff684049240 34727->34730 34728->34626 34729 7ff6840492c4 35089 7ff684045930 15 API calls 34729->35089 34733 7ff68404927d _invalid_parameter_noinfo_noreturn 34730->34733 34734 7ff684049248 34730->34734 34731->34728 34733->34725 34734->34728 34739 7ff6840bea14 free 34738->34739 34743 7ff68407569b 34742->34743 34744 7ff68407568b 34742->34744 34793 7ff68408d730 34743->34793 34744->34662 34747 7ff6840757b7 34838 7ff68408ca10 free 34747->34838 34750 7ff6840757c3 34839 7ff68408ca10 free 34750->34839 34751 7ff6840756e2 34751->34747 34801 7ff68407e000 34751->34801 34753 7ff6840757cf 34840 7ff68407dba0 free 34753->34840 34756 7ff6840756f8 34756->34747 34757 7ff684075700 34756->34757 34810 7ff68408cd30 34757->34810 34758 7ff6840757db 34759 7ff6840757f1 free 34758->34759 34763 7ff68407579c 34759->34763 34761 7ff684075738 34817 7ff6840936a0 socket 34761->34817 34763->34662 34766 7ff684075769 34767 7ff684075782 closesocket closesocket 34766->34767 34837 7ff6840938d0 ioctlsocket 34766->34837 34767->34763 34769 7ff68407577e 34769->34763 34769->34767 34771 7ff684075f29 34770->34771 34772 7ff684075f58 34770->34772 34771->34772 34985 7ff684075290 17 API calls 34771->34985 34772->34664 34774 7ff68407602d 34986 7ff684075d60 10 API calls 34774->34986 34776 7ff68407608b 34776->34664 34987 7ff684075860 34777->34987 34781 7ff68408c3f0 2 API calls 34780->34781 34785 7ff6840762b7 34781->34785 34782 7ff684076313 34786 7ff68407636c 34782->34786 35051 7ff68408dec0 8 API calls 34782->35051 35052 7ff684075e00 8 API calls 34782->35052 34785->34782 34787 7ff6840762d8 34785->34787 35037 7ff684076cc0 34785->35037 34786->34787 35053 7ff684075d60 10 API calls 34786->35053 34787->34672 34790->34661 34791->34668 34792->34671 34794 7ff68408ca80 malloc 34793->34794 34795 7ff6840756b2 34794->34795 34795->34747 34796 7ff68408ca80 34795->34796 34797 7ff68408cb36 34796->34797 34798 7ff68408ca97 34796->34798 34797->34751 34798->34797 34799 7ff68408cab7 malloc 34798->34799 34800 7ff68408cae6 34799->34800 34800->34751 34841 7ff68406fff0 34801->34841 34803 7ff68407e019 34804 7ff68407e022 34803->34804 34805 7ff68408ca80 malloc 34803->34805 34804->34756 34806 7ff68407e05b 34805->34806 34807 7ff68407e07c 34806->34807 34849 7ff6840809f0 34806->34849 34807->34756 34811 7ff68408cd4f socket 34810->34811 34812 7ff68408cd39 34810->34812 34813 7ff68408cd65 34811->34813 34814 7ff68408cd6c 34811->34814 34812->34761 34813->34761 34975 7ff684085fa0 34814->34975 34816 7ff68408cd76 34816->34761 34818 7ff6840936f5 htonl setsockopt 34817->34818 34819 7ff6840936f0 34817->34819 34820 7ff684093754 bind 34818->34820 34821 7ff68409387b closesocket closesocket closesocket 34818->34821 34822 7ff6840be2f0 8 API calls 34819->34822 34820->34821 34823 7ff68409376f getsockname 34820->34823 34821->34819 34824 7ff684075754 34822->34824 34823->34821 34825 7ff68409378b listen 34823->34825 34824->34763 34836 7ff6840938d0 ioctlsocket 34824->34836 34825->34821 34826 7ff6840937a0 socket 34825->34826 34826->34821 34827 7ff6840937bb connect 34826->34827 34827->34821 34828 7ff6840937d6 accept 34827->34828 34828->34821 34829 7ff6840937f2 34828->34829 34830 7ff684073cd0 13 API calls 34829->34830 34831 7ff684093809 send 34830->34831 34831->34821 34833 7ff68409383a recv 34831->34833 34833->34821 34834 7ff684093858 memcmp 34833->34834 34834->34821 34835 7ff68409386e closesocket 34834->34835 34835->34819 34836->34766 34837->34769 34838->34750 34839->34753 34840->34758 34842 7ff68406fffd calloc 34841->34842 34848 7ff684070060 34841->34848 34844 7ff684070052 34842->34844 34846 7ff68407008c 34844->34846 34882 7ff6840882b0 34844->34882 34845 7ff684070081 34845->34803 34846->34803 34848->34846 34913 7ff684081330 calloc 34848->34913 34850 7ff68407e06a 34849->34850 34851 7ff6840809ff 34849->34851 34850->34756 34851->34850 34971 7ff6840754c0 15 API calls 34851->34971 34853 7ff684080a1d 34854 7ff684080a31 34853->34854 34972 7ff6840763d0 292 API calls 34853->34972 34856 7ff684080a42 34854->34856 34973 7ff6840760c0 292 API calls 34854->34973 34858 7ff684080a66 free 34856->34858 34859 7ff684080a73 34856->34859 34858->34859 34974 7ff684081030 292 API calls 34859->34974 34883 7ff6840882ce WSAStartup 34882->34883 34884 7ff684088316 34882->34884 34886 7ff6840882e2 34883->34886 34887 7ff6840882f9 34883->34887 34932 7ff6840b0db0 34884->34932 34886->34884 34890 7ff6840882f3 WSACleanup 34886->34890 34888 7ff6840be2f0 8 API calls 34887->34888 34891 7ff68408830e 34888->34891 34890->34887 34891->34848 34892 7ff6840885df 34894 7ff6840be2f0 8 API calls 34892->34894 34893 7ff684088323 GetModuleHandleA 34895 7ff68408835e GetProcAddress strpbrk 34893->34895 34896 7ff684088352 34893->34896 34897 7ff6840885ef 34894->34897 34899 7ff684088395 34895->34899 34900 7ff6840883bb 34895->34900 34898 7ff6840884e3 7 API calls 34896->34898 34897->34848 34898->34892 34901 7ff6840883ad LoadLibraryA 34899->34901 34904 7ff68408839d 34899->34904 34902 7ff6840883c0 GetProcAddress 34900->34902 34903 7ff6840883ea GetSystemDirectoryA 34900->34903 34901->34904 34902->34903 34906 7ff6840883d5 LoadLibraryExA 34902->34906 34903->34904 34905 7ff684088407 malloc 34903->34905 34904->34898 34909 7ff6840884be GetProcAddress 34904->34909 34907 7ff684088499 free 34905->34907 34908 7ff68408841c GetSystemDirectoryA 34905->34908 34906->34904 34907->34904 34908->34907 34910 7ff68408842c 34908->34910 34909->34898 34911 7ff684088490 LoadLibraryA 34910->34911 34912 7ff684088486 34910->34912 34911->34912 34912->34907 34914 7ff684081356 34913->34914 34915 7ff684081365 34913->34915 34914->34845 34966 7ff68407a850 calloc 34915->34966 34917 7ff684081388 34918 7ff68408139c malloc 34917->34918 34919 7ff68408138e free 34917->34919 34920 7ff684081688 34918->34920 34921 7ff6840813b7 malloc 34918->34921 34931 7ff68408166a 34919->34931 34924 7ff684081694 free free 34920->34924 34921->34920 34922 7ff6840813d2 __acrt_iob_func __acrt_iob_func __acrt_iob_func 34921->34922 34967 7ff68407b800 memset 34922->34967 34970 7ff684081090 free free free 34924->34970 34926 7ff6840814f2 34968 7ff68407f2d0 free realloc GetEnvironmentVariableA realloc free 34926->34968 34929 7ff6840815b6 34969 7ff684085170 free free free free free 34929->34969 34931->34845 34933 7ff6840b0dbe 34932->34933 34938 7ff68408831b 34932->34938 34940 7ff684088130 34933->34940 34937 7ff6840b0dea 34937->34938 34939 7ff6840b0df6 GetProcAddressForCaller 34937->34939 34938->34892 34938->34893 34939->34938 34941 7ff68408815d 34940->34941 34942 7ff68408820f VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 34941->34942 34945 7ff684088175 34941->34945 34943 7ff684088252 VerSetConditionMask 34942->34943 34944 7ff684088264 VerifyVersionInfoA 34942->34944 34943->34944 34944->34945 34946 7ff6840be2f0 8 API calls 34945->34946 34947 7ff68408829b 34946->34947 34948 7ff684087f90 GetModuleHandleA 34947->34948 34949 7ff684087fba GetProcAddress strpbrk 34948->34949 34950 7ff684087fb2 34948->34950 34951 7ff684087fe7 34949->34951 34952 7ff68408801e 34949->34952 34950->34937 34953 7ff684088008 LoadLibraryA 34951->34953 34959 7ff684087fef 34951->34959 34954 7ff684088056 GetSystemDirectoryA 34952->34954 34955 7ff684088023 GetProcAddress 34952->34955 34953->34937 34957 7ff684088118 34954->34957 34958 7ff684088070 malloc 34954->34958 34955->34954 34956 7ff684088038 LoadLibraryExA 34955->34956 34956->34937 34957->34937 34961 7ff68408809d GetSystemDirectoryA 34958->34961 34962 7ff68408810a free 34958->34962 34959->34937 34961->34962 34963 7ff6840880ad 34961->34963 34962->34957 34964 7ff6840880f6 34963->34964 34965 7ff684088101 LoadLibraryA 34963->34965 34964->34962 34965->34964 34966->34917 34967->34926 34968->34929 34969->34931 34971->34853 34972->34854 34973->34856 34976 7ff684085fb5 34975->34976 34977 7ff684085fe0 closesocket 34975->34977 34978 7ff684085ff6 34976->34978 34980 7ff684085fd1 34976->34980 34977->34816 34984 7ff6840755a0 free 34978->34984 34983 7ff6840755a0 free 34980->34983 34982 7ff684085ffe 34982->34816 34983->34977 34984->34982 34985->34774 34986->34776 34994 7ff6840758c1 34987->34994 35000 7ff684075cd9 34987->35000 34988 7ff6840758d6 34989 7ff6840be2f0 8 API calls 34988->34989 34990 7ff6840759eb 34989->34990 34990->34672 34992 7ff68407597a 34993 7ff6840759b4 malloc 34992->34993 34997 7ff684075a01 34992->34997 34995 7ff6840759fc 34993->34995 34996 7ff6840759c8 34993->34996 34994->34988 34994->35000 35011 7ff684077e60 34994->35011 34995->34997 34996->34988 35001 7ff684075c65 34997->35001 35018 7ff684094880 34997->35018 34999 7ff684075c74 free 35003 7ff684075c7d 34999->35003 35001->34999 35001->35003 35003->35000 35005 7ff684077e60 10 API calls 35003->35005 35004 7ff684075c38 35006 7ff684075c40 recv 35004->35006 35008 7ff684075cbc 35005->35008 35006->35006 35007 7ff684075c60 35006->35007 35007->35001 35008->35000 35009 7ff684075cd1 35008->35009 35035 7ff684094f60 WSASetLastError Sleep 35009->35035 35012 7ff684077f27 35011->35012 35013 7ff684077e7e 35011->35013 35012->34992 35014 7ff68408c3f0 2 API calls 35013->35014 35015 7ff684077e8d 35014->35015 35036 7ff68408ddb0 8 API calls 35015->35036 35017 7ff684077ead 35017->34992 35019 7ff6840948d2 35018->35019 35021 7ff6840948b6 35018->35021 35020 7ff684094b3e 35019->35020 35022 7ff6840948e1 WSASetLastError 35019->35022 35023 7ff684094c0a Sleep 35019->35023 35024 7ff6840be2f0 8 API calls 35020->35024 35021->35019 35026 7ff6840948f8 35021->35026 35022->35020 35023->35020 35025 7ff684075b8b 35024->35025 35025->35001 35025->35004 35028 7ff684094a94 35026->35028 35029 7ff684094ac0 select 35026->35029 35030 7ff684094aa1 WSASetLastError 35028->35030 35031 7ff684094ab6 Sleep 35028->35031 35032 7ff684094a98 35028->35032 35029->35032 35030->35032 35031->35032 35032->35020 35033 7ff684094bbf __WSAFDIsSet 35032->35033 35034 7ff684094bd7 __WSAFDIsSet 35032->35034 35033->35032 35033->35034 35034->35032 35035->35000 35036->35017 35040 7ff684077dc2 35037->35040 35049 7ff684076cfe 35037->35049 35038 7ff684077db3 35057 7ff684085340 19 API calls 35038->35057 35040->34785 35041 7ff684086bc0 10 API calls 35041->35049 35042 7ff684077f40 17 API calls 35042->35049 35044 7ff684085340 19 API calls 35045 7ff684076dbe 35044->35045 35045->35044 35045->35049 35047 7ff684080eb0 90 API calls 35047->35049 35049->35038 35049->35040 35049->35041 35049->35042 35049->35045 35049->35047 35050 7ff6840767a0 292 API calls 35049->35050 35054 7ff684085340 19 API calls 35049->35054 35055 7ff6840754c0 15 API calls 35049->35055 35056 7ff684093e20 22 API calls 35049->35056 35050->35049 35051->34782 35052->34782 35053->34787 35054->35049 35055->35049 35056->35049 35057->35040 35059 7ff6840be32a malloc 35058->35059 35060 7ff6840be334 35059->35060 35061 7ff6840be31b 35059->35061 35060->34689 35061->35059 35062 7ff6840be33a 35061->35062 35063 7ff6840be345 35062->35063 35069 7ff6840bef78 _CxxThrowException std::bad_alloc::bad_alloc 35062->35069 35070 7ff684041da0 __std_exception_copy Concurrency::cancel_current_task 35063->35070 35066 7ff6840be34b std::_Facet_Register 35066->34689 35068->34686 35069->35063 35070->35066 35072 7ff68405fae3 35071->35072 35073 7ff68405fb62 memcpy memcpy 35071->35073 35074 7ff68405fb4d 35072->35074 35075 7ff68405fb2b 35072->35075 35076 7ff68405fba3 35072->35076 35073->34697 35077 7ff68405fb38 35074->35077 35079 7ff6840be310 std::_Facet_Register 3 API calls 35074->35079 35078 7ff6840be310 std::_Facet_Register 3 API calls 35075->35078 35086 7ff684041da0 __std_exception_copy Concurrency::cancel_current_task 35076->35086 35077->35073 35082 7ff68405fb33 35078->35082 35079->35077 35081 7ff68405fba8 35082->35077 35083 7ff68405fb46 _invalid_parameter_noinfo_noreturn 35082->35083 35083->35074 35084->34700 35086->35081 35088->34729 35090 7ff684066b89 35091 7ff684066ba3 35090->35091 35092 7ff684066d17 35091->35092 35093 7ff684066bb4 35091->35093 35342 7ff684041e40 ?_Xlength_error@std@@YAXPEBD 35092->35342 35094 7ff684066bc3 memcpy 35093->35094 35095 7ff684066bdf 35093->35095 35097 7ff684066c35 strtol 35094->35097 35343 7ff684057810 4 API calls 2 library calls 35095->35343 35100 7ff684066c88 35097->35100 35109 7ff684066c6c 35097->35109 35098 7ff684066d1c CreateThread 35101 7ff684066d8c UuidCreate UuidToStringA 35098->35101 35344 7ff68404cb90 8 API calls 3 library calls 35100->35344 35107 7ff684066df3 35101->35107 35108 7ff684066e32 35101->35108 35105 7ff684066c0d memcpy 35105->35097 35106 7ff684066cd2 35110 7ff684066ce9 35106->35110 35112 7ff684066ce2 _invalid_parameter_noinfo_noreturn 35106->35112 35116 7ff684058e30 memcpy 35107->35116 35111 7ff68404c3c0 7 API calls 35108->35111 35109->35106 35109->35112 35113 7ff6840be58c Concurrency::wait free 35109->35113 35115 7ff6840be2f0 8 API calls 35110->35115 35114 7ff684066e8a 35111->35114 35112->35110 35113->35106 35117 7ff6840604e0 _invalid_parameter_noinfo_noreturn free 35114->35117 35118 7ff684066cf9 35115->35118 35119 7ff684066e17 RpcStringFreeA 35116->35119 35120 7ff684066e9a 35117->35120 35119->35108 35121 7ff684049110 _invalid_parameter_noinfo_noreturn free 35120->35121 35122 7ff684066ea3 35121->35122 35123 7ff6840507b0 7 API calls 35122->35123 35124 7ff684066eca 35123->35124 35125 7ff684068180 ?_Xout_of_range@std@@YAXPEBD 35124->35125 35126 7ff684066ef5 35125->35126 35127 7ff684066f3f 35126->35127 35128 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 35126->35128 35129 7ff684059c60 11 API calls 35127->35129 35128->35127 35130 7ff684066f66 35129->35130 35131 7ff6840604e0 _invalid_parameter_noinfo_noreturn free 35130->35131 35132 7ff684066f75 35131->35132 35133 7ff684049110 _invalid_parameter_noinfo_noreturn free 35132->35133 35134 7ff684066f7e 35133->35134 35135 7ff684049110 _invalid_parameter_noinfo_noreturn free 35134->35135 35136 7ff684066f88 35135->35136 35137 7ff684061b50 32 API calls 35136->35137 35138 7ff684066f94 35137->35138 35139 7ff68406fff0 73 API calls 35138->35139 35140 7ff684066f9a 35139->35140 35141 7ff68406eb20 16 API calls 35140->35141 35142 7ff684066fd1 35141->35142 35143 7ff6840507b0 7 API calls 35142->35143 35144 7ff684067072 35143->35144 35145 7ff6840507b0 7 API calls 35144->35145 35146 7ff6840670ac 35145->35146 35147 7ff68405f8e0 10 API calls 35146->35147 35148 7ff6840670c8 35147->35148 35149 7ff684049110 _invalid_parameter_noinfo_noreturn free 35148->35149 35150 7ff6840670d2 35149->35150 35151 7ff684049110 _invalid_parameter_noinfo_noreturn free 35150->35151 35152 7ff6840670df 35151->35152 35153 7ff684059c60 11 API calls 35152->35153 35154 7ff6840670f1 35153->35154 35155 7ff684059d40 10 API calls 35154->35155 35156 7ff684067105 35155->35156 35157 7ff68404ac80 11 API calls 35156->35157 35158 7ff68406712c 35157->35158 35159 7ff684059e20 10 API calls 35158->35159 35160 7ff684067161 35159->35160 35161 7ff68404ac80 11 API calls 35160->35161 35162 7ff684067188 35161->35162 35163 7ff684059d40 10 API calls 35162->35163 35164 7ff6840671c0 35163->35164 35165 7ff684059cd0 11 API calls 35164->35165 35166 7ff6840671d3 35165->35166 35167 7ff684059f00 10 API calls 35166->35167 35168 7ff6840671e8 35167->35168 35169 7ff684059c60 11 API calls 35168->35169 35170 7ff6840671fc 35169->35170 35171 7ff684049110 _invalid_parameter_noinfo_noreturn free 35170->35171 35172 7ff684067209 35171->35172 35173 7ff684049110 _invalid_parameter_noinfo_noreturn free 35172->35173 35174 7ff684067216 35173->35174 35175 7ff684049110 _invalid_parameter_noinfo_noreturn free 35174->35175 35176 7ff684067223 35175->35176 35177 7ff684049110 _invalid_parameter_noinfo_noreturn free 35176->35177 35178 7ff68406722d 35177->35178 35179 7ff684049110 _invalid_parameter_noinfo_noreturn free 35178->35179 35180 7ff68406723a 35179->35180 35181 7ff684049110 _invalid_parameter_noinfo_noreturn free 35180->35181 35182 7ff684067244 35181->35182 35183 7ff684049110 _invalid_parameter_noinfo_noreturn free 35182->35183 35184 7ff684067251 35183->35184 35185 7ff684049110 _invalid_parameter_noinfo_noreturn free 35184->35185 35186 7ff68406725b 35185->35186 35187 7ff684049110 _invalid_parameter_noinfo_noreturn free 35186->35187 35188 7ff684067265 35187->35188 35189 7ff68406ffd0 292 API calls 35188->35189 35190 7ff68406726d 35189->35190 35191 7ff6840491b0 22 API calls 35190->35191 35192 7ff68406728e 35191->35192 35193 7ff6840491b0 22 API calls 35192->35193 35194 7ff6840672a1 35193->35194 35195 7ff6840507b0 7 API calls 35194->35195 35196 7ff68406730f 35195->35196 35197 7ff68406734d memcmp 35196->35197 35198 7ff684067356 35196->35198 35197->35198 35199 7ff684067383 35198->35199 35202 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 35198->35202 35200 7ff6840673ed 35199->35200 35203 7ff6840673d0 MessageBoxA exit 35199->35203 35201 7ff68405cef0 155 API calls 35200->35201 35204 7ff684067410 35201->35204 35202->35199 35203->35200 35205 7ff6840507b0 7 API calls 35204->35205 35206 7ff68406745f 35205->35206 35207 7ff68404bf10 11 API calls 35206->35207 35208 7ff68406747c 35207->35208 35209 7ff6840674a4 35208->35209 35211 7ff684060960 25 API calls 35208->35211 35210 7ff684059c00 memcpy 35209->35210 35212 7ff6840674b6 35210->35212 35211->35209 35213 7ff684049110 _invalid_parameter_noinfo_noreturn free 35212->35213 35214 7ff6840674c0 memset 35213->35214 35215 7ff68405fbb0 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 35214->35215 35216 7ff6840674e5 35215->35216 35217 7ff68405fdd0 6 API calls 35216->35217 35218 7ff68406750f 35217->35218 35220 7ff684073650 16 API calls 35218->35220 35221 7ff684067562 35220->35221 35222 7ff6840675d2 35221->35222 35224 7ff684067570 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD ?setw@std@@YA?AU?$_Smanip@_J@1@_J 35221->35224 35223 7ff68406e6b0 8 API calls 35222->35223 35226 7ff6840675f9 35223->35226 35225 7ff6840675bf ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H 35224->35225 35225->35222 35225->35224 35227 7ff684067655 35226->35227 35228 7ff684067650 35226->35228 35231 7ff684067649 _invalid_parameter_noinfo_noreturn 35226->35231 35229 7ff6840676c8 35227->35229 35233 7ff684067677 35227->35233 35234 7ff684068177 35227->35234 35232 7ff6840be58c Concurrency::wait free 35228->35232 35230 7ff68405f5d0 8 API calls 35229->35230 35235 7ff6840676d9 35230->35235 35231->35228 35232->35227 35237 7ff68405fa90 6 API calls 35233->35237 35236 7ff684041e40 ?_Xlength_error@std@@YAXPEBD 35234->35236 35239 7ff6840696e0 155 API calls 35235->35239 35240 7ff68406817c 35236->35240 35238 7ff6840676bf 35237->35238 35241 7ff684065800 26 API calls 35238->35241 35242 7ff6840676e4 35239->35242 35241->35229 35243 7ff6840507b0 7 API calls 35242->35243 35244 7ff68406772f 35243->35244 35245 7ff68404bf10 11 API calls 35244->35245 35246 7ff684067747 35245->35246 35247 7ff684060960 25 API calls 35246->35247 35248 7ff68406776f 35247->35248 35249 7ff6840677c0 35248->35249 35250 7ff6840677b9 _invalid_parameter_noinfo_noreturn 35248->35250 35253 7ff6840677c5 35248->35253 35251 7ff6840be58c Concurrency::wait free 35249->35251 35250->35249 35251->35253 35252 7ff6840be310 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 35268 7ff684067a7d 35252->35268 35254 7ff6840507b0 7 API calls 35253->35254 35253->35268 35255 7ff68406781f 35254->35255 35256 7ff68404bf10 11 API calls 35255->35256 35257 7ff684067837 35256->35257 35259 7ff684060960 25 API calls 35257->35259 35258 7ff6840507b0 7 API calls 35258->35268 35260 7ff68406785f 35259->35260 35262 7ff684049110 _invalid_parameter_noinfo_noreturn free 35260->35262 35261 7ff68404bf10 11 API calls 35261->35268 35263 7ff684067880 35262->35263 35264 7ff684067884 Sleep 35263->35264 35265 7ff68406788f 35263->35265 35264->35265 35267 7ff6840507b0 7 API calls 35265->35267 35266 7ff684060960 25 API calls 35266->35268 35269 7ff6840678dc 35267->35269 35268->35252 35268->35258 35268->35261 35268->35266 35270 7ff684064150 155 API calls 35268->35270 35273 7ff684067c25 _invalid_parameter_noinfo_noreturn 35268->35273 35274 7ff6840be58c Concurrency::wait free 35268->35274 35275 7ff684067c57 35268->35275 35276 7ff684067e8c 35268->35276 35279 7ff684067e84 35268->35279 35283 7ff684067aba _invalid_parameter_noinfo_noreturn 35268->35283 35271 7ff68404bf10 11 API calls 35269->35271 35270->35268 35272 7ff6840678f4 35271->35272 35278 7ff684060960 25 API calls 35272->35278 35273->35268 35274->35268 35277 7ff684060a50 7 API calls 35275->35277 35281 7ff684060110 10 API calls 35276->35281 35280 7ff684067c84 35277->35280 35296 7ff68406791c 35278->35296 35282 7ff6840be58c Concurrency::wait free 35279->35282 35284 7ff684060910 25 API calls 35280->35284 35285 7ff684067ecb ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 35281->35285 35282->35276 35283->35268 35288 7ff684067c95 35284->35288 35286 7ff684067f2a 35285->35286 35287 7ff684067ef3 35285->35287 35291 7ff684064150 155 API calls 35286->35291 35290 7ff684067f25 35287->35290 35293 7ff684067f1e _invalid_parameter_noinfo_noreturn 35287->35293 35289 7ff684059c00 memcpy 35288->35289 35292 7ff684067ca4 35289->35292 35294 7ff6840be58c Concurrency::wait free 35290->35294 35295 7ff684067f56 35291->35295 35297 7ff684049110 _invalid_parameter_noinfo_noreturn free 35292->35297 35293->35290 35294->35286 35298 7ff684067f9b 35295->35298 35300 7ff684067f96 35295->35300 35305 7ff684067f8f _invalid_parameter_noinfo_noreturn 35295->35305 35301 7ff684058e30 memcpy 35296->35301 35299 7ff684067cae 35297->35299 35302 7ff684067ff8 35298->35302 35308 7ff684067ff3 35298->35308 35309 7ff684067fec _invalid_parameter_noinfo_noreturn 35298->35309 35303 7ff684059950 memcmp 35299->35303 35307 7ff6840be58c Concurrency::wait free 35300->35307 35306 7ff68406794e 35301->35306 35304 7ff68406803d 35302->35304 35312 7ff684068038 35302->35312 35316 7ff684068031 _invalid_parameter_noinfo_noreturn 35302->35316 35311 7ff684067cc1 35303->35311 35313 7ff68406809a 35304->35313 35318 7ff684068095 35304->35318 35323 7ff68406808e _invalid_parameter_noinfo_noreturn 35304->35323 35305->35300 35314 7ff68406798d 35306->35314 35319 7ff684067988 35306->35319 35324 7ff684067981 _invalid_parameter_noinfo_noreturn 35306->35324 35307->35298 35310 7ff6840be58c Concurrency::wait free 35308->35310 35309->35308 35310->35302 35329 7ff684067e1f MessageBoxA 35311->35329 35317 7ff6840be58c Concurrency::wait free 35312->35317 35315 7ff6840680df 35313->35315 35321 7ff6840680da 35313->35321 35326 7ff6840680d3 _invalid_parameter_noinfo_noreturn 35313->35326 35327 7ff6840507b0 7 API calls 35314->35327 35322 7ff6840be2f0 8 API calls 35315->35322 35316->35312 35317->35304 35325 7ff6840be58c Concurrency::wait free 35318->35325 35320 7ff6840be58c Concurrency::wait free 35319->35320 35320->35314 35328 7ff6840be58c Concurrency::wait free 35321->35328 35330 7ff6840680ee 35322->35330 35323->35318 35324->35319 35325->35313 35326->35321 35331 7ff6840679df 35327->35331 35328->35315 35332 7ff684067e7b exit 35329->35332 35333 7ff68404bf10 11 API calls 35331->35333 35332->35279 35334 7ff6840679f7 35333->35334 35335 7ff684060960 25 API calls 35334->35335 35336 7ff684067a1f 35335->35336 35337 7ff68405f5d0 8 API calls 35336->35337 35338 7ff684067a33 35337->35338 35338->35268 35339 7ff684067a78 35338->35339 35340 7ff684067a71 _invalid_parameter_noinfo_noreturn 35338->35340 35341 7ff6840be58c Concurrency::wait free 35339->35341 35340->35339 35341->35268 35343->35105 35344->35109 35345 7ff684077010 35346 7ff684077021 35345->35346 35373 7ff68408d060 35346->35373 35348 7ff684077055 35349 7ff684077087 35348->35349 35350 7ff6840854c0 15 API calls 35348->35350 35401 7ff68408dab0 314 API calls 35349->35401 35352 7ff684077081 35350->35352 35352->35349 35354 7ff684077097 35352->35354 35353 7ff684077094 35353->35354 35377 7ff684077fb0 35354->35377 35359 7ff684077f40 17 API calls 35369 7ff684076d1b 35359->35369 35362 7ff684077dc2 35363 7ff684077db3 35404 7ff684085340 19 API calls 35363->35404 35365 7ff684080eb0 90 API calls 35365->35369 35367 7ff684086bc0 10 API calls 35367->35369 35368 7ff684076dbe 35368->35369 35370 7ff684085340 19 API calls 35368->35370 35369->35359 35369->35362 35369->35363 35369->35365 35369->35367 35369->35368 35372 7ff6840767a0 292 API calls 35369->35372 35399 7ff684085340 19 API calls 35369->35399 35402 7ff6840754c0 15 API calls 35369->35402 35403 7ff684093e20 22 API calls 35369->35403 35370->35368 35372->35369 35374 7ff68408d08a 35373->35374 35405 7ff68408db90 35374->35405 35376 7ff68408d0a9 35376->35348 35382 7ff684078016 35377->35382 35378 7ff68407828a 35379 7ff684078398 memcpy memcpy 35378->35379 35385 7ff684078394 35378->35385 35421 7ff68408ca10 free 35378->35421 35380 7ff684078280 35379->35380 35381 7ff6840be2f0 8 API calls 35380->35381 35384 7ff6840770a2 35381->35384 35382->35378 35383 7ff68407815e calloc 35382->35383 35386 7ff684078178 35382->35386 35383->35380 35383->35386 35384->35369 35393 7ff68408d780 35384->35393 35385->35379 35386->35380 35386->35382 35387 7ff68408ca80 malloc 35386->35387 35388 7ff684078277 free 35386->35388 35389 7ff68408c740 malloc memcpy 35386->35389 35390 7ff68407826f 35386->35390 35387->35386 35388->35380 35389->35386 35420 7ff68408ca10 free 35390->35420 35394 7ff68408d799 35393->35394 35422 7ff684081910 35394->35422 35396 7ff68408d7b0 35397 7ff684076fac 35396->35397 35398 7ff684080eb0 90 API calls 35396->35398 35397->35369 35400 7ff68408a1c0 free 35397->35400 35398->35397 35399->35369 35400->35369 35401->35353 35402->35369 35403->35369 35404->35362 35406 7ff68408dbd0 35405->35406 35407 7ff68408dc0b 35406->35407 35408 7ff68408dbf6 tolower 35406->35408 35409 7ff684073cd0 13 API calls 35407->35409 35408->35407 35408->35408 35410 7ff68408dc22 35409->35410 35412 7ff68408dc68 tolower 35410->35412 35416 7ff68408dc8c 35410->35416 35419 7ff68408dd01 35410->35419 35411 7ff68408dcc6 _time64 35413 7ff68408dce5 35411->35413 35411->35419 35414 7ff684073cd0 13 API calls 35412->35414 35418 7ff6840854c0 15 API calls 35413->35418 35413->35419 35414->35416 35415 7ff6840be2f0 8 API calls 35417 7ff68408dd2c 35415->35417 35416->35411 35416->35419 35417->35376 35418->35419 35419->35415 35420->35388 35421->35378 35446 7ff684093cd0 35422->35446 35425 7ff684081945 35425->35396 35426 7ff684081999 35429 7ff68408c3f0 2 API calls 35426->35429 35431 7ff6840819a5 35426->35431 35427 7ff68408196e free 35460 7ff684073c00 15 API calls 35427->35460 35430 7ff6840819cf 35429->35430 35432 7ff6840819e3 35430->35432 35433 7ff684081a11 35430->35433 35431->35396 35449 7ff684086150 35432->35449 35435 7ff684093cd0 2 API calls 35433->35435 35436 7ff684081a1e 35435->35436 35440 7ff684081a41 35436->35440 35441 7ff684093cd0 2 API calls 35436->35441 35437 7ff6840819f9 35438 7ff684081a01 35437->35438 35439 7ff68408c3f0 2 API calls 35437->35439 35438->35396 35442 7ff684081ad4 35439->35442 35461 7ff684086cd0 35440->35461 35441->35440 35442->35396 35445 7ff6840854c0 15 API calls 35445->35437 35447 7ff68408c3f0 2 API calls 35446->35447 35448 7ff684081935 35447->35448 35448->35425 35448->35426 35448->35427 35450 7ff68408c3f0 2 API calls 35449->35450 35451 7ff684086173 35450->35451 35452 7ff6840861eb 35451->35452 35459 7ff684086204 35451->35459 35556 7ff684085340 19 API calls 35452->35556 35454 7ff6840861fa 35455 7ff684086311 35454->35455 35455->35437 35456 7ff68408630d 35456->35455 35557 7ff684075290 17 API calls 35456->35557 35459->35456 35491 7ff684087690 35459->35491 35460->35426 35462 7ff684086d07 35461->35462 35463 7ff684086f03 35461->35463 35462->35463 35465 7ff684086d21 getpeername 35462->35465 35464 7ff6840be2f0 8 API calls 35463->35464 35466 7ff684081a5a 35464->35466 35467 7ff684086d7d getsockname 35465->35467 35468 7ff684086d46 WSAGetLastError 35465->35468 35466->35437 35466->35445 35470 7ff684086e07 35467->35470 35471 7ff684086dd0 WSAGetLastError 35467->35471 35586 7ff68406f4a0 27 API calls 35468->35586 35590 7ff684085f00 19 API calls 35470->35590 35588 7ff68406f4a0 27 API calls 35471->35588 35473 7ff684086d63 35587 7ff684085340 19 API calls 35473->35587 35475 7ff684086e29 35478 7ff684086e6d 35475->35478 35479 7ff684086e2d _errno _errno 35475->35479 35477 7ff684086ded 35589 7ff684085340 19 API calls 35477->35589 35593 7ff684085f00 19 API calls 35478->35593 35591 7ff68406f4a0 27 API calls 35479->35591 35480 7ff684086d78 35480->35463 35484 7ff684086e53 35592 7ff684085340 19 API calls 35484->35592 35485 7ff684086ebf 35485->35463 35487 7ff684086ec3 _errno _errno 35485->35487 35594 7ff68406f4a0 27 API calls 35487->35594 35489 7ff684086ee9 35595 7ff684085340 19 API calls 35489->35595 35492 7ff6840876ff memcpy 35491->35492 35494 7ff684087768 socket 35492->35494 35495 7ff68408773b 35492->35495 35494->35495 35499 7ff6840877a7 35495->35499 35549 7ff684087ac4 35495->35549 35578 7ff6840938d0 ioctlsocket 35495->35578 35496 7ff6840be2f0 8 API calls 35498 7ff684087c3b 35496->35498 35498->35459 35500 7ff684087bca _errno _errno _errno 35499->35500 35558 7ff6840afaf0 35499->35558 35583 7ff68406f4a0 27 API calls 35500->35583 35503 7ff6840877f4 35503->35500 35505 7ff6840877fd htons 35503->35505 35504 7ff684087bfb 35584 7ff684085340 19 API calls 35504->35584 35507 7ff6840854c0 15 API calls 35505->35507 35509 7ff68408781e 35507->35509 35508 7ff684087c10 35510 7ff684085fa0 2 API calls 35508->35510 35511 7ff684087899 35509->35511 35512 7ff68408783f setsockopt 35509->35512 35544 7ff684087aa5 35510->35544 35514 7ff684088130 14 API calls 35511->35514 35518 7ff6840878d1 35511->35518 35512->35511 35513 7ff68408786d WSAGetLastError 35512->35513 35579 7ff68406f4a0 27 API calls 35513->35579 35514->35518 35515 7ff6840878d5 35523 7ff68408795a setsockopt 35515->35523 35528 7ff684087999 35515->35528 35516 7ff6840878f2 getsockopt 35519 7ff684087919 35516->35519 35520 7ff684087923 setsockopt 35516->35520 35518->35515 35518->35516 35519->35515 35519->35520 35520->35515 35521 7ff684087887 35524 7ff6840854c0 15 API calls 35521->35524 35522 7ff684087a67 35525 7ff684087a78 35522->35525 35527 7ff684087ace 35522->35527 35526 7ff684087987 35523->35526 35532 7ff68408799e 35523->35532 35524->35511 35580 7ff684087000 444 API calls 35525->35580 35529 7ff6840854c0 15 API calls 35526->35529 35577 7ff6840938d0 ioctlsocket 35527->35577 35528->35522 35545 7ff684087ab9 35528->35545 35529->35528 35531 7ff684087adb 35534 7ff68408c3f0 2 API calls 35531->35534 35535 7ff6840879cc WSAIoctl 35532->35535 35537 7ff684087ae5 35534->35537 35535->35528 35538 7ff684087a14 WSAGetLastError 35535->35538 35536 7ff684087a94 35536->35527 35539 7ff684087a9a 35536->35539 35540 7ff684087b0f 35537->35540 35581 7ff684075290 17 API calls 35537->35581 35541 7ff6840854c0 15 API calls 35538->35541 35542 7ff684085fa0 2 API calls 35539->35542 35547 7ff684087b58 WSAGetLastError 35540->35547 35548 7ff684087b2f connect 35540->35548 35540->35549 35541->35528 35542->35544 35544->35549 35546 7ff684085fa0 2 API calls 35545->35546 35546->35549 35547->35549 35550 7ff684087b65 35547->35550 35548->35547 35548->35549 35549->35496 35550->35549 35582 7ff68406f4a0 27 API calls 35550->35582 35552 7ff684087b81 35553 7ff6840854c0 15 API calls 35552->35553 35554 7ff684087b97 35553->35554 35555 7ff684085fa0 2 API calls 35554->35555 35555->35549 35556->35454 35557->35455 35559 7ff6840afaff 35558->35559 35560 7ff6840afb29 35558->35560 35561 7ff6840afb04 _errno 35559->35561 35568 7ff6840afb17 35559->35568 35562 7ff684073cd0 13 API calls 35560->35562 35561->35503 35564 7ff6840afb98 35562->35564 35563 7ff6840afbe4 _errno 35565 7ff6840afbb7 35563->35565 35564->35563 35564->35565 35566 7ff6840be2f0 8 API calls 35565->35566 35567 7ff6840afbff 35566->35567 35567->35503 35569 7ff684073cd0 13 API calls 35568->35569 35570 7ff6840afe8a 35568->35570 35574 7ff6840afe10 35568->35574 35569->35568 35585 7ff6840afb40 14 API calls 35570->35585 35572 7ff6840afea3 _errno 35573 7ff6840afe39 35572->35573 35575 7ff6840be2f0 8 API calls 35573->35575 35574->35572 35574->35573 35576 7ff6840afe77 35575->35576 35576->35503 35577->35531 35578->35499 35579->35521 35580->35536 35581->35540 35582->35552 35583->35504 35584->35508 35585->35574 35586->35473 35587->35480 35588->35477 35589->35480 35590->35475 35591->35484 35592->35480 35593->35485 35594->35489 35595->35480 35596 7ff684086350 35597 7ff6840863a8 35596->35597 35612 7ff68408639f 35596->35612 35598 7ff68408c3f0 2 API calls 35597->35598 35601 7ff6840863c2 35598->35601 35599 7ff6840be2f0 8 API calls 35600 7ff6840868d5 35599->35600 35602 7ff684086439 35601->35602 35603 7ff684086452 35601->35603 35680 7ff684085340 19 API calls 35602->35680 35605 7ff68408645c 35603->35605 35616 7ff684086489 35603->35616 35607 7ff684087520 474 API calls 35605->35607 35606 7ff684086448 35606->35612 35608 7ff68408646a 35607->35608 35611 7ff684087630 51 API calls 35608->35611 35608->35612 35610 7ff684086765 35610->35612 35682 7ff684087c50 470 API calls 35610->35682 35611->35612 35612->35599 35613 7ff6840866d4 SleepEx getsockopt 35615 7ff68408671c WSAGetLastError 35613->35615 35613->35616 35615->35616 35616->35610 35616->35613 35617 7ff684086676 SleepEx getsockopt 35616->35617 35618 7ff6840867a3 35616->35618 35619 7ff684086587 WSASetLastError 35616->35619 35633 7ff6840854c0 15 API calls 35616->35633 35634 7ff684087c50 470 API calls 35616->35634 35635 7ff684094c20 35616->35635 35681 7ff68406f4a0 27 API calls 35616->35681 35617->35616 35620 7ff6840866be WSAGetLastError 35617->35620 35623 7ff684085fa0 2 API calls 35618->35623 35627 7ff6840867fb 35618->35627 35619->35616 35620->35616 35621 7ff68408677e 35621->35612 35625 7ff684086797 35621->35625 35623->35627 35683 7ff68406f4a0 27 API calls 35625->35683 35626 7ff684086877 35684 7ff684085340 19 API calls 35626->35684 35659 7ff684087520 35627->35659 35628 7ff684086819 35628->35612 35672 7ff684087630 35628->35672 35631 7ff684086895 35631->35612 35633->35616 35634->35616 35636 7ff684094c67 35635->35636 35641 7ff684094c9b 35635->35641 35637 7ff684094c71 35636->35637 35636->35641 35638 7ff684094c78 WSASetLastError 35637->35638 35639 7ff684094c8b Sleep 35637->35639 35640 7ff684094c94 35637->35640 35638->35640 35639->35640 35643 7ff6840be2f0 8 API calls 35640->35643 35644 7ff684094de5 35641->35644 35645 7ff684094e13 select 35641->35645 35647 7ff684094f4e 35643->35647 35646 7ff684094dea 35644->35646 35648 7ff684094df3 WSASetLastError 35644->35648 35649 7ff684094e06 Sleep 35644->35649 35645->35646 35646->35640 35650 7ff684094edc 35646->35650 35651 7ff684094eb2 __WSAFDIsSet __WSAFDIsSet 35646->35651 35647->35616 35648->35646 35649->35646 35652 7ff684094f0b 35650->35652 35653 7ff684094ee4 __WSAFDIsSet 35650->35653 35651->35650 35652->35640 35654 7ff684094f13 __WSAFDIsSet 35652->35654 35655 7ff684094ef7 35653->35655 35656 7ff684094efa __WSAFDIsSet 35653->35656 35657 7ff684094f26 35654->35657 35658 7ff684094f29 __WSAFDIsSet 35654->35658 35655->35656 35656->35652 35657->35658 35658->35640 35660 7ff684087625 35659->35660 35661 7ff684087537 35659->35661 35660->35628 35662 7ff684087607 35661->35662 35664 7ff6840875da 35661->35664 35665 7ff6840875bc 35661->35665 35687 7ff684095080 437 API calls 35662->35687 35686 7ff6840956d0 473 API calls 35664->35686 35665->35664 35668 7ff6840875c1 35665->35668 35667 7ff684087620 35667->35628 35685 7ff684085340 19 API calls 35668->35685 35669 7ff684087602 35669->35628 35671 7ff6840875d0 35671->35628 35673 7ff68408765d 35672->35673 35674 7ff684087650 35672->35674 35676 7ff684086cd0 47 API calls 35673->35676 35675 7ff684093cd0 2 API calls 35674->35675 35675->35673 35677 7ff68408766d 35676->35677 35688 7ff684081b20 15 API calls 35677->35688 35679 7ff684087675 35679->35612 35680->35606 35681->35616 35682->35621 35683->35626 35684->35631 35685->35671 35686->35669 35687->35667 35688->35679 35689 7ff684054bb0 35694 7ff6840593b0 35689->35694 35698 7ff6840593f0 35694->35698 35695 7ff68404c3c0 7 API calls 35695->35698 35696 7ff684059444 rand 35696->35698 35698->35695 35698->35696 35699 7ff6840594d8 SetConsoleTitleA SleepEx 35698->35699 35700 7ff68405953d _invalid_parameter_noinfo_noreturn 35698->35700 35701 7ff6840be58c Concurrency::wait free 35698->35701 35702 7ff684059544 _invalid_parameter_noinfo_noreturn HeapAlloc 35698->35702 35703 7ff6840be58c Concurrency::wait free 35698->35703 35704 7ff68404cb90 8 API calls 3 library calls 35698->35704 35699->35698 35700->35702 35701->35699 35703->35698 35704->35698 35705 7ff684076edc 35706 7ff684093cd0 2 API calls 35705->35706 35707 7ff684076ee9 35706->35707 35708 7ff684076f05 35707->35708 35763 7ff684075290 17 API calls 35707->35763 35710 7ff684076f21 35708->35710 35764 7ff684075290 17 API calls 35708->35764 35732 7ff684080c10 free free 35710->35732 35713 7ff684076f31 35714 7ff6840854c0 15 API calls 35713->35714 35717 7ff684076f87 35713->35717 35728 7ff684076d1b 35713->35728 35715 7ff684076f7b 35714->35715 35716 7ff684077f40 17 API calls 35715->35716 35716->35717 35717->35728 35765 7ff68408a1c0 free 35717->35765 35719 7ff684077f40 17 API calls 35719->35728 35721 7ff684077dc2 35722 7ff684077db3 35768 7ff684085340 19 API calls 35722->35768 35724 7ff684080eb0 90 API calls 35724->35728 35726 7ff684086bc0 10 API calls 35726->35728 35727 7ff684076dbe 35727->35728 35729 7ff684085340 19 API calls 35727->35729 35728->35719 35728->35721 35728->35722 35728->35724 35728->35726 35728->35727 35731 7ff6840767a0 292 API calls 35728->35731 35762 7ff684085340 19 API calls 35728->35762 35766 7ff6840754c0 15 API calls 35728->35766 35767 7ff684093e20 22 API calls 35728->35767 35729->35727 35731->35728 35733 7ff6840809f0 292 API calls 35732->35733 35734 7ff684080c6a 35733->35734 35735 7ff6840809f0 292 API calls 35734->35735 35736 7ff684080c76 memset 35735->35736 35769 7ff6840823a0 35736->35769 35738 7ff684080d3e 35740 7ff684080eb0 90 API calls 35738->35740 35742 7ff684080cbd 35738->35742 35740->35742 35741 7ff684093cd0 2 API calls 35743 7ff684080cdf 35741->35743 35742->35713 35743->35742 35744 7ff684080d0b free 35743->35744 35745 7ff684080d32 35743->35745 35859 7ff684073c00 15 API calls 35744->35859 35745->35738 35747 7ff68408c3f0 2 API calls 35745->35747 35748 7ff684080d80 35747->35748 35749 7ff684080dbd 35748->35749 35750 7ff684080d94 35748->35750 35751 7ff684093cd0 2 API calls 35749->35751 35752 7ff684086150 470 API calls 35750->35752 35753 7ff684080dca 35751->35753 35754 7ff684080daa 35752->35754 35757 7ff684080ded 35753->35757 35758 7ff684093cd0 2 API calls 35753->35758 35754->35738 35755 7ff684080e77 35754->35755 35756 7ff68408c3f0 2 API calls 35755->35756 35756->35742 35759 7ff684086cd0 47 API calls 35757->35759 35758->35757 35760 7ff684080e07 35759->35760 35760->35755 35761 7ff6840854c0 15 API calls 35760->35761 35761->35755 35762->35728 35763->35708 35764->35710 35765->35728 35766->35728 35767->35728 35768->35721 35770 7ff6840823e5 35769->35770 35858 7ff684082409 35770->35858 35860 7ff684081ba0 calloc 35770->35860 35772 7ff68408241b 35772->35858 35875 7ff684084010 35772->35875 35773 7ff6840be2f0 8 API calls 35774 7ff684080ca5 35773->35774 35774->35738 35774->35741 35774->35742 35777 7ff684082464 35779 7ff684082470 _strdup 35777->35779 35780 7ff684082482 35777->35780 35778 7ff684082452 _strdup 35778->35777 35778->35858 35779->35780 35779->35858 35925 7ff684082db0 35780->35925 35784 7ff684073cd0 13 API calls 35785 7ff6840824f5 35784->35785 35785->35858 35984 7ff684083600 35785->35984 35786 7ff684082547 35787 7ff68408258c _strdup 35786->35787 35788 7ff6840825a2 35786->35788 35786->35858 35787->35788 35787->35858 35789 7ff6840825ac _strdup 35788->35789 35790 7ff6840825c5 35788->35790 35789->35790 35789->35858 36000 7ff684083a70 35790->36000 35795 7ff684081140 38 API calls 35796 7ff684082612 35795->35796 35797 7ff684082634 35796->35797 35798 7ff684081140 38 API calls 35796->35798 35796->35858 35799 7ff684081140 38 API calls 35797->35799 35800 7ff684082656 35797->35800 35797->35858 35798->35797 35799->35800 35801 7ff6840827ef 35800->35801 35804 7ff684082754 35800->35804 35800->35858 36022 7ff68407e920 35801->36022 35803 7ff68408298a 35805 7ff68407e920 8 API calls 35803->35805 35803->35858 35806 7ff684082774 35804->35806 35807 7ff6840827df 35804->35807 35808 7ff6840829a1 35805->35808 36102 7ff68407d860 17 API calls 35806->36102 35809 7ff684081210 2 API calls 35807->35809 35808->35858 36046 7ff6840844d0 35808->36046 35809->35858 35811 7ff68408278a 35814 7ff684084f40 17 API calls 35811->35814 35811->35858 35820 7ff68408279c 35814->35820 35815 7ff684082a94 35819 7ff684082b41 35815->35819 36106 7ff68407de00 13 API calls 35815->36106 35817 7ff6840827a2 35817->35858 35818 7ff6840829f9 35818->35815 35821 7ff684082a01 35818->35821 35822 7ff6840854c0 15 API calls 35819->35822 35820->35817 36103 7ff68408b5e0 17 API calls 35820->36103 36105 7ff684084bf0 34 API calls 35821->36105 35826 7ff684082b50 35822->35826 36108 7ff684082030 44 API calls 35826->36108 35827 7ff684082a11 free free 35829 7ff684082a38 35827->35829 35833 7ff6840854c0 15 API calls 35829->35833 35830 7ff684082ae6 35837 7ff684082b2b 35830->35837 36107 7ff68407dbb0 QueryPerformanceCounter GetTickCount 35830->36107 35831 7ff684082bcc 36110 7ff68407d860 17 API calls 35831->36110 35836 7ff684082a8f 35833->35836 35835 7ff684082b0d 35842 7ff684082b2d 35835->35842 35843 7ff684082b20 35835->35843 36065 7ff684081210 35836->36065 35837->35831 36109 7ff68407dc80 QueryPerformanceCounter GetTickCount 35837->36109 35840 7ff684082c4b 36069 7ff684084f40 35840->36069 35841 7ff684082c01 35841->35836 35853 7ff6840854c0 15 API calls 35841->35853 35845 7ff6840854c0 15 API calls 35842->35845 35844 7ff684080eb0 90 API calls 35843->35844 35844->35837 35845->35819 35846 7ff684082bb5 35849 7ff684082d9b 35846->35849 35850 7ff684082bc1 35846->35850 35848 7ff684082bdb 35848->35841 35852 7ff6840854c0 15 API calls 35848->35852 35848->35858 35855 7ff6840854c0 15 API calls 35849->35855 35854 7ff684080eb0 90 API calls 35850->35854 35851 7ff684082c53 35851->35858 36078 7ff684084970 35851->36078 35852->35841 35856 7ff684082c2f 35853->35856 35854->35831 35855->35819 35856->35836 35858->35773 35859->35745 35861 7ff684081bc5 35860->35861 35862 7ff684081bd0 calloc 35860->35862 35861->35772 35863 7ff684081bfa 35862->35863 35864 7ff684081e41 free 35862->35864 35865 7ff68408c3f0 2 API calls 35863->35865 35864->35772 35866 7ff684081c91 35865->35866 35867 7ff68408c3f0 2 API calls 35866->35867 35868 7ff684081ca5 35867->35868 35869 7ff684081e7d 35868->35869 35870 7ff684081e07 _strdup 35868->35870 35872 7ff68408c3f0 2 API calls 35869->35872 35870->35869 35871 7ff684081e19 35870->35871 35874 7ff684081e27 free free 35871->35874 35873 7ff684081ebd 35872->35873 35873->35772 35874->35864 36111 7ff684084ff0 8 API calls 35875->36111 35878 7ff684084037 36119 7ff6840acf70 calloc 35878->36119 35879 7ff684084030 36118 7ff6840acfb0 23 API calls 35879->36118 35882 7ff684084035 35883 7ff68408403c 35882->35883 35888 7ff6840840b2 35883->35888 35897 7ff68408243c 35883->35897 36120 7ff6840acbe0 tolower 35883->36120 35885 7ff684084175 36114 7ff6840ad0f0 35885->36114 35886 7ff68408407f 35886->35888 35889 7ff68408408b free 35886->35889 35890 7ff684084098 35886->35890 35888->35885 35892 7ff6840ad0f0 8 API calls 35888->35892 35888->35897 35889->35890 36121 7ff684073c00 15 API calls 35890->36121 35895 7ff68408415c 35892->35895 35893 7ff6840841dc 36122 7ff684085340 19 API calls 35893->36122 35895->35885 35895->35897 35898 7ff684084168 free 35895->35898 35896 7ff6840841ee 35896->35897 35897->35777 35897->35778 35897->35858 35898->35885 35899 7ff68408419e 35899->35893 35899->35897 35900 7ff684084214 35899->35900 35901 7ff6840ad0f0 8 API calls 35900->35901 35902 7ff68408423b 35901->35902 35903 7ff684084262 35902->35903 35904 7ff684084245 _strdup 35902->35904 35903->35897 35905 7ff6840ad0f0 8 API calls 35903->35905 35904->35897 35904->35903 35906 7ff684084285 35905->35906 35907 7ff6840842a8 35906->35907 35908 7ff68408428f _strdup 35906->35908 35907->35897 35909 7ff6840ad0f0 8 API calls 35907->35909 35908->35897 35908->35907 35910 7ff6840842c8 35909->35910 35911 7ff68408435d 35910->35911 35912 7ff6840842d2 _strdup 35910->35912 35911->35897 35913 7ff6840ad0f0 8 API calls 35911->35913 35912->35897 35912->35911 35914 7ff684084378 35913->35914 35914->35897 35915 7ff6840ad0f0 8 API calls 35914->35915 35916 7ff6840843ad 35915->35916 35916->35897 35917 7ff6840ad0f0 8 API calls 35916->35917 35918 7ff6840843f1 35917->35918 35919 7ff6840843f5 35918->35919 35920 7ff684084411 strtoul 35918->35920 35919->35897 35921 7ff6840ad0f0 8 API calls 35919->35921 35920->35919 35923 7ff684084450 35921->35923 35922 7ff68408448d _strdup 35922->35897 35923->35922 35923->35923 36123 7ff6840850c0 20 API calls 35923->36123 35926 7ff684082ecd 35925->35926 35927 7ff684082dfd memset memset 35925->35927 35928 7ff684082ed9 _strdup 35926->35928 35929 7ff684082f00 35926->35929 35930 7ff684082e48 35927->35930 35931 7ff684082e30 strncpy 35927->35931 35928->35929 35932 7ff684082ee7 35928->35932 35933 7ff684082f0c _strdup 35929->35933 35934 7ff684082f1f 35929->35934 35935 7ff684082e54 strncpy 35930->35935 35936 7ff684082e6f 35930->35936 35931->35930 36132 7ff684085340 19 API calls 35932->36132 35933->35932 35933->35934 35962 7ff684082f7e 35934->35962 36133 7ff68409ab80 realloc GetEnvironmentVariableA realloc free 35934->36133 35935->35936 36130 7ff68406e9e0 malloc strtoul free 35936->36130 35939 7ff684082ef6 35942 7ff684083427 free free 35939->35942 35941 7ff684082e8f 35944 7ff684082ebc 35941->35944 36131 7ff68406e9e0 malloc strtoul free 35941->36131 35945 7ff6840be2f0 8 API calls 35942->35945 35943 7ff684082f40 35946 7ff684082f5c 35943->35946 36134 7ff68409ab80 realloc GetEnvironmentVariableA realloc free 35943->36134 35944->35926 35944->35942 35949 7ff684082497 35945->35949 35953 7ff6840854c0 15 API calls 35946->35953 35946->35962 35948 7ff6840831e1 free 35950 7ff6840831f1 35948->35950 35951 7ff68408321e 35948->35951 35949->35784 35949->35785 35949->35858 35950->35951 35957 7ff684083212 free 35950->35957 35958 7ff684083248 35951->35958 35963 7ff684083238 free 35951->35963 35953->35962 35954 7ff684083129 36135 7ff68409ab80 realloc GetEnvironmentVariableA realloc free 35954->36135 35955 7ff6840830d6 35955->35948 35955->35954 35959 7ff684083110 tolower 35955->35959 35956 7ff684083264 free free free 35969 7ff684083257 35956->35969 35957->35951 35960 7ff68408324d 35958->35960 36139 7ff684083cc0 47 API calls 35958->36139 35959->35954 35959->35959 35960->35969 35979 7ff684083301 35960->35979 36140 7ff684083cc0 47 API calls 35960->36140 35962->35955 35962->35956 35962->35962 35967 7ff684082fee strchr 35962->35967 35983 7ff684083007 35962->35983 35963->35958 35965 7ff68408318c 35971 7ff6840831bf 35965->35971 36137 7ff68409ab80 realloc GetEnvironmentVariableA realloc free 35965->36137 35966 7ff6840832af free 35966->35960 35966->35969 35967->35955 35967->35983 35969->35942 35970 7ff6840832e3 free 35970->35969 35970->35979 35972 7ff6840854c0 15 API calls 35971->35972 35975 7ff6840831dc 35971->35975 35972->35975 35974 7ff6840831a8 35974->35971 36138 7ff68409ab80 realloc GetEnvironmentVariableA realloc free 35974->36138 35975->35948 35976 7ff684083150 35976->35965 36136 7ff68409ab80 realloc GetEnvironmentVariableA realloc free 35976->36136 35977 7ff684083030 strchr 35977->35983 35979->35969 35982 7ff684083377 free 35979->35982 35980 7ff684083060 strchr 35980->35983 35982->35969 35983->35955 35983->35956 35983->35977 35983->35980 35985 7ff684083664 35984->35985 35986 7ff684083631 35984->35986 35987 7ff684083679 free _strdup 35985->35987 35988 7ff68408369b 35985->35988 35986->35985 35991 7ff684083644 free 35986->35991 35992 7ff684083650 35986->35992 35987->35988 35995 7ff684083798 35987->35995 35989 7ff6840836d1 35988->35989 35990 7ff6840836af free _strdup 35988->35990 35993 7ff6840836e5 free _strdup 35989->35993 35996 7ff68408370f 35989->35996 35990->35989 35990->35995 35991->35992 35992->35985 35994 7ff684083658 free 35992->35994 35993->35995 35993->35996 35994->35985 35995->35786 35996->35995 36141 7ff6840aed60 36 API calls 35996->36141 35998 7ff68408377e 35998->35995 35999 7ff6840854c0 15 API calls 35998->35999 35999->35995 36007 7ff684083aa0 36000->36007 36002 7ff684083b78 strchr 36003 7ff684083b8d strtol 36002->36003 36002->36007 36003->36007 36005 7ff6840825d7 36005->35858 36010 7ff684081140 36005->36010 36006 7ff684083c1a free 36006->36007 36007->36002 36007->36005 36007->36006 36008 7ff6840854c0 15 API calls 36007->36008 36009 7ff684083b47 free 36007->36009 36142 7ff684073c00 15 API calls 36007->36142 36143 7ff684083870 22 API calls 36007->36143 36008->36007 36009->36006 36009->36007 36011 7ff68408118f 36010->36011 36012 7ff684081175 36010->36012 36013 7ff6840be2f0 8 API calls 36011->36013 36012->36011 36144 7ff6840aecb0 18 API calls 36012->36144 36014 7ff6840811a1 36013->36014 36014->35795 36014->35796 36014->35858 36016 7ff6840811c8 36016->36011 36017 7ff6840811db GetLastError 36016->36017 36145 7ff68406f5e0 21 API calls 36017->36145 36019 7ff6840811f3 36146 7ff684085340 19 API calls 36019->36146 36021 7ff684081209 36021->36011 36023 7ff68407e966 _strdup 36022->36023 36024 7ff68407e985 36022->36024 36023->36024 36025 7ff68407e975 36023->36025 36026 7ff68407e992 _strdup 36024->36026 36027 7ff68407e9b1 36024->36027 36025->35803 36026->36027 36028 7ff68407e9a1 36026->36028 36029 7ff68407e9dd 36027->36029 36030 7ff68407e9be _strdup 36027->36030 36028->35803 36032 7ff68407e9ea _strdup 36029->36032 36033 7ff68407ea09 36029->36033 36030->36029 36031 7ff68407e9cd 36030->36031 36031->35803 36032->36033 36034 7ff68407e9f9 36032->36034 36035 7ff68407ea16 _strdup 36033->36035 36036 7ff68407ea35 36033->36036 36034->35803 36035->36036 36037 7ff68407ea25 36035->36037 36038 7ff68407ea42 _strdup 36036->36038 36039 7ff68407ea61 36036->36039 36037->35803 36038->36039 36040 7ff68407ea51 36038->36040 36041 7ff68407ea8d 36039->36041 36042 7ff68407ea6e _strdup 36039->36042 36040->35803 36044 7ff68407ea9a _strdup 36041->36044 36045 7ff68407eaa9 36041->36045 36042->36041 36043 7ff68407ea7d 36042->36043 36043->35803 36044->36045 36045->35803 36047 7ff68408c3f0 2 API calls 36046->36047 36056 7ff6840844e3 36047->36056 36049 7ff68408d160 9 API calls 36049->36056 36050 7ff6840829b7 36050->35815 36104 7ff684080080 15 API calls 36050->36104 36051 7ff6840af640 8 API calls 36051->36056 36053 7ff6840854c0 15 API calls 36053->36056 36055 7ff684085fa0 closesocket free 36055->36056 36056->36049 36056->36050 36056->36051 36056->36053 36056->36055 36057 7ff684084656 30 API calls 36056->36057 36147 7ff68408db20 free free free free 36056->36147 36148 7ff6840af250 36056->36148 36151 7ff68407a690 36056->36151 36165 7ff684082320 free free 36057->36165 36059 7ff6840848b6 36060 7ff6840848c4 free 36059->36060 36166 7ff68407ead0 8 API calls 36060->36166 36062 7ff6840848e4 36167 7ff68407ead0 8 API calls 36062->36167 36064 7ff6840848f0 free free free 36064->36056 36066 7ff68408121e 36065->36066 36067 7ff68408c3f0 2 API calls 36066->36067 36068 7ff684081288 36067->36068 36068->35840 36070 7ff684084f5c 36069->36070 36071 7ff684084f65 36070->36071 36072 7ff684084f92 36070->36072 36073 7ff684084f7e free 36070->36073 36071->35851 36074 7ff684084f97 36072->36074 36075 7ff684084fa5 _strdup 36072->36075 36073->36072 36172 7ff684073c00 15 API calls 36074->36172 36077 7ff684084fa3 36075->36077 36077->35851 36079 7ff684086bc0 10 API calls 36078->36079 36080 7ff684084995 36079->36080 36081 7ff684084a5c 36080->36081 36082 7ff6840849b7 calloc 36080->36082 36092 7ff6840849a0 36080->36092 36083 7ff684084b1d _strdup 36081->36083 36084 7ff684084a68 _strdup 36081->36084 36085 7ff6840849d7 36082->36085 36086 7ff6840849cf 36082->36086 36087 7ff684084b4a 36083->36087 36091 7ff684084b60 36083->36091 36084->36087 36098 7ff684084ab5 36084->36098 36173 7ff6840977d0 6 API calls 36085->36173 36086->36092 36087->35858 36090 7ff6840849f0 36090->36086 36093 7ff684084a43 free 36090->36093 36094 7ff684084a13 36090->36094 36091->36092 36097 7ff684084b99 36091->36097 36092->35858 36093->36092 36174 7ff684085340 19 API calls 36094->36174 36096 7ff684084a25 free 36096->36092 36176 7ff684085340 19 API calls 36097->36176 36098->36092 36100 7ff684084aee 36098->36100 36175 7ff684085340 19 API calls 36100->36175 36102->35811 36103->35807 36104->35818 36105->35827 36106->35830 36107->35835 36108->35858 36109->35846 36110->35848 36124 7ff6840acf80 36111->36124 36115 7ff6840ad133 36114->36115 36116 7ff6840be2f0 8 API calls 36115->36116 36117 7ff6840ad26d 36116->36117 36117->35899 36118->35882 36120->35886 36121->35888 36122->35896 36123->35922 36125 7ff684084024 36124->36125 36126 7ff6840acf85 36124->36126 36125->35878 36125->35879 36129 7ff6840adf60 12 API calls 36126->36129 36130->35941 36131->35944 36132->35939 36133->35943 36134->35946 36135->35976 36136->35965 36137->35974 36138->35971 36139->35966 36140->35970 36141->35998 36142->36007 36143->36007 36144->36016 36145->36019 36146->36021 36147->36056 36168 7ff6840b3170 7 API calls 36148->36168 36150 7ff6840af26e 36152 7ff68407aaf0 36151->36152 36153 7ff68407ab08 EnterCriticalSection LeaveCriticalSection 36152->36153 36154 7ff68407ab94 free 36152->36154 36155 7ff68407ab4b 36153->36155 36156 7ff68407ab41 CloseHandle 36153->36156 36154->36056 36157 7ff68407ab59 36155->36157 36158 7ff68407ab51 36155->36158 36159 7ff68407ab6c 36156->36159 36170 7ff68407abb0 7 API calls 36157->36170 36169 7ff6840979e0 WaitForSingleObjectEx CloseHandle 36158->36169 36161 7ff68407ab81 closesocket 36159->36161 36171 7ff6840755a0 free 36159->36171 36161->36154 36164 7ff68407ab62 free 36164->36159 36165->36059 36166->36062 36167->36064 36168->36150 36169->36157 36170->36164 36171->36161 36172->36077 36173->36090 36174->36096 36175->36086 36176->36086 36177 7ff68408d820 36178 7ff68408d86e 36177->36178 36179 7ff68408db90 18 API calls 36178->36179 36180 7ff68408d88b 36179->36180 36181 7ff6840854c0 15 API calls 36180->36181 36191 7ff68408d8a7 36180->36191 36181->36191 36182 7ff68408d9f5 36184 7ff6840be2f0 8 API calls 36182->36184 36186 7ff68408da22 36184->36186 36185 7ff68408d926 36187 7ff68408d92a 36185->36187 36188 7ff68408d94b 36185->36188 36225 7ff6840974f0 15 API calls 36187->36225 36190 7ff684096540 13 API calls 36188->36190 36193 7ff68408d95d 36190->36193 36191->36182 36211 7ff684096540 36191->36211 36192 7ff68408d93f 36192->36188 36194 7ff68408da3a 36192->36194 36195 7ff68408d961 36193->36195 36201 7ff68408d982 36193->36201 36196 7ff68408da44 36194->36196 36226 7ff6840974f0 15 API calls 36195->36226 36230 7ff68408cda0 27 API calls 36196->36230 36199 7ff68408d976 36199->36194 36199->36201 36200 7ff68408da66 36202 7ff68408d9ee 36200->36202 36231 7ff6840972c0 free free free 36200->36231 36201->36182 36206 7ff68408d9b3 36201->36206 36227 7ff6840b12e0 368 API calls 36201->36227 36202->36182 36205 7ff68408d9d0 36205->36182 36207 7ff68408d9f0 36205->36207 36208 7ff68408d9e9 36205->36208 36206->36194 36206->36205 36229 7ff68407a880 51 API calls 36207->36229 36228 7ff6840b14e0 314 API calls 36208->36228 36212 7ff68409654c 36211->36212 36216 7ff684096576 36211->36216 36213 7ff684096551 _errno 36212->36213 36222 7ff684096567 36212->36222 36213->36185 36214 7ff684096637 36214->36185 36215 7ff6840965d0 strchr 36215->36216 36216->36214 36216->36215 36217 7ff6840966e0 strchr 36219 7ff684096700 strchr 36217->36219 36217->36222 36218 7ff6840be2f0 8 API calls 36220 7ff684096846 36218->36220 36219->36222 36220->36185 36221 7ff6840967f5 36224 7ff68409678d 36221->36224 36232 7ff684096590 strchr 36221->36232 36222->36217 36222->36221 36222->36224 36224->36218 36225->36192 36226->36199 36227->36206 36228->36202 36229->36182 36230->36200 36231->36202 36232->36224 36233 7ff68407721b 36234 7ff68407722e 36233->36234 36235 7ff6840772e7 36234->36235 36238 7ff684077236 36234->36238 36256 7ff68408a310 36234->36256 36237 7ff684077273 36235->36237 36235->36238 36239 7ff6840767a0 292 API calls 36237->36239 36253 7ff684076d1b 36238->36253 36295 7ff68408a1c0 free 36238->36295 36239->36253 36240 7ff68407726d 36240->36235 36240->36237 36240->36238 36276 7ff68408ff10 36240->36276 36242 7ff684077f40 17 API calls 36242->36253 36244 7ff684077dc2 36245 7ff684077db3 36298 7ff684085340 19 API calls 36245->36298 36247 7ff684080eb0 90 API calls 36247->36253 36249 7ff684086bc0 10 API calls 36249->36253 36250 7ff684085340 19 API calls 36251 7ff684076dbe 36250->36251 36251->36250 36251->36253 36253->36242 36253->36244 36253->36245 36253->36247 36253->36249 36253->36251 36254 7ff6840767a0 292 API calls 36253->36254 36294 7ff684085340 19 API calls 36253->36294 36296 7ff6840754c0 15 API calls 36253->36296 36297 7ff684093e20 22 API calls 36253->36297 36254->36253 36257 7ff68408a344 36256->36257 36258 7ff68408a35f 36256->36258 36257->36258 36299 7ff68407f5f0 36257->36299 36259 7ff68408a3a1 memset 36258->36259 36263 7ff68408a365 36258->36263 36264 7ff68408a3d3 36259->36264 36261 7ff6840be2f0 8 API calls 36262 7ff68408a505 36261->36262 36262->36240 36263->36261 36265 7ff68408a42e calloc 36264->36265 36266 7ff68408a4a6 36264->36266 36268 7ff68408a446 36265->36268 36269 7ff68408a45c 36265->36269 36309 7ff6840896c0 236 API calls 36266->36309 36268->36263 36271 7ff6840854c0 15 API calls 36269->36271 36270 7ff68408a4b6 36273 7ff6840854c0 15 API calls 36270->36273 36274 7ff68408a4d1 36270->36274 36272 7ff68408a46b 36271->36272 36272->36266 36273->36274 36274->36263 36275 7ff68408a4db free 36274->36275 36275->36263 36277 7ff68408ff3c 36276->36277 36278 7ff68408a310 239 API calls 36277->36278 36281 7ff68408ff46 36278->36281 36279 7ff6840be2f0 8 API calls 36280 7ff6840900a2 36279->36280 36280->36235 36282 7ff68409005c 36281->36282 36283 7ff68408ff97 36281->36283 36287 7ff684090076 36281->36287 36284 7ff68407f5f0 22 API calls 36282->36284 36282->36287 36285 7ff684073cd0 13 API calls 36283->36285 36284->36287 36286 7ff684090008 calloc 36285->36286 36288 7ff684090020 36286->36288 36289 7ff684090027 36286->36289 36287->36279 36288->36287 36312 7ff6840905a0 25 API calls 36289->36312 36291 7ff684090036 36291->36287 36313 7ff684090350 8 API calls 36291->36313 36293 7ff684090058 36293->36282 36293->36287 36294->36253 36295->36253 36296->36253 36297->36253 36298->36244 36300 7ff68407f617 36299->36300 36301 7ff68407f61e 36299->36301 36310 7ff68407ffd0 memset 36300->36310 36304 7ff68407f687 36301->36304 36305 7ff68407f644 36301->36305 36306 7ff68407f64d 36301->36306 36304->36258 36311 7ff684085340 19 API calls 36305->36311 36306->36304 36308 7ff684093cd0 2 API calls 36306->36308 36307 7ff68407f697 36307->36304 36308->36304 36309->36270 36310->36301 36311->36307 36312->36291 36313->36293 36314 7ff684045a3d 36315 7ff684045c66 _invalid_parameter_noinfo_noreturn GetStdHandle SetConsoleTextAttribute 36314->36315 36316 7ff684045a56 36314->36316 36319 7ff6840be310 std::_Facet_Register 3 API calls 36315->36319 36317 7ff684045a5e 36316->36317 36318 7ff6840be58c Concurrency::wait free 36316->36318 36345 7ff684042b20 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn free Concurrency::wait 36317->36345 36318->36317 36320 7ff684045cd8 _beginthreadex 36319->36320 36321 7ff6840479cd ?_Throw_Cpp_error@std@@YAXH 36320->36321 36322 7ff684045d1a GetStdHandle SetConsoleTextAttribute SetConsoleTextAttribute 36320->36322 36333 7ff68404b9e0 36322->36333 36326 7ff68404b9e0 7 API calls 36328 7ff684045f6e SleepEx 36326->36328 36327 7ff684045c4c 36331 7ff684066d20 36328->36331 36329 7ff684045c47 36332 7ff6840be58c Concurrency::wait free 36329->36332 36330 7ff684045adf 36330->36315 36330->36327 36330->36329 36331->36321 36332->36327 36334 7ff68404ba10 36333->36334 36335 7ff68404ba70 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 36334->36335 36338 7ff68404ba5d 36334->36338 36335->36338 36337 7ff68404badc ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 36339 7ff68404ba94 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 36337->36339 36343 7ff68404baf9 36337->36343 36338->36337 36338->36339 36341 7ff68404bab6 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 36338->36341 36340 7ff68404bb6d ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 36339->36340 36344 7ff684045dc1 36339->36344 36340->36344 36341->36338 36341->36339 36342 7ff68404bb05 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 36342->36339 36342->36343 36343->36339 36343->36342 36344->36326 36345->36330 36346 7ff684069c60 36347 7ff684069cbc 36346->36347 36348 7ff684069ce8 36346->36348 36349 7ff68404c3c0 7 API calls 36347->36349 36525 7ff6840731e0 36348->36525 36351 7ff684069cdf 36349->36351 36353 7ff684065800 26 API calls 36351->36353 36353->36348 36357 7ff684069db2 36596 7ff684059d40 36357->36596 36360 7ff68404ac80 11 API calls 36361 7ff684069e00 36360->36361 36362 7ff684059d40 10 API calls 36361->36362 36363 7ff684069e3c 36362->36363 36364 7ff68404ac80 11 API calls 36363->36364 36365 7ff684069e63 36364->36365 36606 7ff68405a100 36365->36606 36368 7ff68404ac80 11 API calls 36369 7ff684069eba 36368->36369 36370 7ff684059d40 10 API calls 36369->36370 36371 7ff684069eea 36370->36371 36372 7ff68404ac80 11 API calls 36371->36372 36373 7ff684069f04 36372->36373 36616 7ff684059f00 36373->36616 36376 7ff68404ac80 11 API calls 36377 7ff684069f4e 36376->36377 36378 7ff684069f8c 36377->36378 36627 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 36377->36627 36380 7ff684069fb7 36378->36380 36628 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 36378->36628 36381 7ff684069fd2 36380->36381 36629 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 36380->36629 36384 7ff684069ffd 36381->36384 36630 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 36381->36630 36386 7ff68406a01b 36384->36386 36631 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 36384->36631 36388 7ff68406a052 36386->36388 36632 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 36386->36632 36390 7ff68406a076 36388->36390 36633 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 36388->36633 36391 7ff68406a0b0 36390->36391 36634 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 36390->36634 36394 7ff68406a0d4 36391->36394 36635 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 36391->36635 36396 7ff68406a105 36394->36396 36636 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 36394->36636 36398 7ff68406a120 36396->36398 36637 7ff68404b560 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 36396->36637 36400 7ff6840491b0 22 API calls 36398->36400 36404 7ff68406a14c 36400->36404 36401 7ff68406ab43 36626 7ff684041e40 ?_Xlength_error@std@@YAXPEBD 36401->36626 36403 7ff68406ab48 36407 7ff6840618a0 20 API calls 36403->36407 36404->36401 36406 7ff68406a19d 36404->36406 36638 7ff684057810 4 API calls 2 library calls 36404->36638 36639 7ff68405cef0 155 API calls 36406->36639 36441 7ff68406abbf 36407->36441 36408 7ff68406a1e2 memcpy 36408->36406 36410 7ff68406a23e 36640 7ff6840507b0 36410->36640 36412 7ff68406a28d 36414 7ff68406a2aa 36412->36414 36659 7ff68404bf10 11 API calls std::_Facet_Register 36412->36659 36413 7ff6840618a0 20 API calls 36413->36441 36428 7ff68406a2d2 36414->36428 36660 7ff684060960 25 API calls std::_Facet_Register 36414->36660 36416 7ff68406ac31 GetCurrentProcess OpenProcessToken 36417 7ff68406ac5c GetTokenInformation malloc 36416->36417 36416->36441 36419 7ff68406ac8e GetTokenInformation 36417->36419 36417->36441 36418 7ff68404c3c0 7 API calls 36418->36441 36423 7ff68406ad4a free 36419->36423 36424 7ff68406acb5 IsValidSid 36419->36424 36421 7ff68406ad5c CloseHandle 36421->36441 36422 7ff684065800 26 API calls 36422->36416 36423->36441 36424->36423 36427 7ff68406acc6 GetLengthSid malloc 36424->36427 36425 7ff68406a334 36426 7ff68406a373 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 36425->36426 36431 7ff68406a36e 36425->36431 36436 7ff68406a367 _invalid_parameter_noinfo_noreturn 36425->36436 36433 7ff6840be310 std::_Facet_Register 3 API calls 36426->36433 36427->36423 36432 7ff68406ace2 InitializeAcl 36427->36432 36428->36425 36661 7ff684058e30 36428->36661 36429 7ff68406aeab SleepEx 36429->36441 36439 7ff6840be58c Concurrency::wait free 36431->36439 36437 7ff68406acf7 AddAccessAllowedAce 36432->36437 36438 7ff68406ad41 free 36432->36438 36440 7ff68406a451 36433->36440 36434 7ff684065800 26 API calls 36434->36441 36435 7ff68406add0 GetModuleHandleA GetCurrentProcess GetModuleInformation 36435->36441 36436->36431 36437->36438 36442 7ff68406ad12 GetCurrentProcess SetSecurityInfo 36437->36442 36438->36423 36439->36426 36665 7ff684073650 16 API calls 36440->36665 36441->36413 36441->36416 36441->36418 36441->36421 36441->36422 36441->36429 36441->36434 36441->36435 36444 7ff684065800 26 API calls 36441->36444 36442->36438 36444->36429 36446 7ff68406a4c0 36447 7ff68406a532 36446->36447 36448 7ff68406a4d0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD ?setw@std@@YA?AU?$_Smanip@_J@1@_J 36446->36448 36666 7ff68406e6b0 8 API calls 36447->36666 36450 7ff68406a51f ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H 36448->36450 36450->36447 36450->36448 36451 7ff68406a61e 36452 7ff68406a68f 36451->36452 36455 7ff68406ab3d 36451->36455 36459 7ff68405fa90 6 API calls 36451->36459 36667 7ff68405f5d0 8 API calls 36452->36667 36453 7ff68406a55d 36453->36451 36454 7ff68406a619 36453->36454 36457 7ff68406a612 _invalid_parameter_noinfo_noreturn 36453->36457 36458 7ff6840be58c Concurrency::wait free 36454->36458 36677 7ff684041e40 ?_Xlength_error@std@@YAXPEBD 36455->36677 36457->36454 36458->36451 36463 7ff68406a686 36459->36463 36460 7ff68406a6a0 36668 7ff6840696e0 155 API calls 36460->36668 36465 7ff684065800 26 API calls 36463->36465 36465->36452 36466 7ff68406a6ab 36467 7ff6840507b0 7 API calls 36466->36467 36468 7ff68406a6fd 36467->36468 36469 7ff68406a715 36468->36469 36669 7ff68404bf10 11 API calls std::_Facet_Register 36468->36669 36472 7ff68406a73d 36469->36472 36670 7ff684060960 25 API calls std::_Facet_Register 36469->36670 36473 7ff68406a78e 36472->36473 36475 7ff68406a787 _invalid_parameter_noinfo_noreturn 36472->36475 36477 7ff68406a793 36472->36477 36476 7ff6840be58c Concurrency::wait free 36473->36476 36474 7ff68406a8b4 36675 7ff684060110 10 API calls Concurrency::wait 36474->36675 36475->36473 36476->36477 36480 7ff6840507b0 7 API calls 36477->36480 36482 7ff68406a87b 36477->36482 36486 7ff68406a7dd 36480->36486 36481 7ff68406a94d _invalid_parameter_noinfo_noreturn 36487 7ff68406a954 36481->36487 36482->36474 36482->36481 36483 7ff6840be58c Concurrency::wait free 36482->36483 36483->36474 36484 7ff68406a959 36676 7ff684064150 155 API calls Concurrency::wait 36484->36676 36488 7ff68406a7f5 36486->36488 36671 7ff68404bf10 11 API calls std::_Facet_Register 36486->36671 36489 7ff6840be58c Concurrency::wait free 36487->36489 36494 7ff68406a81d 36488->36494 36672 7ff684060960 25 API calls std::_Facet_Register 36488->36672 36489->36484 36493 7ff68406a96d 36495 7ff68406a9b2 36493->36495 36498 7ff68406a9ad 36493->36498 36502 7ff68406a9a6 _invalid_parameter_noinfo_noreturn 36493->36502 36673 7ff68405f5d0 8 API calls 36494->36673 36496 7ff68406aa10 36495->36496 36499 7ff68406aa0b 36495->36499 36504 7ff68406aa04 _invalid_parameter_noinfo_noreturn 36495->36504 36500 7ff68406aa55 36496->36500 36506 7ff68406aa50 36496->36506 36510 7ff68406aa49 _invalid_parameter_noinfo_noreturn 36496->36510 36503 7ff6840be58c Concurrency::wait free 36498->36503 36505 7ff6840be58c Concurrency::wait free 36499->36505 36507 7ff68406aaaa 36500->36507 36512 7ff68406aaa2 36500->36512 36514 7ff68406ab2f _invalid_parameter_noinfo_noreturn 36500->36514 36502->36498 36503->36495 36504->36499 36505->36496 36511 7ff6840be58c Concurrency::wait free 36506->36511 36509 7ff68406aaf4 36507->36509 36517 7ff68406aaec 36507->36517 36519 7ff68406ab36 _invalid_parameter_noinfo_noreturn 36507->36519 36508 7ff68406a831 36674 7ff684069790 165 API calls 2 library calls 36508->36674 36518 7ff6840be2f0 8 API calls 36509->36518 36510->36506 36511->36500 36516 7ff6840be58c Concurrency::wait free 36512->36516 36514->36519 36515 7ff68406a83c 36515->36482 36522 7ff68406a876 36515->36522 36523 7ff68406a86f _invalid_parameter_noinfo_noreturn 36515->36523 36516->36507 36520 7ff6840be58c Concurrency::wait free 36517->36520 36521 7ff68406ab14 36518->36521 36519->36455 36520->36509 36524 7ff6840be58c Concurrency::wait free 36522->36524 36523->36522 36524->36482 36678 7ff684072820 36525->36678 36528 7ff6840732b9 GetTokenInformation GetLastError 36529 7ff6840733a1 36528->36529 36532 7ff684073303 36528->36532 36530 7ff68404c3c0 7 API calls 36529->36530 36571 7ff6840733c8 _Receive_impl 36530->36571 36533 7ff684073357 malloc 36532->36533 36698 7ff684073150 8 API calls 36532->36698 36535 7ff684073368 36533->36535 36540 7ff684073322 36535->36540 36536 7ff68407331e 36536->36540 36541 7ff684073351 36536->36541 36537 7ff684073384 36537->36529 36548 7ff684073390 free 36537->36548 36538 7ff6840734e3 GetTokenInformation 36545 7ff684073531 36538->36545 36546 7ff68407350f 36538->36546 36539 7ff684073489 36543 7ff684073495 CloseHandle 36539->36543 36544 7ff6840734a2 36539->36544 36540->36537 36540->36538 36541->36533 36542 7ff68407347c UnloadUserProfile 36542->36539 36543->36544 36550 7ff6840be58c Concurrency::wait free 36544->36550 36699 7ff684072a40 9 API calls 36545->36699 36546->36529 36547 7ff684073518 36546->36547 36551 7ff684073520 free 36547->36551 36548->36529 36548->36548 36553 7ff6840734b3 36550->36553 36551->36545 36551->36551 36552 7ff684073545 36554 7ff684073561 36552->36554 36556 7ff684073550 free 36552->36556 36555 7ff6840be2f0 8 API calls 36553->36555 36700 7ff6840730b0 31 API calls 36554->36700 36558 7ff684069cf4 36555->36558 36556->36554 36556->36556 36574 7ff684059fe0 36558->36574 36559 7ff68407356d 36560 7ff684073639 36559->36560 36561 7ff684073584 36559->36561 36562 7ff6840735c0 36559->36562 36563 7ff6840735b0 calloc 36559->36563 36702 7ff684060ce0 _CxxThrowException 36560->36702 36565 7ff68404c3c0 7 API calls 36561->36565 36568 7ff6840735cd 36562->36568 36569 7ff68407362f 36562->36569 36563->36562 36567 7ff684073609 36565->36567 36570 7ff684073617 free 36567->36570 36567->36571 36568->36561 36573 7ff6840735d2 memcpy 36568->36573 36701 7ff684060ce0 _CxxThrowException 36569->36701 36570->36571 36571->36539 36571->36542 36573->36561 36575 7ff684059ffe 36574->36575 36576 7ff6840507b0 7 API calls 36575->36576 36577 7ff68405a02a 36576->36577 36578 7ff6840507b0 7 API calls 36577->36578 36579 7ff68405a05a 36578->36579 36711 7ff68405f8e0 36579->36711 36582 7ff68405a0f4 36590 7ff68404ac80 36582->36590 36583 7ff68405a0b3 36583->36582 36586 7ff68405a0ef 36583->36586 36588 7ff68405a0e8 _invalid_parameter_noinfo_noreturn 36583->36588 36584 7ff68405a0ae 36585 7ff6840be58c Concurrency::wait free 36584->36585 36585->36583 36589 7ff6840be58c Concurrency::wait free 36586->36589 36587 7ff68405a0a7 _invalid_parameter_noinfo_noreturn 36587->36584 36588->36586 36589->36582 36591 7ff68404ace2 36590->36591 36593 7ff68404aca3 memcpy 36590->36593 36732 7ff68404ce90 10 API calls 3 library calls 36591->36732 36593->36357 36595 7ff68404acf8 36595->36357 36597 7ff684059d5e 36596->36597 36598 7ff6840507b0 7 API calls 36597->36598 36599 7ff684059d8a 36598->36599 36733 7ff684068180 36599->36733 36601 7ff684059da8 36602 7ff684059e13 36601->36602 36603 7ff684059e0e 36601->36603 36604 7ff684059e07 _invalid_parameter_noinfo_noreturn 36601->36604 36602->36360 36605 7ff6840be58c Concurrency::wait free 36603->36605 36604->36603 36605->36602 36607 7ff68405a11e 36606->36607 36608 7ff6840507b0 7 API calls 36607->36608 36609 7ff68405a14a 36608->36609 36610 7ff684068180 ?_Xout_of_range@std@@YAXPEBD 36609->36610 36611 7ff68405a168 36610->36611 36612 7ff68405a1d3 36611->36612 36613 7ff68405a1ce 36611->36613 36614 7ff68405a1c7 _invalid_parameter_noinfo_noreturn 36611->36614 36612->36368 36615 7ff6840be58c Concurrency::wait free 36613->36615 36614->36613 36615->36612 36617 7ff684059f1e 36616->36617 36618 7ff6840507b0 7 API calls 36617->36618 36619 7ff684059f4a 36618->36619 36620 7ff684068180 ?_Xout_of_range@std@@YAXPEBD 36619->36620 36621 7ff684059f68 36620->36621 36622 7ff684059fd3 36621->36622 36623 7ff684059fce 36621->36623 36624 7ff684059fc7 _invalid_parameter_noinfo_noreturn 36621->36624 36622->36376 36625 7ff6840be58c Concurrency::wait free 36623->36625 36624->36623 36625->36622 36638->36408 36639->36410 36641 7ff6840507da 36640->36641 36642 7ff6840507f3 36640->36642 36641->36412 36643 7ff684050809 36642->36643 36644 7ff6840508d1 36642->36644 36645 7ff684050817 memcpy 36643->36645 36646 7ff684050835 36643->36646 36738 7ff684041e40 ?_Xlength_error@std@@YAXPEBD 36644->36738 36645->36412 36648 7ff6840508d6 36646->36648 36651 7ff684050841 36646->36651 36652 7ff684050898 36646->36652 36739 7ff684041da0 __std_exception_copy Concurrency::cancel_current_task 36648->36739 36649 7ff6840be310 std::_Facet_Register 3 API calls 36654 7ff684050857 36649->36654 36651->36649 36653 7ff6840508a5 memcpy 36652->36653 36656 7ff6840be310 std::_Facet_Register 3 API calls 36652->36656 36653->36412 36657 7ff68405085c 36654->36657 36658 7ff684050891 _invalid_parameter_noinfo_noreturn 36654->36658 36655 7ff6840508dc 36656->36657 36657->36653 36658->36652 36659->36414 36660->36428 36662 7ff684058e7d 36661->36662 36663 7ff684058e49 memcpy 36661->36663 36663->36425 36665->36446 36666->36453 36667->36460 36668->36466 36669->36469 36670->36472 36671->36488 36672->36494 36673->36508 36674->36515 36676->36493 36703 7ff684072d90 7 API calls 36678->36703 36680 7ff684072843 36696 7ff6840728bd 36680->36696 36704 7ff684072d90 7 API calls 36680->36704 36682 7ff6840728c8 36709 7ff684060ce0 _CxxThrowException 36682->36709 36684 7ff68407285e 36684->36682 36705 7ff684072d90 7 API calls 36684->36705 36686 7ff6840728d3 36710 7ff684060ce0 _CxxThrowException 36686->36710 36690 7ff684072879 36690->36686 36706 7ff684072d90 7 API calls 36690->36706 36694 7ff684072894 36697 7ff68407289c GetCurrentProcess OpenProcessToken 36694->36697 36707 7ff684060ce0 _CxxThrowException 36694->36707 36708 7ff684060ce0 _CxxThrowException 36696->36708 36697->36528 36697->36529 36698->36536 36699->36552 36700->36559 36703->36680 36704->36684 36705->36690 36706->36694 36712 7ff68405f97a 36711->36712 36713 7ff68405f928 36711->36713 36714 7ff68405f982 memcpy 36712->36714 36715 7ff68405f9d5 36712->36715 36713->36712 36716 7ff68405f92d memcpy 36713->36716 36717 7ff68405f9bb 36714->36717 36718 7ff68405f9be memcpy 36714->36718 36719 7ff68405fa7f 36715->36719 36720 7ff68405f9ee 36715->36720 36723 7ff68405a072 36716->36723 36717->36718 36718->36723 36731 7ff684041e40 ?_Xlength_error@std@@YAXPEBD 36719->36731 36730 7ff684057810 4 API calls 2 library calls 36720->36730 36723->36583 36723->36584 36723->36587 36726 7ff68405fa28 memcpy 36728 7ff68405fa58 memcpy 36726->36728 36729 7ff68405fa55 36726->36729 36728->36723 36729->36728 36730->36726 36732->36595 36734 7ff68406827b 36733->36734 36737 7ff68404b540 ?_Xout_of_range@std@@YAXPEBD 36734->36737 36739->36655 36740 7ff68407a6a0 36741 7ff68407a6e4 36740->36741 36742 7ff68407a6f4 36740->36742 36744 7ff68408cd30 3 API calls 36741->36744 36743 7ff68408c3f0 2 API calls 36742->36743 36745 7ff68407a736 36743->36745 36744->36742 36751 7ff68407ad30 calloc 36745->36751 36748 7ff68407a75e 36785 7ff684085340 19 API calls 36748->36785 36749 7ff68407a755 36752 7ff68407ad81 malloc 36751->36752 36753 7ff68407aebe _errno 36751->36753 36754 7ff68407ae0c InitializeCriticalSectionEx 36752->36754 36755 7ff68407ae37 36752->36755 36775 7ff68407a751 36753->36775 36756 7ff6840936a0 29 API calls 36754->36756 36757 7ff68407ae60 free 36755->36757 36758 7ff68407ae50 DeleteCriticalSection free 36755->36758 36759 7ff68407ae2f 36756->36759 36760 7ff68407ae78 36757->36760 36761 7ff68407ae73 36757->36761 36758->36757 36759->36755 36762 7ff68407aee6 _strdup 36759->36762 36764 7ff68407ae88 free 36760->36764 36765 7ff68407ae82 closesocket 36760->36765 36787 7ff6840972c0 free free free 36761->36787 36762->36755 36766 7ff68407af00 free _strdup 36762->36766 36764->36753 36765->36764 36767 7ff68407af22 36766->36767 36768 7ff68407af4e 36766->36768 36786 7ff684097990 _beginthreadex 36767->36786 36770 7ff68407af5a EnterCriticalSection LeaveCriticalSection 36768->36770 36771 7ff68407afd1 free 36768->36771 36773 7ff68407af95 36770->36773 36774 7ff68407af84 CloseHandle 36770->36774 36771->36753 36772 7ff68407af36 36772->36775 36776 7ff68407af3e _errno 36772->36776 36778 7ff68407af9a 36773->36778 36779 7ff68407afa2 36773->36779 36777 7ff68407afb8 36774->36777 36775->36748 36775->36749 36776->36768 36780 7ff68407afc8 closesocket 36777->36780 36790 7ff6840755a0 free 36777->36790 36788 7ff6840979e0 WaitForSingleObjectEx CloseHandle 36778->36788 36789 7ff68407abb0 7 API calls 36779->36789 36780->36771 36784 7ff68407afab free 36784->36777 36785->36749 36786->36772 36787->36760 36788->36779 36789->36784 36790->36780 36791 7ff6840856c0 recv 36792 7ff6840856db WSAGetLastError 36791->36792 36793 7ff684085702 36791->36793 36794 7ff684085c00 36797 7ff6840858a0 36794->36797 36798 7ff6840859a7 send 36797->36798 36801 7ff68408590f 36797->36801 36799 7ff6840859c5 WSAGetLastError 36798->36799 36802 7ff6840859d4 36798->36802 36800 7ff6840859e0 36799->36800 36799->36802 36815 7ff68406f4a0 27 API calls 36800->36815 36801->36798 36804 7ff684094c20 19 API calls 36801->36804 36805 7ff6840be2f0 8 API calls 36802->36805 36807 7ff684085943 36804->36807 36808 7ff684085a27 36805->36808 36806 7ff6840859f2 36816 7ff684085340 19 API calls 36806->36816 36807->36798 36811 7ff68408594c 36807->36811 36810 7ff684085a04 36810->36802 36812 7ff684085954 malloc 36811->36812 36813 7ff684085980 recv 36811->36813 36812->36813 36814 7ff68408599d 36812->36814 36813->36798 36813->36814 36814->36798 36815->36806 36816->36810 36817 7ff68407ac20 36818 7ff684073cd0 13 API calls 36817->36818 36819 7ff68407ac5f 36818->36819 36836 7ff684097310 getaddrinfo 36819->36836 36822 7ff68407ac9d EnterCriticalSection 36824 7ff68407acac LeaveCriticalSection 36822->36824 36825 7ff68407acc8 36822->36825 36823 7ff68407ac7b WSAGetLastError 36826 7ff68407ac9a 36823->36826 36827 7ff68407ac85 WSAGetLastError 36823->36827 36854 7ff68407abb0 7 API calls 36824->36854 36829 7ff68407acf6 LeaveCriticalSection 36825->36829 36830 7ff68407acd2 send 36825->36830 36826->36822 36827->36822 36833 7ff68407ad06 36829->36833 36830->36829 36832 7ff68407aced WSAGetLastError 36830->36832 36831 7ff68407acbd free 36831->36833 36832->36829 36834 7ff6840be2f0 8 API calls 36833->36834 36835 7ff68407ad15 36834->36835 36839 7ff684097343 36836->36839 36850 7ff68407ac75 36836->36850 36837 7ff6840974b4 WSASetLastError 36837->36850 36838 7ff68409742e 36840 7ff684097471 freeaddrinfo 36838->36840 36841 7ff684097477 36838->36841 36839->36837 36839->36838 36842 7ff684097399 malloc 36839->36842 36840->36841 36845 7ff6840974af 36841->36845 36846 7ff68409747c 36841->36846 36843 7ff6840973b0 malloc 36842->36843 36844 7ff68409745c 36842->36844 36847 7ff6840973e7 memcpy 36843->36847 36848 7ff68409744b free 36843->36848 36844->36838 36845->36837 36845->36850 36849 7ff684097481 free free free 36846->36849 36846->36850 36851 7ff68409740e 36847->36851 36852 7ff6840973ff _strdup 36847->36852 36848->36838 36849->36849 36849->36850 36850->36822 36850->36823 36851->36839 36852->36851 36853 7ff684097430 free free 36852->36853 36853->36838 36854->36831

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$SleepU?$char_traits@$D@std@@@std@@exit$AttributeConsoleText$__std_fs_code_page$Handlememcpyremove$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??5?$basic_istream@Concurrency::cancel_current_taskD@std@@@1@_Init@?$basic_streambuf@V01@V?$basic_streambuf@_beginthreadexmemset
                                  • String ID: [$ ________ _______ __ ______ ______ _______ ________ _______ | \| \ | \ / \ / \ | \ | \| \ \$$$$$$$$| $$$$$$$\ | $$ | $$$$$$\| $$$$$$\| $$$$$$$\| $$$$$$$$| $$$$$$$$$xcD$296572$=#$"wnO$C:\Windows\System32\WindowIME.exe$C:\Windows\System32\WindowIME.exe$license$password$start C:\Windows\System32\WindowIME.exe$tdfree.json$username$.D$4S$?_$DJ$HD$PV$QK$S0$VS$bP$fN$}"$,$J
                                  • API String ID: 1441623851-1490423919
                                  • Opcode ID: 4d6bdc2dc5362cbe3fb6ce311a14566474b3a9226f59912db94adf0c4ea2de8c
                                  • Instruction ID: 8b823fc38b016799cca180ba44e3bb431aafc7dc1650aa4bea77b6bd01d96da9
                                  • Opcode Fuzzy Hash: 4d6bdc2dc5362cbe3fb6ce311a14566474b3a9226f59912db94adf0c4ea2de8c
                                  • Instruction Fuzzy Hash: F203EB62D19B82C5F712DB35D8812A9A764FF627C4F40D33EE94D769A6EF2CA185C300
                                  APIs
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C3F8
                                    • Part of subcall function 00007FF684065800: memcpy.VCRUNTIME140 ref: 00007FF6840658C3
                                    • Part of subcall function 00007FF684065800: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406593A
                                    • Part of subcall function 00007FF684065800: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065974
                                    • Part of subcall function 00007FF684065800: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840659CA
                                    • Part of subcall function 00007FF684059D40: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684059E07
                                  • memcpy.VCRUNTIME140 ref: 00007FF68406A1F8
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406A367
                                  • memset.VCRUNTIME140 ref: 00007FF68406A393
                                  • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF68406A3BB
                                  • ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF68406A3DB
                                  • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF68406A41B
                                    • Part of subcall function 00007FF684073650: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF684073768
                                    • Part of subcall function 00007FF684073650: memcpy.VCRUNTIME140 ref: 00007FF68407379A
                                    • Part of subcall function 00007FF684073650: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840737CC
                                    • Part of subcall function 00007FF684073650: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840737D7
                                  • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF68406A4E1
                                  • ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD@Z.MSVCP140 ref: 00007FF68406A4F6
                                  • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF68406A506
                                  • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF68406A524
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406A612
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406A787
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406A86F
                                  • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF68406A8FA
                                  • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF68406A907
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406A946
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406A94D
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406A9A6
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406AA04
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406AA49
                                    • Part of subcall function 00007FF684060110: ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406012D
                                    • Part of subcall function 00007FF684060110: ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406013B
                                    • Part of subcall function 00007FF684060110: ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406014F
                                    • Part of subcall function 00007FF684060110: ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406015B
                                    • Part of subcall function 00007FF684060110: ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z.MSVCP140 ref: 00007FF684060198
                                    • Part of subcall function 00007FF684060110: ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD0@Z.MSVCP140 ref: 00007FF6840601A6
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406AB2F
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406AB36
                                  • GetCurrentProcess.KERNEL32 ref: 00007FF68406AC3C
                                  • OpenProcessToken.ADVAPI32 ref: 00007FF68406AC4E
                                  • GetTokenInformation.KERNELBASE ref: 00007FF68406AC73
                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68406AC7C
                                  • GetTokenInformation.KERNELBASE ref: 00007FF68406ACA7
                                  • IsValidSid.ADVAPI32 ref: 00007FF68406ACB8
                                  • GetLengthSid.ADVAPI32 ref: 00007FF68406ACC9
                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68406ACD4
                                  • InitializeAcl.ADVAPI32 ref: 00007FF68406ACED
                                  • AddAccessAllowedAce.ADVAPI32 ref: 00007FF68406AD08
                                  • GetCurrentProcess.KERNEL32 ref: 00007FF68406AD12
                                  • SetSecurityInfo.ADVAPI32 ref: 00007FF68406AD35
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68406AD44
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68406AD4D
                                  • CloseHandle.KERNELBASE ref: 00007FF68406AD5C
                                  • GetModuleHandleA.KERNEL32 ref: 00007FF68406ADE3
                                  • GetCurrentProcess.KERNEL32 ref: 00007FF68406ADEC
                                  • GetModuleInformation.PSAPI ref: 00007FF68406AE02
                                  • SleepEx.KERNELBASE ref: 00007FF68406AEB0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: U?$char_traits@$D@std@@@std@@_invalid_parameter_noinfo_noreturn$Processmallocmemcpy$CurrentInformationTokenfree$??6?$basic_ostream@?eback@?$basic_streambuf@HandleModuleV01@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?epptr@?$basic_streambuf@?fill@?$basic_ios@?pptr@?$basic_streambuf@?setg@?$basic_streambuf@?setp@?$basic_streambuf@?setw@std@@AccessAllowedCloseD00@D@std@@@1@@InfoInitializeJ@1@_LengthOpenSecuritySleepSmanip@_U?$_V21@@V?$basic_streambuf@ValidVios_base@1@memsetsystem
                                  • String ID: $LockMemAccess() failed, don't tamper with the program.$Pattern checksum failed, don't tamper with the program.$Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: $You need to run the KeyAuthApp.init(); function before any other KeyAuth functions$Y$check_section_integrity() failed, don't tamper with the program.$k$tdfree.json
                                  • API String ID: 2558907110-2430986550
                                  • Opcode ID: f75ce75531f2d5d8765d753868528cb365777b28321de8710cba704020084b10
                                  • Instruction ID: 95d2feb29cd10e2ab7d44d94303df5c389d11379158ae334491d1f568c5740a3
                                  • Opcode Fuzzy Hash: f75ce75531f2d5d8765d753868528cb365777b28321de8710cba704020084b10
                                  • Instruction Fuzzy Hash: 9EB29E72A08B86C9EB10DF64D8843EE3761FF56788F40463ADA4E57A9ADF78D184C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$_invalid_parameter_noinfo_noreturnstrtol
                                  • String ID: -$Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: $Y$Y$k$O{$|M
                                  • API String ID: 2745139636-2599321255
                                  • Opcode ID: bf101efa4d96d7ca6df3b44cd4aee80c63358ae011bd4a00c614fdfae5477a3d
                                  • Instruction ID: 90382fdb934fa108ef6fc35538615aba954306f7ce11714e81d9a1ffe6475f1c
                                  • Opcode Fuzzy Hash: bf101efa4d96d7ca6df3b44cd4aee80c63358ae011bd4a00c614fdfae5477a3d
                                  • Instruction Fuzzy Hash: BEC29F62A187C6C9EB20DB74D8853EE2761FF85798F404639DA4D97A9ADF78D284C300

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 719 7ff6840882b0-7ff6840882cc 720 7ff6840882ce-7ff6840882e0 WSAStartup 719->720 721 7ff684088316-7ff68408831d call 7ff6840b0db0 719->721 723 7ff6840882e2-7ff6840882e9 720->723 724 7ff6840882f9-7ff684088315 call 7ff6840be2f0 720->724 730 7ff6840885df-7ff6840885f6 call 7ff6840be2f0 721->730 731 7ff684088323-7ff684088350 GetModuleHandleA 721->731 727 7ff6840882f3 WSACleanup 723->727 728 7ff6840882eb-7ff6840882f1 723->728 727->724 728->721 728->727 733 7ff68408835e-7ff684088393 GetProcAddress strpbrk 731->733 734 7ff684088352-7ff684088359 731->734 737 7ff684088395-7ff68408839b 733->737 738 7ff6840883bb-7ff6840883be 733->738 736 7ff6840884e3-7ff6840885d7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 734->736 736->730 739 7ff6840883ad-7ff6840883b6 LoadLibraryA 737->739 740 7ff68408839d-7ff6840883a8 737->740 741 7ff6840883c0-7ff6840883d3 GetProcAddress 738->741 742 7ff6840883ea-7ff684088401 GetSystemDirectoryA 738->742 745 7ff6840884aa-7ff6840884bc 739->745 740->745 741->742 746 7ff6840883d5-7ff6840883e5 LoadLibraryExA 741->746 743 7ff6840884a2 742->743 744 7ff684088407-7ff68408841a malloc 742->744 743->745 747 7ff684088499-7ff68408849c free 744->747 748 7ff68408841c-7ff68408842a GetSystemDirectoryA 744->748 745->736 749 7ff6840884be-7ff6840884dc GetProcAddress 745->749 746->745 747->743 748->747 751 7ff68408842c-7ff684088436 748->751 749->736 752 7ff684088440-7ff684088449 751->752 752->752 753 7ff68408844b-7ff684088450 752->753 754 7ff684088454-7ff68408845b 753->754 754->754 755 7ff68408845d-7ff684088466 754->755 756 7ff684088470-7ff68408847c 755->756 756->756 757 7ff68408847e-7ff684088484 756->757 758 7ff684088490 LoadLibraryA 757->758 759 7ff684088486-7ff68408848e 757->759 760 7ff684088496 758->760 759->760 760->747
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                  • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                  • API String ID: 2612373469-2794540096
                                  • Opcode ID: a2abb7c9c0f84450cc4eebcd7e5617dd69ff7cf3676c66eadbc4ed031804b4e4
                                  • Instruction ID: 894d2bb62a515d157f189eecc6349f4031cae80610ecf32e12f18e1b06ecae3a
                                  • Opcode Fuzzy Hash: a2abb7c9c0f84450cc4eebcd7e5617dd69ff7cf3676c66eadbc4ed031804b4e4
                                  • Instruction Fuzzy Hash: A5916D22E49B82C2EB64DB21A9943BB73A1FF88B80F44513DD94E86765EF3CE545C710

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 762 7ff684087690-7ff6840876fd 763 7ff684087702-7ff684087712 762->763 764 7ff6840876ff 762->764 765 7ff684087714-7ff68408771c 763->765 766 7ff684087721-7ff684087739 memcpy 763->766 764->763 765->766 767 7ff68408773b-7ff684087766 call 7ff684075d30 * 2 766->767 768 7ff684087768-7ff68408777b socket 766->768 769 7ff68408777e-7ff68408778a 767->769 768->769 772 7ff684087790-7ff684087798 769->772 773 7ff684087c1f 769->773 775 7ff68408779a-7ff6840877a2 call 7ff6840938d0 772->775 776 7ff6840877a7-7ff6840877b0 772->776 774 7ff684087c24-7ff684087c4d call 7ff6840be2f0 773->774 775->776 780 7ff6840877b2-7ff6840877bd 776->780 781 7ff6840877c0-7ff6840877c9 776->781 780->781 784 7ff6840877dc-7ff6840877e0 781->784 785 7ff6840877cb-7ff6840877ce 781->785 786 7ff6840877e5-7ff6840877f7 call 7ff6840afaf0 784->786 788 7ff684087bca-7ff684087c1d _errno * 3 call 7ff68406f4a0 call 7ff684085340 call 7ff684085fa0 785->788 789 7ff6840877d4-7ff6840877da 785->789 786->788 794 7ff6840877fd-7ff684087825 htons call 7ff6840854c0 786->794 788->774 789->786 800 7ff68408782c-7ff684087831 794->800 801 7ff684087827-7ff68408782a 794->801 803 7ff68408789e 800->803 804 7ff684087833-7ff68408783d 800->804 801->800 801->803 805 7ff6840878a1-7ff6840878bd 803->805 804->805 806 7ff68408783f-7ff68408786b setsockopt 804->806 807 7ff6840878ed-7ff6840878f0 805->807 808 7ff6840878bf-7ff6840878d3 call 7ff684088130 805->808 809 7ff68408786d-7ff684087894 WSAGetLastError call 7ff68406f4a0 call 7ff6840854c0 806->809 810 7ff684087899-7ff68408789c 806->810 812 7ff684087944-7ff684087947 807->812 813 7ff6840878f2-7ff684087917 getsockopt 807->813 821 7ff6840878d5-7ff6840878df 808->821 822 7ff6840878e1-7ff6840878eb 808->822 809->810 810->805 818 7ff68408794d-7ff684087954 812->818 819 7ff684087a2f-7ff684087a36 812->819 816 7ff684087919-7ff684087921 813->816 817 7ff684087923-7ff68408793e setsockopt 813->817 816->812 816->817 817->812 818->819 825 7ff68408795a-7ff684087985 setsockopt 818->825 823 7ff684087a6a-7ff684087a71 819->823 824 7ff684087a38-7ff684087a65 call 7ff684075d30 * 2 819->824 821->812 822->813 827 7ff684087a78-7ff684087a98 call 7ff6840afa60 call 7ff684087000 823->827 828 7ff684087a73-7ff684087a76 823->828 857 7ff684087a67 824->857 858 7ff684087ab5-7ff684087ab7 824->858 830 7ff684087987-7ff684087999 call 7ff6840854c0 825->830 831 7ff68408799e-7ff684087a12 call 7ff684073a00 * 2 WSAIoctl 825->831 833 7ff684087ace-7ff684087af8 call 7ff6840938d0 call 7ff68408c3f0 827->833 851 7ff684087a9a-7ff684087aa8 call 7ff684085fa0 827->851 828->827 828->833 830->819 831->819 850 7ff684087a14-7ff684087a2a WSAGetLastError call 7ff6840854c0 831->850 853 7ff684087afa-7ff684087b0a call 7ff684075290 833->853 854 7ff684087b0f-7ff684087b12 833->854 850->819 851->773 865 7ff684087aae-7ff684087ab0 851->865 853->854 860 7ff684087b18-7ff684087b20 854->860 861 7ff684087bbf-7ff684087bc8 854->861 857->823 858->823 863 7ff684087ab9-7ff684087ac9 call 7ff684085fa0 858->863 860->861 864 7ff684087b26-7ff684087b2d 860->864 861->774 863->774 867 7ff684087b58-7ff684087b63 WSAGetLastError 864->867 868 7ff684087b2f-7ff684087b44 connect 864->868 865->774 871 7ff684087b65-7ff684087b6e 867->871 872 7ff684087bb2-7ff684087bb4 867->872 868->867 870 7ff684087b46-7ff684087b48 868->870 873 7ff684087bbb-7ff684087bbd 870->873 874 7ff684087b4a-7ff684087b53 870->874 871->872 875 7ff684087b70-7ff684087bb0 call 7ff68406f4a0 call 7ff6840854c0 call 7ff684085fa0 871->875 872->873 873->774 874->774 875->774
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                  • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                  • API String ID: 3453287622-3868455274
                                  • Opcode ID: 7fbe668ccd14376b0f30da98c5fdf22b02a3ca90ae438779b0eb7243aaf3a137
                                  • Instruction ID: a57ce1a54410a85c67d7220dfe08ad59b08afe7a6899661da4c825591209afdf
                                  • Opcode Fuzzy Hash: 7fbe668ccd14376b0f30da98c5fdf22b02a3ca90ae438779b0eb7243aaf3a137
                                  • Instruction Fuzzy Hash: ACF19F72A18282C6E760DB2599846BF63A1FF84B58F40453DDA4DC7B9ADF3CE945CB00

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1136 7ff68406ecb0-7ff68406ecec GetLastError _errno 1137 7ff68406ecf5-7ff68406ecfe 1136->1137 1138 7ff68406ecee-7ff68406ecf0 1136->1138 1140 7ff68406ed04 1137->1140 1141 7ff68406f11e-7ff68406f124 1137->1141 1139 7ff68406f283-7ff68406f2a0 call 7ff6840be2f0 1138->1139 1142 7ff68406ed0a-7ff68406ed13 1140->1142 1143 7ff68406f112-7ff68406f119 1140->1143 1145 7ff68406f148-7ff68406f151 1141->1145 1146 7ff68406f126 1141->1146 1147 7ff68406ed19-7ff68406ed29 1142->1147 1148 7ff68406f1d0-7ff68406f1dd 1142->1148 1149 7ff68406ed35-7ff68406ed52 call 7ff684073cd0 1143->1149 1145->1148 1153 7ff68406f153-7ff68406f16b 1145->1153 1151 7ff68406f13c-7ff68406f143 1146->1151 1152 7ff68406f128-7ff68406f12a 1146->1152 1147->1149 1148->1149 1154 7ff68406f1e3-7ff68406f1fb call 7ff684073cd0 1148->1154 1158 7ff68406ed57-7ff68406edb8 FormatMessageA strchr 1149->1158 1151->1149 1152->1148 1156 7ff68406f130-7ff68406f137 1152->1156 1153->1148 1162 7ff68406f25a-7ff68406f263 _errno 1154->1162 1156->1149 1160 7ff68406f200-7ff68406f222 1158->1160 1161 7ff68406edbe-7ff68406edc9 1158->1161 1165 7ff68406f247-7ff68406f255 strncpy 1160->1165 1166 7ff68406f224-7ff68406f245 call 7ff684073cd0 1160->1166 1163 7ff68406f1fd 1161->1163 1164 7ff68406edcf-7ff68406edd3 1161->1164 1167 7ff68406f265-7ff68406f26b _errno 1162->1167 1168 7ff68406f26e-7ff68406f276 GetLastError 1162->1168 1163->1160 1164->1163 1169 7ff68406edd9-7ff68406eddd 1164->1169 1165->1162 1166->1162 1167->1168 1172 7ff68406f278-7ff68406f27a SetLastError 1168->1172 1173 7ff68406f280 1168->1173 1169->1160 1172->1173 1173->1139
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast_errno
                                  • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                  • API String ID: 3939687465-1752685260
                                  • Opcode ID: 409e705d19cf3ed37423249426760e2677fe8dbf5abc856a0b22f0099a154147
                                  • Instruction ID: efe9b090174bd34ff628e1490565bbda42be1d46f20ca65e8c92483c67758e49
                                  • Opcode Fuzzy Hash: 409e705d19cf3ed37423249426760e2677fe8dbf5abc856a0b22f0099a154147
                                  • Instruction Fuzzy Hash: F3515D32A0C782C6F7218B64E4843BB76A4BF84B84F44443DDA4E86B99DF3CE585CB51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1195 7ff684061b50-7ff684061bf3 GetModuleFileNameA 1196 7ff684061bf6-7ff684061bfd 1195->1196 1196->1196 1197 7ff684061bff-7ff684061c0c 1196->1197 1198 7ff684061c12-7ff684061c1f 1197->1198 1199 7ff684061f95-7ff684061f9a call 7ff684041e40 1197->1199 1201 7ff684061c41-7ff684061c4b 1198->1201 1202 7ff684061c21-7ff684061c3f memcpy 1198->1202 1203 7ff684061c4d-7ff684061c58 1201->1203 1204 7ff684061c5c-7ff684061c95 call 7ff684057810 memcpy 1201->1204 1206 7ff684061c99-7ff684061cd6 call 7ff684068180 1202->1206 1203->1204 1204->1206 1211 7ff684061cd8-7ff684061cdb 1206->1211 1212 7ff684061cf4-7ff684061d64 call 7ff6840507b0 call 7ff684068180 1206->1212 1213 7ff684061ce0-7ff684061cee 1211->1213 1219 7ff684061d9b-7ff684061df1 _popen 1212->1219 1220 7ff684061d66-7ff684061d77 1212->1220 1213->1213 1215 7ff684061cf0 1213->1215 1215->1212 1223 7ff684061df7-7ff684061e0c fgets 1219->1223 1224 7ff684061f58-7ff684061f94 call 7ff684060a90 call 7ff684041e60 _CxxThrowException 1219->1224 1221 7ff684061d79-7ff684061d8c 1220->1221 1222 7ff684061d95-7ff684061d9a call 7ff6840be58c 1220->1222 1221->1222 1225 7ff684061d8e-7ff684061d94 _invalid_parameter_noinfo_noreturn 1221->1225 1222->1219 1228 7ff684061e4d-7ff684061e60 _pclose 1223->1228 1229 7ff684061e0e 1223->1229 1224->1199 1225->1222 1233 7ff684061e97-7ff684061eb2 1228->1233 1234 7ff684061e62-7ff684061e74 1228->1234 1232 7ff684061e10-7ff684061e17 1229->1232 1238 7ff684061e20-7ff684061e28 1232->1238 1235 7ff684061eea-7ff684061ef3 1233->1235 1236 7ff684061eb4-7ff684061ec6 1233->1236 1239 7ff684061e76-7ff684061e89 1234->1239 1240 7ff684061e92 call 7ff6840be58c 1234->1240 1247 7ff684061f2a-7ff684061f57 call 7ff6840be2f0 1235->1247 1248 7ff684061ef5-7ff684061f07 1235->1248 1243 7ff684061ec8-7ff684061edb 1236->1243 1244 7ff684061ee4-7ff684061ee9 call 7ff6840be58c 1236->1244 1238->1238 1246 7ff684061e2a-7ff684061e4b call 7ff684058e30 fgets 1238->1246 1239->1240 1241 7ff684061e8b-7ff684061e91 _invalid_parameter_noinfo_noreturn 1239->1241 1240->1233 1241->1240 1243->1244 1250 7ff684061edd-7ff684061ee3 _invalid_parameter_noinfo_noreturn 1243->1250 1244->1235 1246->1228 1246->1232 1253 7ff684061f09-7ff684061f1c 1248->1253 1254 7ff684061f25 call 7ff6840be58c 1248->1254 1250->1244 1253->1254 1258 7ff684061f1e-7ff684061f24 _invalid_parameter_noinfo_noreturn 1253->1258 1254->1247 1258->1254
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$fgetsmemcpy$FileModuleName_pclose_popen
                                  • String ID: >$certutil -hashfile "
                                  • API String ID: 367312288-631556956
                                  • Opcode ID: 0dbf5409d27c6dcffe2eafe7a7cda89ef92cdb9577a699b761cb508d62a58259
                                  • Instruction ID: 4e14e98c100a9796f7b0df80d41a638c46a2a6d4da7dd45d00fc2fa6105060c4
                                  • Opcode Fuzzy Hash: 0dbf5409d27c6dcffe2eafe7a7cda89ef92cdb9577a699b761cb508d62a58259
                                  • Instruction Fuzzy Hash: 0AC19122E18B82C5FB10CB64D8803AE6761FF957A4F505639EA9D96AE9DF7CD1C1C300

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1288 7ff6840936a0-7ff6840936ee socket 1289 7ff6840936f0 1288->1289 1290 7ff6840936f5-7ff68409374e htonl setsockopt 1288->1290 1291 7ff6840938a4-7ff6840938c2 call 7ff6840be2f0 1289->1291 1292 7ff684093754-7ff684093769 bind 1290->1292 1293 7ff68409387b-7ff684093897 closesocket * 3 1290->1293 1292->1293 1296 7ff68409376f-7ff684093785 getsockname 1292->1296 1294 7ff68409389c 1293->1294 1294->1291 1296->1293 1298 7ff68409378b-7ff68409379a listen 1296->1298 1298->1293 1299 7ff6840937a0-7ff6840937b5 socket 1298->1299 1299->1293 1300 7ff6840937bb-7ff6840937d0 connect 1299->1300 1300->1293 1301 7ff6840937d6-7ff6840937ec accept 1300->1301 1301->1293 1302 7ff6840937f2-7ff68409380e call 7ff684073cd0 1301->1302 1305 7ff684093815-7ff68409381c 1302->1305 1305->1305 1306 7ff68409381e-7ff684093838 send 1305->1306 1306->1293 1307 7ff68409383a-7ff684093856 recv 1306->1307 1307->1293 1308 7ff684093858-7ff68409386c memcmp 1307->1308 1308->1293 1309 7ff68409386e-7ff684093879 closesocket 1308->1309 1309->1294
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                  • String ID:
                                  • API String ID: 3699910901-0
                                  • Opcode ID: 9068b7b5969a30259dfa5a671c75fab05a3ce7ceae1bafbacfeb7b1c289a5c62
                                  • Instruction ID: cd4da00aa78a88ab2aa24f77cff5f740007157c5c8ea64929fac5b6b74f5f9a7
                                  • Opcode Fuzzy Hash: 9068b7b5969a30259dfa5a671c75fab05a3ce7ceae1bafbacfeb7b1c289a5c62
                                  • Instruction Fuzzy Hash: C3514C31A18A42C2E7509B25E49416A77A1FF84BB4F504739EA7A87AE4DF3DD449CB00

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1310 7ff6840618a0-7ff6840618e6 GetModuleHandleW 1311 7ff6840618ec-7ff6840618f6 1310->1311 1312 7ff684061b13 1310->1312 1311->1312 1314 7ff6840618fc-7ff684061909 1311->1314 1313 7ff684061b15-7ff684061b45 call 7ff6840be2f0 1312->1313 1314->1312 1315 7ff68406190f-7ff68406197b GetCurrentProcess QueryFullProcessImageNameW CreateFileW 1314->1315 1315->1312 1317 7ff684061981-7ff68406199f CreateFileMappingW 1315->1317 1319 7ff684061b0a-7ff684061b0d CloseHandle 1317->1319 1320 7ff6840619a5-7ff6840619c2 MapViewOfFile 1317->1320 1319->1312 1320->1312 1321 7ff6840619c8-7ff6840619cc 1320->1321 1322 7ff6840619d2-7ff6840619df 1321->1322 1323 7ff684061b01-7ff684061b04 UnmapViewOfFile 1321->1323 1322->1323 1324 7ff6840619e5-7ff6840619eb 1322->1324 1323->1319 1324->1323 1325 7ff6840619f1-7ff6840619f9 1324->1325 1325->1323 1326 7ff6840619ff-7ff684061a16 1325->1326 1327 7ff684061a1c 1326->1327 1328 7ff684061ae7-7ff684061aff UnmapViewOfFile CloseHandle 1326->1328 1329 7ff684061a20-7ff684061a29 1327->1329 1328->1313 1330 7ff684061a30-7ff684061a3a 1329->1330 1331 7ff684061a3c-7ff684061a41 1330->1331 1332 7ff684061a43-7ff684061a45 1330->1332 1331->1330 1331->1332 1333 7ff684061a47-7ff684061a4e 1332->1333 1334 7ff684061a50-7ff684061a5e 1332->1334 1333->1334 1335 7ff684061a65-7ff684061a6a 1333->1335 1334->1329 1336 7ff684061a60 1334->1336 1335->1328 1337 7ff684061a6c 1335->1337 1336->1328 1338 7ff684061a70-7ff684061a8c 1337->1338 1339 7ff684061adf-7ff684061ae5 1338->1339 1340 7ff684061a8e-7ff684061a93 1338->1340 1339->1328 1339->1338 1341 7ff684061adc 1340->1341 1342 7ff684061a95-7ff684061ad9 VirtualProtect * 2 1340->1342 1341->1339 1342->1341
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: File$HandleView$CloseCreateProcessProtectUnmapVirtual$CurrentFullImageMappingModuleNameQuery
                                  • String ID: @
                                  • API String ID: 1254450295-2766056989
                                  • Opcode ID: 2e316828ea7d98931a35c3d9e3bcc967a53c5dda6d29721783b1770a667eeeda
                                  • Instruction ID: 23ed04f36cc6d9aa88dd1f36783b41efbc7184b4ec6c20588fa5f4192924dcf1
                                  • Opcode Fuzzy Hash: 2e316828ea7d98931a35c3d9e3bcc967a53c5dda6d29721783b1770a667eeeda
                                  • Instruction Fuzzy Hash: DF71CF32A08742C6EB648B61E59067B77A1FF84B99F048139DB4A87B94EF3CE485C700

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1343 7ff684086350-7ff68408639d 1344 7ff6840863a8-7ff6840863e3 call 7ff68408c3f0 1343->1344 1345 7ff68408639f-7ff6840863a3 1343->1345 1351 7ff6840863e8-7ff6840863eb 1344->1351 1352 7ff6840863e5 1344->1352 1346 7ff6840868c6-7ff6840868e4 call 7ff6840be2f0 1345->1346 1353 7ff6840863ed-7ff6840863f0 1351->1353 1354 7ff684086408 1351->1354 1352->1351 1355 7ff684086403-7ff684086406 1353->1355 1356 7ff6840863f2-7ff6840863f5 1353->1356 1357 7ff68408640b-7ff684086437 call 7ff68408c480 1354->1357 1355->1357 1356->1357 1358 7ff6840863f7-7ff684086401 1356->1358 1361 7ff684086439-7ff68408644d call 7ff684085340 1357->1361 1362 7ff684086452-7ff68408645a 1357->1362 1358->1357 1371 7ff6840868b6-7ff6840868be 1361->1371 1364 7ff68408645c-7ff68408646e call 7ff684087520 1362->1364 1365 7ff684086489-7ff6840864a7 1362->1365 1373 7ff684086482-7ff684086484 1364->1373 1374 7ff684086470-7ff684086472 1364->1374 1366 7ff6840864b0-7ff6840864c5 1365->1366 1369 7ff6840864cb-7ff6840864df call 7ff684094c20 1366->1369 1370 7ff68408674a 1366->1370 1381 7ff6840864e5-7ff684086510 call 7ff68408c480 1369->1381 1382 7ff684086660-7ff684086663 1369->1382 1376 7ff68408674e-7ff68408675f 1370->1376 1371->1346 1373->1371 1374->1373 1377 7ff684086474-7ff68408647d call 7ff684087630 1374->1377 1376->1366 1379 7ff684086765-7ff684086767 1376->1379 1377->1373 1383 7ff68408676d-7ff684086784 call 7ff684087c50 1379->1383 1384 7ff6840868ac 1379->1384 1396 7ff684086529-7ff68408652c 1381->1396 1397 7ff684086512-7ff684086524 call 7ff6840854c0 1381->1397 1387 7ff684086665-7ff68408666c 1382->1387 1388 7ff6840866d4-7ff68408671a SleepEx getsockopt 1382->1388 1400 7ff68408678a-7ff684086791 1383->1400 1401 7ff684086837-7ff684086839 1383->1401 1385 7ff6840868ae 1384->1385 1385->1371 1387->1388 1393 7ff68408666e-7ff684086670 1387->1393 1390 7ff68408671c-7ff684086724 WSAGetLastError 1388->1390 1391 7ff684086726 1388->1391 1395 7ff68408672a-7ff68408672c 1390->1395 1391->1395 1398 7ff684086676-7ff6840866bc SleepEx getsockopt 1393->1398 1399 7ff68408657f-7ff684086581 1393->1399 1404 7ff6840867a3-7ff6840867f1 1395->1404 1405 7ff68408672e-7ff684086734 1395->1405 1402 7ff68408657b 1396->1402 1403 7ff68408652e-7ff684086535 1396->1403 1397->1396 1408 7ff6840866cb-7ff6840866cf 1398->1408 1409 7ff6840866be-7ff6840866c6 WSAGetLastError 1398->1409 1399->1370 1406 7ff684086587-7ff68408659c WSASetLastError 1399->1406 1410 7ff68408683b-7ff684086842 1400->1410 1411 7ff684086797-7ff68408679e 1400->1411 1401->1385 1402->1399 1403->1402 1413 7ff684086537-7ff684086563 call 7ff68408c480 1403->1413 1414 7ff684086806-7ff68408681b call 7ff684087520 1404->1414 1415 7ff6840867f3-7ff6840867fb call 7ff684085fa0 1404->1415 1405->1404 1416 7ff684086736-7ff684086745 call 7ff6840854c0 1405->1416 1406->1370 1417 7ff6840865a2-7ff68408660c call 7ff68408d7e0 call 7ff68406f4a0 call 7ff6840854c0 1406->1417 1408->1399 1409->1399 1418 7ff68408684d-7ff684086854 1410->1418 1419 7ff684086844-7ff68408684b 1410->1419 1412 7ff684086866-7ff6840868a9 call 7ff68406f4a0 call 7ff684085340 1411->1412 1412->1384 1413->1402 1436 7ff684086565-7ff684086576 call 7ff684087c50 1413->1436 1414->1385 1437 7ff684086821-7ff684086823 1414->1437 1415->1414 1416->1370 1446 7ff68408662e-7ff684086644 call 7ff684087c50 1417->1446 1447 7ff68408660e-7ff684086615 1417->1447 1427 7ff684086856-7ff68408685d 1418->1427 1428 7ff68408685f 1418->1428 1419->1412 1427->1412 1428->1412 1436->1402 1437->1385 1441 7ff684086829-7ff684086832 call 7ff684087630 1437->1441 1441->1401 1453 7ff684086657-7ff68408665b 1446->1453 1454 7ff684086646-7ff684086651 1446->1454 1447->1446 1448 7ff684086617-7ff68408661e 1447->1448 1450 7ff684086620-7ff684086623 1448->1450 1450->1446 1452 7ff684086625-7ff68408662c 1450->1452 1452->1446 1452->1450 1453->1376 1454->1370 1454->1453
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                  • API String ID: 0-3307081561
                                  • Opcode ID: 356228e0ad211aa04f201cdd57561f98ec870220b461ab274836ff6a918cd8f8
                                  • Instruction ID: 547b8ad7f17148503ed130454bfa2e3db23833e364eae3fef3f2295dab28f33b
                                  • Opcode Fuzzy Hash: 356228e0ad211aa04f201cdd57561f98ec870220b461ab274836ff6a918cd8f8
                                  • Instruction Fuzzy Hash: 7BE1DE22E48682C2EB648B259A847BE67A1FF847A4F050639DE6E877D5CF3CE455C700

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 882 7ff68407ad30-7ff68407ad7b calloc 883 7ff68407ad81-7ff68407ae0a malloc 882->883 884 7ff68407aebe-7ff68407aec7 _errno 882->884 885 7ff68407ae0c-7ff68407ae31 InitializeCriticalSectionEx call 7ff6840936a0 883->885 886 7ff68407ae47-7ff68407ae4e 883->886 887 7ff68407aec9-7ff68407aee5 884->887 894 7ff68407ae37-7ff68407ae3f 885->894 895 7ff68407aee6-7ff68407aefa _strdup 885->895 889 7ff68407ae60-7ff68407ae71 free 886->889 890 7ff68407ae50-7ff68407ae5a DeleteCriticalSection free 886->890 892 7ff68407ae78-7ff68407ae80 889->892 893 7ff68407ae73 call 7ff6840972c0 889->893 890->889 897 7ff68407ae88-7ff68407aeb8 free 892->897 898 7ff68407ae82 closesocket 892->898 893->892 894->886 895->886 899 7ff68407af00-7ff68407af20 free _strdup 895->899 897->884 898->897 900 7ff68407af22-7ff68407af31 call 7ff684097990 899->900 901 7ff68407af4e-7ff68407af58 899->901 905 7ff68407af36-7ff68407af3c 900->905 903 7ff68407af5a-7ff68407af82 EnterCriticalSection LeaveCriticalSection 901->903 904 7ff68407afd1-7ff68407afec free 901->904 906 7ff68407af95-7ff68407af98 903->906 907 7ff68407af84-7ff68407af8c CloseHandle 903->907 904->884 908 7ff68407af8e-7ff68407af90 905->908 909 7ff68407af3e-7ff68407af4b _errno 905->909 911 7ff68407af9a-7ff68407af9d call 7ff6840979e0 906->911 912 7ff68407afa2-7ff68407afb2 call 7ff68407abb0 free 906->912 910 7ff68407afb8-7ff68407afbb 907->910 908->887 909->901 913 7ff68407afbd-7ff68407afc3 call 7ff6840755a0 910->913 914 7ff68407afc8-7ff68407afcb closesocket 910->914 911->912 912->910 913->914 914->904
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                  • String ID:
                                  • API String ID: 259767416-0
                                  • Opcode ID: 08bfdc0a616b5449b675fc3b6a71c19aeadc8a73c7ef888a8d41055f95840ca7
                                  • Instruction ID: ded8f7c36c7c7c55095bc18dc7958c970c33e3d95aa602f9aace6a1635bc6cba
                                  • Opcode Fuzzy Hash: 08bfdc0a616b5449b675fc3b6a71c19aeadc8a73c7ef888a8d41055f95840ca7
                                  • Instruction Fuzzy Hash: 38813C26E09B81C6E624DF21E49426A7370FF98B64F055239DB9E437A2DF79E4E4C700
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                  • API String ID: 0-760484938
                                  • Opcode ID: 3a728d22a84f41c31796f38ed04f280e8c2a7637d9a2b1b684973ba32ae2d105
                                  • Instruction ID: 0d3effe11dff501b5c727c6e366b4ba97fcfab5053decc3c6027af2e94b780da
                                  • Opcode Fuzzy Hash: 3a728d22a84f41c31796f38ed04f280e8c2a7637d9a2b1b684973ba32ae2d105
                                  • Instruction Fuzzy Hash: EF42AE22A49BC2D6EB599B259A903BA77A0FF45B85F08013DCE5D8B795DF3CE460C310

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: callocfree
                                  • String ID: <$<$<$`$v
                                  • API String ID: 306872129-2056843887
                                  • Opcode ID: dc751d8e739463a4cac2bcd6922f5c44484b2fd448b9f01696e4a08d662ed99d
                                  • Instruction ID: 845215c09ee025341a9eabe82f4cd1534bd81f1993469fd686c1990687249cbd
                                  • Opcode Fuzzy Hash: dc751d8e739463a4cac2bcd6922f5c44484b2fd448b9f01696e4a08d662ed99d
                                  • Instruction Fuzzy Hash: 2E913932908BC1C6E340CF34D5443E937A4FB99B5CF085239CE995A79ADFBAA195C720

                                  Control-flow Graph

                                  APIs
                                  • GetModuleHandleA.KERNEL32(00000000,?,?,00007FF6840B0DEA,?,?,?,?,00007FF68408831B), ref: 00007FF684087FA4
                                  • GetProcAddress.KERNEL32(?,?,?,?,00007FF68408831B), ref: 00007FF684087FC9
                                  • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00007FF68408831B), ref: 00007FF684087FDC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressHandleModuleProcstrpbrk
                                  • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                  • API String ID: 27745253-3327535076
                                  • Opcode ID: da57410d831077ab84e80e8930caad6ccb82770ef333fc78be7bb1eb9f493c4e
                                  • Instruction ID: 98cb774520ddb8557ba8f22fea7b21b73a0c779ffb42ac8bf8645cde29caf0e7
                                  • Opcode Fuzzy Hash: da57410d831077ab84e80e8930caad6ccb82770ef333fc78be7bb1eb9f493c4e
                                  • Instruction Fuzzy Hash: C041A216F49A42C6EB558F16AD9013A67A1FF85FE1F088138CE0D87794DE3DE486D720

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast$_errnogetpeernamegetsockname
                                  • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                  • API String ID: 2911674258-670633250
                                  • Opcode ID: 184ae445e22feafc04c64addd34149bd93a7c88f3ea86fb6aeec688e36e2be0c
                                  • Instruction ID: d594ac431e86b2db28db1eb7246682bc4953d257d3c8dfcb3e917ba7c7a2340d
                                  • Opcode Fuzzy Hash: 184ae445e22feafc04c64addd34149bd93a7c88f3ea86fb6aeec688e36e2be0c
                                  • Instruction Fuzzy Hash: 1F917E32E19BC5C6E710CF25D5902EA73A0FB99B88F44523ADE4C8765ADF39E185CB10

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1490 7ff684097310-7ff68409733d getaddrinfo 1491 7ff684097343-7ff684097355 1490->1491 1492 7ff6840974d4-7ff6840974e1 1490->1492 1493 7ff6840974b4-7ff6840974bd WSASetLastError 1491->1493 1494 7ff68409735b 1491->1494 1495 7ff6840974c3-7ff6840974d0 1493->1495 1496 7ff684097360-7ff684097366 1494->1496 1495->1492 1497 7ff684097368-7ff68409736b 1496->1497 1498 7ff68409736d-7ff684097370 1496->1498 1499 7ff684097379-7ff68409737d 1497->1499 1500 7ff684097421-7ff684097428 1498->1500 1501 7ff684097376 1498->1501 1499->1500 1503 7ff684097383-7ff68409738a 1499->1503 1500->1496 1502 7ff68409742e 1500->1502 1501->1499 1504 7ff684097462-7ff68409746f 1502->1504 1503->1500 1505 7ff684097390-7ff684097393 1503->1505 1506 7ff684097471 freeaddrinfo 1504->1506 1507 7ff684097477-7ff68409747a 1504->1507 1505->1500 1508 7ff684097399-7ff6840973aa malloc 1505->1508 1506->1507 1511 7ff6840974af-7ff6840974b2 1507->1511 1512 7ff68409747c-7ff68409747f 1507->1512 1509 7ff6840973b0-7ff6840973e5 malloc 1508->1509 1510 7ff68409745c 1508->1510 1513 7ff6840973e7-7ff6840973fd memcpy 1509->1513 1514 7ff68409744b-7ff68409745a free 1509->1514 1510->1504 1511->1493 1511->1495 1515 7ff684097481-7ff6840974a8 free * 3 1512->1515 1516 7ff6840974aa-7ff6840974ad 1512->1516 1517 7ff68409740e-7ff684097418 1513->1517 1518 7ff6840973ff-7ff68409740c _strdup 1513->1518 1514->1504 1515->1515 1515->1516 1516->1495 1520 7ff68409741e 1517->1520 1521 7ff68409741a 1517->1521 1518->1517 1519 7ff684097430-7ff684097449 free * 2 1518->1519 1519->1504 1520->1500 1521->1520
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                  • String ID:
                                  • API String ID: 2364279375-0
                                  • Opcode ID: 4c0d338e737eabbfbdf1e00b85082de4d90f558375e7ccd08fe8b57eaa60ce03
                                  • Instruction ID: 70c3fc268b4ad8c8f42096a90c22da3fb2f990e7117cf1e7fa4265cd92b72879
                                  • Opcode Fuzzy Hash: 4c0d338e737eabbfbdf1e00b85082de4d90f558375e7ccd08fe8b57eaa60ce03
                                  • Instruction Fuzzy Hash: F3515E36A09B52C2EB69DF51A58453A7BA0FF48B90F044039DE8E87B52DF3DE455C700

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1522 7ff684084010-7ff68408402e call 7ff684084ff0 1525 7ff684084037 call 7ff6840acf70 1522->1525 1526 7ff684084030-7ff684084035 call 7ff6840acfb0 1522->1526 1530 7ff68408403c-7ff68408405d 1525->1530 1526->1530 1531 7ff6840842eb 1530->1531 1532 7ff684084063-7ff68408406b 1530->1532 1533 7ff6840842f0-7ff68408430c 1531->1533 1534 7ff68408406d-7ff684084081 call 7ff6840acbe0 1532->1534 1535 7ff6840840c9-7ff6840840d1 1532->1535 1534->1535 1542 7ff684084083-7ff684084089 1534->1542 1537 7ff684084188-7ff6840841a0 call 7ff6840ad0f0 1535->1537 1538 7ff6840840d7-7ff684084111 call 7ff6840ad710 1535->1538 1548 7ff684084113-7ff684084116 1537->1548 1549 7ff6840841a6-7ff6840841be 1537->1549 1547 7ff68408414a-7ff68408415e call 7ff6840ad0f0 1538->1547 1538->1548 1545 7ff68408408b-7ff684084092 free 1542->1545 1546 7ff684084098-7ff6840840b5 call 7ff684073c00 1542->1546 1545->1546 1546->1531 1565 7ff6840840bb-7ff6840840c2 1546->1565 1547->1548 1566 7ff684084160-7ff684084166 1547->1566 1552 7ff684084118-7ff68408411b 1548->1552 1553 7ff68408413e 1548->1553 1554 7ff6840841dc-7ff6840841f3 call 7ff684085340 1549->1554 1555 7ff6840841c0-7ff6840841cd call 7ff684088630 1549->1555 1560 7ff68408411d 1552->1560 1561 7ff684084132-7ff684084139 1552->1561 1556 7ff684084143-7ff684084145 1553->1556 1554->1533 1570 7ff6840841f8-7ff684084201 1555->1570 1571 7ff6840841cf-7ff6840841da 1555->1571 1556->1533 1567 7ff684084120 1560->1567 1561->1533 1565->1535 1572 7ff684084168-7ff68408416f free 1566->1572 1573 7ff684084175-7ff684084181 1566->1573 1568 7ff684084126-7ff68408412d 1567->1568 1569 7ff684084354-7ff68408435b 1567->1569 1568->1533 1569->1533 1570->1554 1574 7ff684084203-7ff68408420a 1570->1574 1571->1554 1571->1555 1572->1573 1573->1537 1575 7ff68408420c-7ff684084212 1574->1575 1576 7ff684084214-7ff68408423f call 7ff6840ad0f0 1574->1576 1575->1554 1575->1576 1579 7ff68408430d-7ff684084310 1576->1579 1580 7ff684084245-7ff68408425c _strdup 1576->1580 1581 7ff684084269-7ff684084289 call 7ff6840ad0f0 1579->1581 1582 7ff684084316-7ff684084319 1579->1582 1580->1531 1583 7ff684084262 1580->1583 1588 7ff684084330-7ff684084333 1581->1588 1589 7ff68408428f-7ff6840842a6 _strdup 1581->1589 1582->1553 1584 7ff68408431f-7ff684084322 1582->1584 1583->1581 1584->1561 1586 7ff684084328-7ff68408432b 1584->1586 1586->1567 1591 7ff684084339-7ff68408433c 1588->1591 1592 7ff6840842af-7ff6840842cc call 7ff6840ad0f0 1588->1592 1589->1531 1590 7ff6840842a8 1589->1590 1590->1592 1591->1553 1594 7ff684084342-7ff684084345 1591->1594 1597 7ff68408435d-7ff684084360 1592->1597 1598 7ff6840842d2-7ff6840842e9 _strdup 1592->1598 1594->1561 1596 7ff68408434b-7ff68408434e 1594->1596 1596->1556 1596->1569 1597->1591 1599 7ff684084362-7ff684084373 call 7ff6840ad0f0 1597->1599 1598->1531 1598->1599 1601 7ff684084378-7ff68408437a 1599->1601 1602 7ff68408437c-7ff684084391 call 7ff684088630 1601->1602 1603 7ff684084397-7ff6840843af call 7ff6840ad0f0 1601->1603 1602->1531 1602->1603 1608 7ff6840843d8-7ff6840843f3 call 7ff6840ad0f0 1603->1608 1609 7ff6840843b1-7ff6840843b4 1603->1609 1614 7ff6840843f5-7ff68408440a call 7ff684088630 1608->1614 1615 7ff684084411-7ff684084434 strtoul call 7ff684073a10 1608->1615 1609->1553 1611 7ff6840843ba-7ff6840843bd 1609->1611 1611->1561 1613 7ff6840843c3-7ff6840843c6 1611->1613 1613->1556 1616 7ff6840843cc-7ff6840843d3 1613->1616 1621 7ff68408440c 1614->1621 1622 7ff68408443a-7ff68408445a call 7ff6840ad0f0 1614->1622 1615->1622 1616->1533 1621->1531 1625 7ff68408448d-7ff6840844ab _strdup 1622->1625 1626 7ff68408445c-7ff68408445f 1622->1626 1625->1531 1627 7ff6840844b1-7ff6840844c0 1625->1627 1626->1625 1628 7ff684084461-7ff68408446b 1626->1628 1629 7ff6840844c8-7ff6840844ca 1627->1629 1630 7ff6840844c2 1627->1630 1631 7ff684084472-7ff68408447b 1628->1631 1629->1533 1630->1629 1631->1631 1632 7ff68408447d-7ff684084488 call 7ff6840850c0 1631->1632 1632->1625
                                  APIs
                                    • Part of subcall function 00007FF684084FF0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF684085004
                                    • Part of subcall function 00007FF684084FF0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF68408501A
                                    • Part of subcall function 00007FF684084FF0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF68408502E
                                    • Part of subcall function 00007FF684084FF0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF684085042
                                    • Part of subcall function 00007FF684084FF0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF684085056
                                    • Part of subcall function 00007FF684084FF0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF68408506A
                                    • Part of subcall function 00007FF684084FF0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF68408507E
                                    • Part of subcall function 00007FF684084FF0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF684085092
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF684084092
                                    • Part of subcall function 00007FF6840ACFB0: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840ACFC5
                                    • Part of subcall function 00007FF6840ACFB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840ACFDF
                                    • Part of subcall function 00007FF6840ACFB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840ACFFA
                                    • Part of subcall function 00007FF6840ACFB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD016
                                    • Part of subcall function 00007FF6840ACFB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD032
                                    • Part of subcall function 00007FF6840ACFB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD04A
                                    • Part of subcall function 00007FF6840ACFB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD062
                                    • Part of subcall function 00007FF6840ACFB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD07A
                                    • Part of subcall function 00007FF6840ACFB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD092
                                    • Part of subcall function 00007FF6840ACFB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD0AA
                                    • Part of subcall function 00007FF6840ACFB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD0C4
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF684084296
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6840842D9
                                  • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF68408441E
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF68408449B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdup$free$callocstrtoul
                                  • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$file
                                  • API String ID: 954404409-4150109901
                                  • Opcode ID: 100f3c4fd2e1d3918be066d528445cf2158213401efdaa9a14cd4f096b4fd8e5
                                  • Instruction ID: 074447c2d446b20dd4fb54495a1478aa260c36906da289e37e982c80b364f0fa
                                  • Opcode Fuzzy Hash: 100f3c4fd2e1d3918be066d528445cf2158213401efdaa9a14cd4f096b4fd8e5
                                  • Instruction Fuzzy Hash: 83C16C32A48A82D6EB688B25DE903BA6791FF94784F444139CB1DCB785EF3CE565C300

                                  Control-flow Graph

                                  Strings
                                  • ________ _______ __ ______ ______ _______ ________ _______ | \| \ | \ / \ / \ | \ | \| \ \$$$$$$$$| $$$$$$$\ | $$ | $$$$$$\| $$$$$$\| $$$$$$$\| $$$$$$$$| $$$$$$$, xrefs: 00007FF684045DAE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ________ _______ __ ______ ______ _______ ________ _______ | \| \ | \ / \ / \ | \ | \| \ \$$$$$$$$| $$$$$$$\ | $$ | $$$$$$\| $$$$$$\| $$$$$$$\| $$$$$$$$| $$$$$$$
                                  • API String ID: 0-363974284
                                  • Opcode ID: c6af9f65efbcbdd9046d5c8ecb3d4f9eedcf72c854c275ead3d2032e9c6cdf00
                                  • Instruction ID: 6a5daab61a6f923953e1c6580a4d5bb2362c1f493820757274c8306ec18fe8e4
                                  • Opcode Fuzzy Hash: c6af9f65efbcbdd9046d5c8ecb3d4f9eedcf72c854c275ead3d2032e9c6cdf00
                                  • Instruction Fuzzy Hash: BF918F72D08B82C6E714DF24E8C43AA73A1FF55B88F04523EDA8D86A65DF7CA594C350
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLastSleep
                                  • String ID:
                                  • API String ID: 1458359878-0
                                  • Opcode ID: 5707ff227d0ba686ce5bf451b6ff2de7c6055376ea5a1a6d48b776198613a107
                                  • Instruction ID: 2fc47f2ec1e7a983848a52a5956531d0ee815bf18b9bbc7292f6825d3bcdc3fc
                                  • Opcode Fuzzy Hash: 5707ff227d0ba686ce5bf451b6ff2de7c6055376ea5a1a6d48b776198613a107
                                  • Instruction Fuzzy Hash: 1B91D761B2C683CAEB754F29A9C02BB6695BF44754F54423CE91ACFBC4DE3EE941C600
                                  APIs
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406C366
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn
                                  • String ID: "f$3f$Gf$Xf$lf
                                  • API String ID: 3668304517-1330087887
                                  • Opcode ID: e772a807277df711840948acb67e7543dcc21d5ca79b66999cf59648655c46b1
                                  • Instruction ID: 8ea37e42e04bbbb16054bc24b348178c8fa8420d974a67ea4aca332bf6b0994b
                                  • Opcode Fuzzy Hash: e772a807277df711840948acb67e7543dcc21d5ca79b66999cf59648655c46b1
                                  • Instruction Fuzzy Hash: ABA1CF62A08782C5EB00DB69E8843AE6761FF457A4F50423ADB6E56BDADF3CD0C5C341
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                  • API String ID: 600764987-1052566392
                                  • Opcode ID: 3370f0d4d2aa7507bbf2db9ebb513db5b64c8997b1dc538bf6bdab698d7d976f
                                  • Instruction ID: e69d337846f1e9023958615416a1243e26f78fc04ef93ccf4f37f636942f328a
                                  • Opcode Fuzzy Hash: 3370f0d4d2aa7507bbf2db9ebb513db5b64c8997b1dc538bf6bdab698d7d976f
                                  • Instruction Fuzzy Hash: E8313E76A0D7C2CAE6619B60E4943AB77A4FF84740F44053EDA8E82B99DF3CD544CB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                  • API String ID: 600764987-2710416593
                                  • Opcode ID: fdf2a7e96fe9982a924517a32f04445637de385a56ddbb0b086fc07af5bae323
                                  • Instruction ID: 186e95c9286bc7036e78b38c2b812b77bf7e58177ca1eee085f0a103ceb3056d
                                  • Opcode Fuzzy Hash: fdf2a7e96fe9982a924517a32f04445637de385a56ddbb0b086fc07af5bae323
                                  • Instruction Fuzzy Hash: BA313E36A0D7C2CAE6218B60E4943AB77A4FF84740F44053EDA8E82B99DF3CD584CB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                  • API String ID: 600764987-2628789574
                                  • Opcode ID: adaaf1e2e917a60331103416d7b1b1a0f5f0c00817c7466b612fe27ebdf9ca72
                                  • Instruction ID: c8934769515501027e0e226b241f78261ced5f5e3fc5a1509ae5ab899816cebc
                                  • Opcode Fuzzy Hash: adaaf1e2e917a60331103416d7b1b1a0f5f0c00817c7466b612fe27ebdf9ca72
                                  • Instruction Fuzzy Hash: 86313E36A0D7C2CAE6218B60E4943AB77A4FF84740F44053EDA8E82B99DF3CD584CB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                  • API String ID: 600764987-1502336670
                                  • Opcode ID: bcc970f06c1e5854a26d56e62276d014750dd97ff621c98faa850ec1adab4922
                                  • Instruction ID: 2a59777ee5e987fd7c73190a6b4745dd2294b214fa9c21b77e00cd7502503b42
                                  • Opcode Fuzzy Hash: bcc970f06c1e5854a26d56e62276d014750dd97ff621c98faa850ec1adab4922
                                  • Instruction Fuzzy Hash: 3B313E36A0D7C2CAE6619B60E4943AB77A4FF84740F44053EDA8E82B99DF3CD544CB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                  • API String ID: 600764987-1965992168
                                  • Opcode ID: aad53823e7f30aadb28a5ae8172fa135b3776d7c34a0be0e63836c14a854af14
                                  • Instruction ID: 82d2d7bf300a4eabd5d4cccaa66c83811e55fe25cd1dd64e8fb64fd7899c64aa
                                  • Opcode Fuzzy Hash: aad53823e7f30aadb28a5ae8172fa135b3776d7c34a0be0e63836c14a854af14
                                  • Instruction Fuzzy Hash: FA313E36A0D7C2CAE6619B60E4943AB77A4FF84740F44053EDA8E82B99DF3CD544CB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                  • API String ID: 600764987-1381340633
                                  • Opcode ID: ea841899545fd399affa9744b456ea3ea6401d1ea7e0514409a0120b405773f9
                                  • Instruction ID: 8d6234f4a0d3c266d9da77d1d1e2eb1b97495783f0978399503fdc16ce8eab95
                                  • Opcode Fuzzy Hash: ea841899545fd399affa9744b456ea3ea6401d1ea7e0514409a0120b405773f9
                                  • Instruction Fuzzy Hash: 2F313E36A0D7C2CAE6619B60E4943AB77A4FF84744F44053EDA8E82B99DF3CD544CB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                  • API String ID: 600764987-3862749013
                                  • Opcode ID: b56d452be06ee6577a23897c46b1b289600fa5d97eae2bb0e1e331187146d3fb
                                  • Instruction ID: 03ec289bb54611fdb5c102a1594673221858c0cdad97876527986e1787af72a9
                                  • Opcode Fuzzy Hash: b56d452be06ee6577a23897c46b1b289600fa5d97eae2bb0e1e331187146d3fb
                                  • Instruction Fuzzy Hash: D5312D36A0D7C2CAE6618B60E4943AB77A4FF84740F44053EDA8E82B99DF3CD584CB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                  • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                  • API String ID: 600764987-618797061
                                  • Opcode ID: dad13251e7271c0b690dfec7e36e94e1a569d7a8e4281699bef87c039d49dcf9
                                  • Instruction ID: 84c553ed1286d268a1a37dee8e4dfedd5bfdb153a8e3087688c5aa6f7d62c175
                                  • Opcode Fuzzy Hash: dad13251e7271c0b690dfec7e36e94e1a569d7a8e4281699bef87c039d49dcf9
                                  • Instruction Fuzzy Hash: 54311E36A0D7C2CAEA619B60E4953AB77A4FF84744F44053EDA8E82B99DF3CD544CB10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: calloc
                                  • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                  • API String ID: 2635317215-3812100122
                                  • Opcode ID: 57bbac0c6cdc04f49a14c89a6e5ed5c9ffe6c9106794b897048839a28dc347b0
                                  • Instruction ID: 37e4af8e161256294c1f8013ea252180d5a954d3828b34ffb3909db7f0b8bed9
                                  • Opcode Fuzzy Hash: 57bbac0c6cdc04f49a14c89a6e5ed5c9ffe6c9106794b897048839a28dc347b0
                                  • Instruction Fuzzy Hash: 29519122B4CB82C2F6598B259AD077A6790FF84790F14013ADB4D8B7A5EF3DE4A5D700
                                  APIs
                                  • memcpy.VCRUNTIME140 ref: 00007FF6840658C3
                                  • system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406593A
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065974
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840659CA
                                    • Part of subcall function 00007FF68404CE90: memcpy.VCRUNTIME140(?,?,?,?,?,?,00007FF68404ACF8), ref: 00007FF68404CF84
                                    • Part of subcall function 00007FF68404CE90: memcpy.VCRUNTIME140(?,?,?,?,?,?,00007FF68404ACF8), ref: 00007FF68404CF92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$_invalid_parameter_noinfo_noreturn$system
                                  • String ID: && timeout /t 5"$-$start cmd /C "color b && title Error && echo
                                  • API String ID: 4251911053-1881710036
                                  • Opcode ID: 0c1dc7aeaa2a15005bb3a36e6ba6defe4403b8f68c6e361f7196a29bccfd88b2
                                  • Instruction ID: 394925154bd006241203efd20df545e36289965cc20d64a9fd7d5a0b3dbd2b40
                                  • Opcode Fuzzy Hash: 0c1dc7aeaa2a15005bb3a36e6ba6defe4403b8f68c6e361f7196a29bccfd88b2
                                  • Instruction Fuzzy Hash: 80519072A18B85C1EB10CB29E49436EA361FF85794F504239E79D82AE6DF7CE0C4C740
                                  APIs
                                    • Part of subcall function 00007FF684097310: getaddrinfo.WS2_32 ref: 00007FF684097332
                                    • Part of subcall function 00007FF684097310: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68407AC75), ref: 00007FF68409739E
                                    • Part of subcall function 00007FF684097310: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68407AC75), ref: 00007FF6840973D8
                                    • Part of subcall function 00007FF684097310: memcpy.VCRUNTIME140(?,?,?,00007FF68407AC75), ref: 00007FF6840973F1
                                    • Part of subcall function 00007FF684097310: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF68407AC75), ref: 00007FF6840973FF
                                    • Part of subcall function 00007FF684097310: freeaddrinfo.WS2_32(?,?,?,00007FF68407AC75), ref: 00007FF684097471
                                    • Part of subcall function 00007FF684097310: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68407AC75), ref: 00007FF684097485
                                    • Part of subcall function 00007FF684097310: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68407AC75), ref: 00007FF68409748F
                                    • Part of subcall function 00007FF684097310: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68407AC75), ref: 00007FF68409749C
                                  • WSAGetLastError.WS2_32 ref: 00007FF68407AC7B
                                  • WSAGetLastError.WS2_32 ref: 00007FF68407AC85
                                  • EnterCriticalSection.KERNEL32 ref: 00007FF68407ACA0
                                  • LeaveCriticalSection.KERNEL32 ref: 00007FF68407ACAF
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407ACC0
                                  • send.WS2_32 ref: 00007FF68407ACE3
                                  • WSAGetLastError.WS2_32 ref: 00007FF68407ACED
                                  • LeaveCriticalSection.KERNEL32 ref: 00007FF68407AD00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                  • String ID:
                                  • API String ID: 506363382-0
                                  • Opcode ID: fac5d855f5964205bcd62018e38e7505b9699b67dd3652cc28a4f65745554e67
                                  • Instruction ID: 6116c330f398a18bcbe96b751092e10e2fb138429f1d41b3b020cd9506fd745d
                                  • Opcode Fuzzy Hash: fac5d855f5964205bcd62018e38e7505b9699b67dd3652cc28a4f65745554e67
                                  • Instruction Fuzzy Hash: 46317232A0C642C6E7509F25E49026B37A0FF84BA8F444139DA4EC36A4DF7DE489CB51
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLastSleep
                                  • String ID:
                                  • API String ID: 1458359878-0
                                  • Opcode ID: d328db1f90c702946bb9f83a192993af17f25e3170299cbf6ea3d2290ea0bab3
                                  • Instruction ID: ea13d6cad4a117d43b0c3bdfbe764b3949d948e6d825837089fdfddcced38904
                                  • Opcode Fuzzy Hash: d328db1f90c702946bb9f83a192993af17f25e3170299cbf6ea3d2290ea0bab3
                                  • Instruction Fuzzy Hash: 07A1C921A2D692C6EB694F1598803BB6695FF44B54F14523CEA6ECABC4DF3ED501C340
                                  APIs
                                  • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,00000000,00000000,00000000,00007FF684045DC1), ref: 00007FF68404BA73
                                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,00000000,00000000,00007FF684045DC1), ref: 00007FF68404BAC7
                                  • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,00000000,00000000,00000000,00007FF684045DC1), ref: 00007FF68404BAEE
                                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,00000000,00000000,00007FF684045DC1), ref: 00007FF68404BB16
                                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,00000000,00000000,00000000,00007FF684045DC1), ref: 00007FF68404BB5C
                                  • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,00000000,00000000,00000000,00007FF684045DC1), ref: 00007FF68404BB63
                                  • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,00000000,00000000,00000000,00007FF684045DC1), ref: 00007FF68404BB70
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                                  • String ID:
                                  • API String ID: 1492985063-0
                                  • Opcode ID: 5d7e731beace90e67b133e7d81531060f97b1cccd70cb41218fc4173e7c6edea
                                  • Instruction ID: 29478dd571cd4200a93f040586ccfb86b88894809ee52684239d9dba3e090950
                                  • Opcode Fuzzy Hash: 5d7e731beace90e67b133e7d81531060f97b1cccd70cb41218fc4173e7c6edea
                                  • Instruction Fuzzy Hash: 36514C22609A41C2EA208B19E5D423AA7B0FFA5FD9F158539CA5EC3BE0CF7DD556C340
                                  APIs
                                  Strings
                                  • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00007FF684059405
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$ConsoleSleepTitlememcpyrand
                                  • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                  • API String ID: 1902447314-3592501980
                                  • Opcode ID: f94dadda6200bf8aa22c542acff864b2a3a6dda198d742b9247588f32b1c59e7
                                  • Instruction ID: ada5adec05ee9c403430793a7702543583ca6c7fa0a80d9acbfc4be40978aeae
                                  • Opcode Fuzzy Hash: f94dadda6200bf8aa22c542acff864b2a3a6dda198d742b9247588f32b1c59e7
                                  • Instruction Fuzzy Hash: 6A417C62F18B91C9FB10DBA5D8802AD3B71FF44BA8F55423ADE5D66A98DF789481C300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID: %s$Connection #%ld to host %s left intact
                                  • API String ID: 1294909896-118628944
                                  • Opcode ID: 39fe0149f91f9d1f50903ec7d216a81b5543df6614f9a4ebef1af22a131fd602
                                  • Instruction ID: 8d5de0e9ec83c1a65daf264095833f649142d1cd124606266d948342da901864
                                  • Opcode Fuzzy Hash: 39fe0149f91f9d1f50903ec7d216a81b5543df6614f9a4ebef1af22a131fd602
                                  • Instruction Fuzzy Hash: 2A914032F0C692D2EB589B2599903BB63A4FF84B94F044939DE4E8B695CF3DE460C741
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF684080C3B
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF684080C51
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080A6D
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080A8A
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080A9E
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080ABA
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080AD7
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080AFA
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080B0E
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080B22
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080B48
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080B5C
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080B70
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080BBF
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080BCC
                                    • Part of subcall function 00007FF6840809F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080BF5
                                  • memset.VCRUNTIME140 ref: 00007FF684080C85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$memset
                                  • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                  • API String ID: 2717317152-3248832348
                                  • Opcode ID: 6774b005abd0c4f633f8e67e6caea4d51e92550bbca8448eb4d1f1d044ba83b3
                                  • Instruction ID: c042352ff3ff9cf5496a66515d7a4c7b7959f015d9d595ac3745a11109cadf78
                                  • Opcode Fuzzy Hash: 6774b005abd0c4f633f8e67e6caea4d51e92550bbca8448eb4d1f1d044ba83b3
                                  • Instruction Fuzzy Hash: 83716B22A4CBC2C1E751CF25D9902BF2760FF85B94F194139DA9D8B296EF39E491C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLastmallocrecvsend
                                  • String ID: Send failure: %s
                                  • API String ID: 25851408-857917747
                                  • Opcode ID: 2aa8b678249f593e6c185d5ce1b31a4a4e2c964bbe74dd8f369a2ebdf7081e2e
                                  • Instruction ID: 64e4caea033a1258d4b52ed57494afcc5674e9372dc1d75e5b5a6eb8457b1f6e
                                  • Opcode Fuzzy Hash: 2aa8b678249f593e6c185d5ce1b31a4a4e2c964bbe74dd8f369a2ebdf7081e2e
                                  • Instruction Fuzzy Hash: 47417C32B09B81C5EB659F25E99077AA6A0BF48BA8F444239CEAD87794DE3CD454C700
                                  APIs
                                    • Part of subcall function 00007FF684087F90: GetModuleHandleA.KERNEL32(00000000,?,?,00007FF6840B0DEA,?,?,?,?,00007FF68408831B), ref: 00007FF684087FA4
                                  • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF68408831B), ref: 00007FF6840B0E00
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressCallerHandleModuleProc
                                  • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                  • API String ID: 2084706301-3788156360
                                  • Opcode ID: 00ac4551e4000e83dac8a08b12ed75b8677ed39992c15d302a4d884f5b2666ef
                                  • Instruction ID: 005a33ab8edc5b9b69bd7ad3c6dab3405cf556f2644539abf0978599040c17e7
                                  • Opcode Fuzzy Hash: 00ac4551e4000e83dac8a08b12ed75b8677ed39992c15d302a4d884f5b2666ef
                                  • Instruction Fuzzy Hash: C5F0CF60E0AB03C0EE599B16ADD177222A1BF94789F98483CC41C96292FE3CE5A9C750
                                  APIs
                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF684090010
                                    • Part of subcall function 00007FF6840905A0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840905FA
                                    • Part of subcall function 00007FF684090350: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840903E8
                                    • Part of subcall function 00007FF684090350: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840903F1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$calloc
                                  • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                  • API String ID: 3095843317-1242256665
                                  • Opcode ID: b3b0a9be8fe6ada87d4feccaea3f7c5bd9563551ce0aa026ee54c6bd36ba8a48
                                  • Instruction ID: 34d742a6a3084a45119b88b69920c6061b6df29e8248292178c9f319b7afd054
                                  • Opcode Fuzzy Hash: b3b0a9be8fe6ada87d4feccaea3f7c5bd9563551ce0aa026ee54c6bd36ba8a48
                                  • Instruction Fuzzy Hash: 30415731A0C682D6EB50DB25E4803BB6BA1BF85744F18403ADA4DC7687EE3ED545C701
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: closesocket$calloc
                                  • String ID:
                                  • API String ID: 2958813939-0
                                  • Opcode ID: 8825456cdb7d912e159980e5f21c913117ff77a2f7f3452ced2f045055737288
                                  • Instruction ID: 44be46b1ba8c4eabe344b246cc823f15741d50835f2e9599788561137ddec370
                                  • Opcode Fuzzy Hash: 8825456cdb7d912e159980e5f21c913117ff77a2f7f3452ced2f045055737288
                                  • Instruction Fuzzy Hash: 27413D35A0CA42C1E740EF34E8802EA6361FF88768F884639DE5D8A6DAEF39D545C311
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: freerecv
                                  • String ID:
                                  • API String ID: 2032557106-0
                                  • Opcode ID: ee791b666369b3eb844aaa81bf8ecea06778c19a65393f0493bd20319140323d
                                  • Instruction ID: a2d9995cde4c61aa394507cd6992548e4fa477bee87ffb12eee29f0675be5637
                                  • Opcode Fuzzy Hash: ee791b666369b3eb844aaa81bf8ecea06778c19a65393f0493bd20319140323d
                                  • Instruction Fuzzy Hash: 88C1C62261D682C6E7658B2590803FBA6F0FF447A4F544239DE9E87BC5EE3EE941C701
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                  • API String ID: 1294909896-3248832348
                                  • Opcode ID: a93d15b710349f08d7b10515c0cb6859e7c076c98dddf9324f7f50b95f873d92
                                  • Instruction ID: 07dc689182d4b4bc13ba7332d440cdd8916aa31e39095be372ad8d46234778c7
                                  • Opcode Fuzzy Hash: a93d15b710349f08d7b10515c0cb6859e7c076c98dddf9324f7f50b95f873d92
                                  • Instruction Fuzzy Hash: 81515E62A18AC1C1E7518F29D5843AE67A0FF84B98F084239DE9C8B39ADF7DD491C710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLastrecv
                                  • String ID:
                                  • API String ID: 2514157807-0
                                  • Opcode ID: 0e05c7e473d21cdd1a7aa207f52f42c28ceb2d2dcb04e883cf6aa634ca7013be
                                  • Instruction ID: e888a6734666242e2ee2c9eefe3407b2596d1ff48a7448d7ea5cdce877907e85
                                  • Opcode Fuzzy Hash: 0e05c7e473d21cdd1a7aa207f52f42c28ceb2d2dcb04e883cf6aa634ca7013be
                                  • Instruction Fuzzy Hash: 0BE01A21F05905C2EF295771A8A577A2194DF54731F845738CA3A866D0DE6C44D68710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: closesocket
                                  • String ID:
                                  • API String ID: 2781271927-0
                                  • Opcode ID: c87ed09db03c22d762ff2485e2d2817bff021edca5fa596c5bb8c8089d942758
                                  • Instruction ID: 3e3c2ca41171270b3a5cbbf3f390ee208470e4346bc91d21a8453ae85a90c44a
                                  • Opcode Fuzzy Hash: c87ed09db03c22d762ff2485e2d2817bff021edca5fa596c5bb8c8089d942758
                                  • Instruction Fuzzy Hash: 2401B912B19541C1EB54DB3AD5D83BEA3A0FF88B84F889035DB4D87697DF29D455C301
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: socket
                                  • String ID:
                                  • API String ID: 98920635-0
                                  • Opcode ID: 39661acd4fbd1b204517babd56c72a8b76ae6c988ee4938594f2527c8951f682
                                  • Instruction ID: b66940ad70bec619f052a8ea33f36e0d15b93b7fb2c6fb6e851ec41cdc9e2564
                                  • Opcode Fuzzy Hash: 39661acd4fbd1b204517babd56c72a8b76ae6c988ee4938594f2527c8951f682
                                  • Instruction Fuzzy Hash: 5BE09236E06601C2DE18A72588D16BA3360BF94B34FC44779CA3D463D1CE2C925BEB00
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _beginthreadex
                                  • String ID:
                                  • API String ID: 3014514943-0
                                  • Opcode ID: 9175d838666ea8fda9a4c0d1dfd6d6478aba79b5e56d67f217baf21c8ade24f8
                                  • Instruction ID: 2a6aae5e7265ea23a44852a045f29ff49ca65cd5c21bd3186db751cae42e6bdf
                                  • Opcode Fuzzy Hash: 9175d838666ea8fda9a4c0d1dfd6d6478aba79b5e56d67f217baf21c8ade24f8
                                  • Instruction Fuzzy Hash: 8FD0C263B18A00839B209F62A840029E251BB887B0B48433CAE7D82BE0DF3CD1418600
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Cnd_do_broadcast_at_thread_exit
                                  • String ID:
                                  • API String ID: 2632783013-0
                                  • Opcode ID: 5b3921d6c1eb65cbf832431e3fd926aac6940574de6022ae18550d2d19124705
                                  • Instruction ID: 0a93a70971dd595a799f4645cdb8f4e1aaa6220a242cb96d87f8c729e3431f5c
                                  • Opcode Fuzzy Hash: 5b3921d6c1eb65cbf832431e3fd926aac6940574de6022ae18550d2d19124705
                                  • Instruction Fuzzy Hash: B9C08C40F20202C2FB2437B2A8892AF0250AF49B11F189038C9068A781DD3D84EA8750
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ioctlsocket
                                  • String ID:
                                  • API String ID: 3577187118-0
                                  • Opcode ID: ea14aa148b4fa89a11177c6fcb620e784d9f3e146eb80bf2e5ef9c16bd4b40db
                                  • Instruction ID: ccc5184da33eb53d0e0cd6eb13f8f7c74c95613f5bb6ae05cd65896d2089767a
                                  • Opcode Fuzzy Hash: ea14aa148b4fa89a11177c6fcb620e784d9f3e146eb80bf2e5ef9c16bd4b40db
                                  • Instruction Fuzzy Hash: 16C08056F155C1C3D3446F6158C508767B1BFC4204F95543DD50781524DD3CC2A9CB44
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                  • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                  • API String ID: 3939785054-690044944
                                  • Opcode ID: 1782f86dc8c6b33f3977ef8ffc11a7e61ef3a2d6b817ff129818f8e222c8e449
                                  • Instruction ID: c8a30dd374e836bc1478b0077ca888621be5c5631cded5e3ab9c62425781ce3c
                                  • Opcode Fuzzy Hash: 1782f86dc8c6b33f3977ef8ffc11a7e61ef3a2d6b817ff129818f8e222c8e449
                                  • Instruction Fuzzy Hash: 29C28A72A08682C5FB609B2599843FA6B91FF41B89F48453DCE4D8B7DADE3EE445C310
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                                  • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                  • API String ID: 2059720140-3844637060
                                  • Opcode ID: e6739b7da320e9b38ba8d23b347ef48bec2e79d3882a771d1358fdf7c621a3b3
                                  • Instruction ID: 92f176b3c439c14702dd2e28234a510a528bca68c157b8235ad32aab55341024
                                  • Opcode Fuzzy Hash: e6739b7da320e9b38ba8d23b347ef48bec2e79d3882a771d1358fdf7c621a3b3
                                  • Instruction Fuzzy Hash: CF727C22A0C786C5FB618B25D4D43BB67B0FF55794F484139CA8E86696EF3DE484E302
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy$__std_fs_convert_narrow_to_wide$D@std@@@std@@U?$char_traits@$FileName__std_fs_code_page$??1?$basic_ios@??1?$basic_ostream@?setstate@?$basic_ios@ByteCharErrorFindLastModuleMultiPathWide_localtime64_time64mallocmemsetstrftime
                                  • String ID: @ $Data sent : $Response : $%M-%d-%Y$.txt$Sent to: $\Debug$\Debug\$\KeyAuth$create_directory$exists
                                  • API String ID: 74633477-3062033042
                                  • Opcode ID: 877af5aec50049eeb70dc1ccf71ca30e588d18c06adcb9891dca66d95e19e713
                                  • Instruction ID: cddb21d26f163235f0d2a1fb28287b362bb4f89268516ced6fe262c9bd8dbfc4
                                  • Opcode Fuzzy Hash: 877af5aec50049eeb70dc1ccf71ca30e588d18c06adcb9891dca66d95e19e713
                                  • Instruction Fuzzy Hash: 77F27F32A08B82C5EB20DF74D8803EE6361FF95398F50523ADA5D97A9ADF78D584C740
                                  APIs
                                    • Part of subcall function 00007FF6840BE310: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF68404C47E,?,?,?,?,00007FF68404119B), ref: 00007FF6840BE32A
                                  • ?_Xbad_function_call@std@@YAXXZ.MSVCP140 ref: 00007FF6840686A9
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684068877
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840688B6
                                    • Part of subcall function 00007FF684059F00: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684059FC7
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684068A8D
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684068AE8
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684068B2D
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684068B88
                                    • Part of subcall function 00007FF68404B560: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404B597
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$Xbad_function_call@std@@malloc
                                  • String ID: $Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: $You need to run the KeyAuthApp.init(); function before any other KeyAuth functions$Y$k$numOnlineUsers$numUsers$tdfree.json$V
                                  • API String ID: 2441929623-2822298944
                                  • Opcode ID: 692485d6d8ef30d4a1914b39f19517b8d55f6759fa7326ed9ca506e34564e983
                                  • Instruction ID: 072091c1afb50bc4db59435fb2a9eb7f9096228aa2e97d8a285068e7111ff020
                                  • Opcode Fuzzy Hash: 692485d6d8ef30d4a1914b39f19517b8d55f6759fa7326ed9ca506e34564e983
                                  • Instruction Fuzzy Hash: 09A2AD62A18BC6C9EB108F64D8843EE2761FF85798F50423ADB5D97A99EF7CD184C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                  • String ID: array$number overflow parsing '$object$object key$object separator
                                  • API String ID: 1346393832-85532522
                                  • Opcode ID: 599d52b84803c935deed4e87508098e1e8a9e13b433be7ecc4198a378c2fa7e6
                                  • Instruction ID: 1e8ee49b3e88f98499fade9571f726538a2d5ee8a1fd997f093e0f0aee1c9251
                                  • Opcode Fuzzy Hash: 599d52b84803c935deed4e87508098e1e8a9e13b433be7ecc4198a378c2fa7e6
                                  • Instruction Fuzzy Hash: E682A262E18B86C6FB00DB78D4813AE2321FF95794F504739DA9D92AD9EF6CE184C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: __std_exception_destroy$_invalid_parameter_noinfo_noreturn
                                  • String ID: array$number overflow parsing '$object$object key$object separator
                                  • API String ID: 2506729964-85532522
                                  • Opcode ID: 0269ff5fb413a29482157794e4cf9d6c8a34bc23199345e73271373cbf0ac447
                                  • Instruction ID: b0d936f38c08b78245c7ae09f54d6f4d8770a35f2f7895bf27c09e815f79850b
                                  • Opcode Fuzzy Hash: 0269ff5fb413a29482157794e4cf9d6c8a34bc23199345e73271373cbf0ac447
                                  • Instruction Fuzzy Hash: 2C82A462E18B86C5FB00DB68D4843BE6321FF85794F50573ADA9D92AD9EF6CE085C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$strchr$_strdupmemsetreallocstrncpy$EnvironmentVariabletolower
                                  • String ID: ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy$memory shortage$no_proxy
                                  • API String ID: 1339443121-1021110354
                                  • Opcode ID: 3aebd47a15dc7035c0c8c9ad58f4a333e2efa86d105fdb11264c6be866e695ff
                                  • Instruction ID: f2fd8d879d5aedf244fc5a2f218c60421abe84a3fd0ea9ef056a6185e9e4bd8f
                                  • Opcode Fuzzy Hash: 3aebd47a15dc7035c0c8c9ad58f4a333e2efa86d105fdb11264c6be866e695ff
                                  • Instruction Fuzzy Hash: F4029D22A4DBD2C5EB61CB15A9943AB6794BF99B98F08003EDE8D87795DF3DE044C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$malloc
                                  • String ID: WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$realm
                                  • API String ID: 2190258309-2223379150
                                  • Opcode ID: e2a2354df34a3398ec4278dfa31dbae660cd915aba464796a3358d3e217f7e02
                                  • Instruction ID: 88ff3d39dbae9a534d680e6722510244444c7a5219b5e8298c710b7c1f82f9bc
                                  • Opcode Fuzzy Hash: e2a2354df34a3398ec4278dfa31dbae660cd915aba464796a3358d3e217f7e02
                                  • Instruction Fuzzy Hash: 64124C32A08B96C6EB50CF61E8942AE37A4FF48B88F14413ADA4D97B95EF3CD555C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: strncmp$memset
                                  • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                                  • API String ID: 3268688168-2769131373
                                  • Opcode ID: c9b1b40dd1b8dcfc8ad69d0c6fbb7eaba0245a501e6d7e0ef8dcf8dd891aad0d
                                  • Instruction ID: faa8c817866be588cdee7b47d0847645961eb58e859d02d83e9b33722d44d329
                                  • Opcode Fuzzy Hash: c9b1b40dd1b8dcfc8ad69d0c6fbb7eaba0245a501e6d7e0ef8dcf8dd891aad0d
                                  • Instruction Fuzzy Hash: B0E19022E58692C6EB10CB25ED802BB6760FF95788F40513AEE4E87B5ADF7CD584C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Close$ErrorFileFindHandleLast$AttributesFirst__std_fs_open_handleabort
                                  • String ID:
                                  • API String ID: 4293554670-0
                                  • Opcode ID: fb0149a74117d966e3df4ed8251eb934c562f5356dafecc2b44ecf39f0adeba3
                                  • Instruction ID: d6356242cb1c775df60f6d442a7a4b3e5e14701574ee9e401b93e8d04c5713f4
                                  • Opcode Fuzzy Hash: fb0149a74117d966e3df4ed8251eb934c562f5356dafecc2b44ecf39f0adeba3
                                  • Instruction Fuzzy Hash: CE918231A08A42C6E7648B25A88467B63A1BF85BB4F14473CD96EC7BD4DF3CE845C784
                                  APIs
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840648B3
                                    • Part of subcall function 00007FF68404AC80: memcpy.VCRUNTIME140 ref: 00007FF68404ACC6
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840648F2
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684064AB6
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684064B05
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684064B54
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684064BA9
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684064BEB
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684064C43
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684064C82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy
                                  • String ID: Y
                                  • API String ID: 3063020102-3822988203
                                  • Opcode ID: f21732dcbf19ff454e483d2d4238f810cee44098eff1fbc2c792ac9e4ab5eddb
                                  • Instruction ID: 2344f040b17018a7b73dd806985aafc93b563fab7e36fed4edcf6455e193c1d3
                                  • Opcode Fuzzy Hash: f21732dcbf19ff454e483d2d4238f810cee44098eff1fbc2c792ac9e4ab5eddb
                                  • Instruction Fuzzy Hash: 0B62AF62E18BC6C4EB108B64D8843EE2761FF55798F405229DBAE5BADADF78D1C4C340
                                  APIs
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C3F8
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065C05
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065C45
                                    • Part of subcall function 00007FF68404CE90: memcpy.VCRUNTIME140(?,?,?,?,?,?,00007FF68404ACF8), ref: 00007FF68404CF84
                                    • Part of subcall function 00007FF68404CE90: memcpy.VCRUNTIME140(?,?,?,?,?,?,00007FF68404ACF8), ref: 00007FF68404CF92
                                  • memcpy.VCRUNTIME140 ref: 00007FF684065D34
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065E8A
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065ECA
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065F1B
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065F5A
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065FB5
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684066097
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840660D7
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840661BF
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840661FF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy
                                  • String ID: ; expected $; last read: '$syntax error $unexpected $while parsing
                                  • API String ID: 3063020102-4239264347
                                  • Opcode ID: 0f89221983c0a486a3ed7ae411119f5ad8967a90bcd0a2b22a9b01b6361e7aa0
                                  • Instruction ID: 023edd3251bfccd4965908b6b63219b0821974a7aa6a7386c68b96269a55b219
                                  • Opcode Fuzzy Hash: 0f89221983c0a486a3ed7ae411119f5ad8967a90bcd0a2b22a9b01b6361e7aa0
                                  • Instruction Fuzzy Hash: 9D22BF62E18B8585FB14CB68E4803AE6361FF957A4F504739DAAE53AD9DF7CE0C4C200
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$_strdup$fclosefgetsfopen
                                  • String ID: $default$login$machine$password
                                  • API String ID: 431015889-155862542
                                  • Opcode ID: 046b9b77b73f85b4edbfb93ce3b712a3bc2181a242e3f613419bf5963a754d6e
                                  • Instruction ID: e7d43d79ff68c546535c8b3771df48bd87690f7b3436b55b4ccebd0cc4a72c3a
                                  • Opcode Fuzzy Hash: 046b9b77b73f85b4edbfb93ce3b712a3bc2181a242e3f613419bf5963a754d6e
                                  • Instruction Fuzzy Hash: 3CA1AE22A0C682C6FB65DB21E9D477B66A0BF84784F08453DDE8E967A4EF3CE445C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$_dclass
                                  • String ID: array$number overflow parsing '
                                  • API String ID: 1391767211-1723591761
                                  • Opcode ID: 78fc587c4c22a830443fae00fbe920849ea048cf752043ddecf9422e9d6edd7c
                                  • Instruction ID: 2ff8f0c122a96c5cbafa11d6feef8b52538c4bcf4df2a02b40bea42cc203ad4c
                                  • Opcode Fuzzy Hash: 78fc587c4c22a830443fae00fbe920849ea048cf752043ddecf9422e9d6edd7c
                                  • Instruction Fuzzy Hash: 54E1A662E18B86C5FB009B78D4843BE2362FF857A4F50573ADA5D96AD9DF6CE084C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                  • String ID: array$number overflow parsing '
                                  • API String ID: 1346393832-1723591761
                                  • Opcode ID: 98ed254b04b90541bc701a8ddf6f2c472d2f71b191df90d8f3d1afd5f8f6e6a0
                                  • Instruction ID: b4087a309529ab9c5621d01c4381eb8313635d18e65783de6204957686908122
                                  • Opcode Fuzzy Hash: 98ed254b04b90541bc701a8ddf6f2c472d2f71b191df90d8f3d1afd5f8f6e6a0
                                  • Instruction Fuzzy Hash: 90E1B662E18B86C5FB00CB78D4853AE2321FF557A4F514739DAAD96BD9EF2CE081C240
                                  APIs
                                  • memset.VCRUNTIME140 ref: 00007FF684045413
                                  • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF684045434
                                  • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF684045450
                                  • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF684045481
                                  • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF68404549E
                                    • Part of subcall function 00007FF68404B180: ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z.MSVCP140 ref: 00007FF68404B1BA
                                    • Part of subcall function 00007FF68404B180: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF68404B1D7
                                    • Part of subcall function 00007FF68404B180: _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68404B200
                                    • Part of subcall function 00007FF68404B180: ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF68404B24B
                                    • Part of subcall function 00007FF68404B180: ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF68404B260
                                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6840454E8
                                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF684045546
                                  • __std_fs_code_page.MSVCPRT ref: 00007FF68404555D
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840455C0
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684045906
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404590D
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684045914
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404591B
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684045922
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: U?$char_traits@$D@std@@@std@@$_invalid_parameter_noinfo_noreturn$?setstate@?$basic_ios@Init@?$basic_streambuf@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@D@std@@@1@_Fiopen@std@@U_iobuf@@V?$basic_streambuf@Vlocale@2@__std_fs_code_page_get_stream_buffer_pointersmemset
                                  • String ID:
                                  • API String ID: 2101336812-0
                                  • Opcode ID: faf94fbdfb449ddda79333168d06dff32ce52791222c62b8753b6968723f27a6
                                  • Instruction ID: 4d2ec91bd82153722d5de8ad8db4fa3d1c8687d1bf30339f1e11a6c9406758ed
                                  • Opcode Fuzzy Hash: faf94fbdfb449ddda79333168d06dff32ce52791222c62b8753b6968723f27a6
                                  • Instruction Fuzzy Hash: B4226C62A08B81D5EB20DB25E4943AE7761FF55BC8F44803ADB8D87A99EF3CD584C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _errno$strtol
                                  • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                  • API String ID: 3596500743-988243589
                                  • Opcode ID: 72400ff02ed9287da14a9992ffc26fcc463c6bd8c44a9ec4a3cdfe68a5293e8a
                                  • Instruction ID: 9f66f5aa6fdecada90f3723a287959dcb697532cc1219caf806aa33dbedd5812
                                  • Opcode Fuzzy Hash: 72400ff02ed9287da14a9992ffc26fcc463c6bd8c44a9ec4a3cdfe68a5293e8a
                                  • Instruction Fuzzy Hash: A7F1B272F18612CAEB248B6894901BE3BA1BF44758F50463EDE1E97BD4DE3DA815C740
                                  APIs
                                    • Part of subcall function 00007FF6840599A0: memcmp.VCRUNTIME140(?,?,?,?,?,?,?,00000000,?,?,00000000,?,?,00007FF684069718), ref: 00007FF684059A6C
                                    • Part of subcall function 00007FF6840599A0: memcmp.VCRUNTIME140(?,?,?,?,?,?,?,00000000,?,?,00000000,?,?,00007FF684069718), ref: 00007FF684059AE3
                                    • Part of subcall function 00007FF6840599A0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,?), ref: 00007FF684059BC9
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684069C1E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturnmemcmp
                                  • String ID: createdate$expiry$hwid$lastlogin$none$subscription$subscriptions$username
                                  • API String ID: 2972922734-284943577
                                  • Opcode ID: 5c880aadb0b619f8d7de5b6c67153ca0cfa0b0a2073b7a5d697aff6e227cb252
                                  • Instruction ID: 3e025622d43b3220bd64731c9d7d5d0552f1a11fbd3ec8e29910bdc878e92bf7
                                  • Opcode Fuzzy Hash: 5c880aadb0b619f8d7de5b6c67153ca0cfa0b0a2073b7a5d697aff6e227cb252
                                  • Instruction Fuzzy Hash: F7E1AF62B08B86C5FB40DBA5D4942AE2761FF85B88F45903ADF0E97B95DE3CE584C340
                                  APIs
                                    • Part of subcall function 00007FF68406BD20: memcpy.VCRUNTIME140 ref: 00007FF68406BE84
                                  • memcpy.VCRUNTIME140 ref: 00007FF68406234B
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840624BD
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406250F
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684062560
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406259F
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840625F0
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406262F
                                    • Part of subcall function 00007FF684041ED0: __std_exception_copy.VCRUNTIME140 ref: 00007FF684041F0E
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840626AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                  • String ID: parse error
                                  • API String ID: 2484256320-316136553
                                  • Opcode ID: b87fcc5483710aa69e514534341ea000fb09fc27b96a39b1a25eb92b4de4e57d
                                  • Instruction ID: 778a0c3acd6d947ed84a5c6ecca58f1c5810ce9f31136da6c08b0359e3ceefb1
                                  • Opcode Fuzzy Hash: b87fcc5483710aa69e514534341ea000fb09fc27b96a39b1a25eb92b4de4e57d
                                  • Instruction Fuzzy Hash: F9D1A362E18B86C5EB00DB29D48436E6721FF957A4F509239EB9D42AE5EF7CE1C4C340
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Can not multiplex, even if we wanted to!$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to!$Found bundle for host %s: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found!$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                                  • API String ID: 0-2774518510
                                  • Opcode ID: c3e3296d5bbfdbcce363272e0e00416d1a965117e0dcfd801782f59e1a2384d6
                                  • Instruction ID: 5623f718eba5ce56206437ed50b81440dfe3b38ae1bfde04f7465b1a1a00fab5
                                  • Opcode Fuzzy Hash: c3e3296d5bbfdbcce363272e0e00416d1a965117e0dcfd801782f59e1a2384d6
                                  • Instruction Fuzzy Hash: CB42A462A4D7C6C5FBA98B258A903BB37A1FF41748F29503DDE9C87285EF2CA454C710
                                  APIs
                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF68409B038,?,?,?,?,?,?,00007FF6840B213E), ref: 00007FF68409B0B6
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000021C,-00000008,00000000,?,?,00007FF68409B038,?,?,?,?,?,?,00007FF6840B213E), ref: 00007FF68409B21D
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF68409B37C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdupfreemalloc
                                  • String ID: %c%c%c%c$%c%c%c=$%c%c==
                                  • API String ID: 3985033223-3943651191
                                  • Opcode ID: ce3e6775d5b30c4b997b990028edb384fe806bcb0970eaaeb858b6b548a362ba
                                  • Instruction ID: 18a7bdf2c6f98d6001ff734efd76b50e476b17bace079859639e128e85f47d4d
                                  • Opcode Fuzzy Hash: ce3e6775d5b30c4b997b990028edb384fe806bcb0970eaaeb858b6b548a362ba
                                  • Instruction Fuzzy Hash: 4091C032A08691C5E765CB25A4903BF6BA0FF95BA4F084239EAAD877D6DF3DD441C700
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                  • API String ID: 0-2102732564
                                  • Opcode ID: 479d00788da9091a300ff4074d7bc50adc260afac58e1194ab39cc53ea9b2d64
                                  • Instruction ID: 61f0b88141291cb69b0cc335c3e0a43059e305eebc68c4da43f796ab85b0a6dd
                                  • Opcode Fuzzy Hash: 479d00788da9091a300ff4074d7bc50adc260afac58e1194ab39cc53ea9b2d64
                                  • Instruction Fuzzy Hash: 44210441E2EA5AD3FE18CB95A4807F60220BFD5780EC4053AEC0E8B3E2DF7E6181D245
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Y$Y
                                  • API String ID: 0-3924652902
                                  • Opcode ID: 1e785dc04570bf0f524e7cc1988650e733e425a59f59484664bccae77547b54b
                                  • Instruction ID: 5459d6434773a03ecee6ccf170bcfc3b1039426330ed6a9c55bc25e8823b2da7
                                  • Opcode Fuzzy Hash: 1e785dc04570bf0f524e7cc1988650e733e425a59f59484664bccae77547b54b
                                  • Instruction Fuzzy Hash: EE92B022A08B81C5EB10CF35E4802AE7BB1FB55B88F54412ADF9E5B79ADF38D594C340
                                  APIs
                                  Strings
                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF6840BF3CB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                  • API String ID: 1848478996-631824599
                                  • Opcode ID: c4720ea0faff2c3ad2b7a4248604e79ae81bd3bbb61e77a98d3bd963d610a5f2
                                  • Instruction ID: 40cae120e47105e9ab94211e6ed5cb4dee496ee01d1571cab9cf10ee66fd6b99
                                  • Opcode Fuzzy Hash: c4720ea0faff2c3ad2b7a4248604e79ae81bd3bbb61e77a98d3bd963d610a5f2
                                  • Instruction Fuzzy Hash: 3E113632A14B82E6E7449B22EA843BA32A4FF44745F504139CA4DC3A90EF7CE4B8C754
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                  • API String ID: 0-1379995092
                                  • Opcode ID: d742af27ee736937a59f9f7f0b8d35486ea45dd9e285fd028551c43c1d8f324f
                                  • Instruction ID: 9ad3f2d459438b6d395ced17ce6ccca1fe8e9bd539beccbed10cac16c4dfc53b
                                  • Opcode Fuzzy Hash: d742af27ee736937a59f9f7f0b8d35486ea45dd9e285fd028551c43c1d8f324f
                                  • Instruction Fuzzy Hash: 6F421632A1C982C5E7648B5894C47BBA7B1FF41794F504238DE9E8B6D4DF3EE841C602
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: 8fdf3567c3d5f4e36f408bc1a7a4d0f17ceb052be99c59f04403868065454729
                                  • Instruction ID: d655e39e68d5ada122e3c5f2d90e2338a28ec7445cb6d0016db236497bff15b4
                                  • Opcode Fuzzy Hash: 8fdf3567c3d5f4e36f408bc1a7a4d0f17ceb052be99c59f04403868065454729
                                  • Instruction Fuzzy Hash: 8111FA26B14F01CAEB40DF60E8952B933A4FB59758F441E39DE6D86BA8DF78D1A4C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FormatInfoLocaleMessage
                                  • String ID: !x-sys-default-locale
                                  • API String ID: 4235545615-2729719199
                                  • Opcode ID: 3d98e95189f673a0f4cfba51fd942bb8a7f5240179ccda4a05be1dbd97be5bff
                                  • Instruction ID: 5dfe4f268bb50b54bc3a034c87414098aa960e867b7affff5f0289f3063225f1
                                  • Opcode Fuzzy Hash: 3d98e95189f673a0f4cfba51fd942bb8a7f5240179ccda4a05be1dbd97be5bff
                                  • Instruction Fuzzy Hash: 52018072F08786C2E7658B12B894BABA7A1FF98798F144139DA4D86A98DF3CD504C704
                                  Strings
                                  • invalid string: surrogate U+D800..U+DBFF must be followed by U+DC00..U+DFFF, xrefs: 00007FF68404FDBF
                                  • invalid string: ill-formed UTF-8 byte, xrefs: 00007FF68404FD97
                                  • invalid string: surrogate U+DC00..U+DFFF must follow U+D800..U+DBFF, xrefs: 00007FF68404FDC8
                                  • invalid string: '\u' must be followed by 4 hex digits, xrefs: 00007FF68404FDD1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: D@std@@@std@@U?$char_traits@$?clear@?$basic_ios@?sbumpc@?$basic_streambuf@memcpy
                                  • String ID: invalid string: '\u' must be followed by 4 hex digits$invalid string: ill-formed UTF-8 byte$invalid string: surrogate U+D800..U+DBFF must be followed by U+DC00..U+DFFF$invalid string: surrogate U+DC00..U+DFFF must follow U+D800..U+DBFF
                                  • API String ID: 1895014303-3376828882
                                  • Opcode ID: 8477db9e9f04761074366f4fe044181c110fd4d013afe77e0ce4cdafbb92da54
                                  • Instruction ID: 7aaf165095eae38d0295d0a0cd976c6442a692672551728d4d510759bf965686
                                  • Opcode Fuzzy Hash: 8477db9e9f04761074366f4fe044181c110fd4d013afe77e0ce4cdafbb92da54
                                  • Instruction Fuzzy Hash: 35918D72A08A42C5EB20AF28D0D0ABE2752FF65BC8F51463ACA1E877E5DF2DD545C341
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Xbad_function_call@std@@
                                  • String ID:
                                  • API String ID: 1029415015-0
                                  • Opcode ID: ff578c628d6c5918acfe3adfe33df946ea465bd19c90e328365adf5575e1aa75
                                  • Instruction ID: 9c9ae62473432d70484bcb2497a3c0807c63407da3627ca1ba7151cfa544d43f
                                  • Opcode Fuzzy Hash: ff578c628d6c5918acfe3adfe33df946ea465bd19c90e328365adf5575e1aa75
                                  • Instruction Fuzzy Hash: 9DA19E22B19BA5C9EB00CB69E4947BE2770FB55B48F55442AEF8EA7796DF38D044C300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Xbad_function_call@std@@
                                  • String ID:
                                  • API String ID: 1029415015-0
                                  • Opcode ID: aa95cc53b22f7db583f3e91b2fb688bf43b7c318c2a12d89d9fefc0e8d688036
                                  • Instruction ID: 0f9a1dbead5262a50903b5f409cbe07b1345933cbe1983d95450d94dd3385c0f
                                  • Opcode Fuzzy Hash: aa95cc53b22f7db583f3e91b2fb688bf43b7c318c2a12d89d9fefc0e8d688036
                                  • Instruction Fuzzy Hash: 6EA19C22A19BA9C9FB00CB69E4C07AD2B70FB55B48F55442AEF8E97795DF39D085C300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Xbad_function_call@std@@
                                  • String ID:
                                  • API String ID: 1029415015-0
                                  • Opcode ID: 1ad9aab9b37ec2c9346b61750dc4927d2929cc2d1fc319d0e9ca3f0d38392a61
                                  • Instruction ID: 30a4d95fb48b47128a0ecaa3df11590e51653449b47445cc8915883fde6fb4dd
                                  • Opcode Fuzzy Hash: 1ad9aab9b37ec2c9346b61750dc4927d2929cc2d1fc319d0e9ca3f0d38392a61
                                  • Instruction Fuzzy Hash: C3A19A22A19B99C9EB00CB69D4807BD2B70FB59B48F59842ACF8DA7796DE3DD045C310
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Xbad_function_call@std@@
                                  • String ID:
                                  • API String ID: 1029415015-0
                                  • Opcode ID: 8cee7ea539c4af0f90a49bd0d81de6d7617e23a05da544f02029c7118a9323bd
                                  • Instruction ID: e35f93c6b268584284a23fea7d536c93fa96cd5113656468e9b74c297e6aea2c
                                  • Opcode Fuzzy Hash: 8cee7ea539c4af0f90a49bd0d81de6d7617e23a05da544f02029c7118a9323bd
                                  • Instruction Fuzzy Hash: 4AA17922A19B99C9FB00CB69D4803AD3B74FB59B48F59842ACF8D97795DE3DD085C310
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Xbad_function_call@std@@
                                  • String ID:
                                  • API String ID: 1029415015-0
                                  • Opcode ID: 0fad15648e42e64922eee5b56e805382f0a86b100efd773e667f0b5fbdae740e
                                  • Instruction ID: 29f7bc764f80728c0ee3f33ec39e87ab5a243eb798acec6e1704eba045816dc3
                                  • Opcode Fuzzy Hash: 0fad15648e42e64922eee5b56e805382f0a86b100efd773e667f0b5fbdae740e
                                  • Instruction Fuzzy Hash: E8A1CE22B19B99C9EF01CB69D4803AD3B70FB59B88F59442ADF8D97796DE38D044C310
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ":
                                  • API String ID: 0-3662656813
                                  • Opcode ID: 06b863bd7b43d78e57b9d31b22c1983f71e55e1190f2e4e7b57da1e835a019e1
                                  • Instruction ID: 08c4a2b73bbaea76e5d5b659f38af37c73feaa540b0337301d544c3bf9967a3c
                                  • Opcode Fuzzy Hash: 06b863bd7b43d78e57b9d31b22c1983f71e55e1190f2e4e7b57da1e835a019e1
                                  • Instruction Fuzzy Hash: F5B12876608A85C1EB249F2AD1843AE7BA1FB98FCCF45902ACB4E47764CF39D554C740
                                  APIs
                                  • GetProcessHeap.KERNEL32(?,?,?,00007FF684072843,?,?,?,00007FF684073295), ref: 00007FF684072E7D
                                    • Part of subcall function 00007FF6840BE8A0: AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF684041B83), ref: 00007FF6840BE8B0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AcquireExclusiveHeapLockProcess
                                  • String ID:
                                  • API String ID: 3110430671-0
                                  • Opcode ID: 187d17d919ed6098f5e7290977b4f1a4817fe07844f1982a8c29ae4b73324a10
                                  • Instruction ID: b85269cccc31875766597b88045f1fe122792b91999323070813441b1273aa1f
                                  • Opcode Fuzzy Hash: 187d17d919ed6098f5e7290977b4f1a4817fe07844f1982a8c29ae4b73324a10
                                  • Instruction Fuzzy Hash: 3F318264E0DA03C5EB90DB14ECD02BA33A5BF54392F88423DD45DCA2A1EF3CA5A5C751
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 098b21ca905ffa259a3da28d89354682a55b82a8093438744bc50f75556066f0
                                  • Instruction ID: 560023399c59d6b755e364d96d8ad6413d4a0b8222c69e047d7a7f88fc15ceed
                                  • Opcode Fuzzy Hash: 098b21ca905ffa259a3da28d89354682a55b82a8093438744bc50f75556066f0
                                  • Instruction Fuzzy Hash: 52F170B2B181A04AD36C8B2EA4696397FE1F3C9B41B08812EE7A7C3785D93CC555DF10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5570c94ae87bdcfd9120603027afe33e14d56dc39bda16e30eadaf857b01573d
                                  • Instruction ID: 42cdb6c242819d886719f05179ab06cf912916dc35331c9dfb622d002503e2c7
                                  • Opcode Fuzzy Hash: 5570c94ae87bdcfd9120603027afe33e14d56dc39bda16e30eadaf857b01573d
                                  • Instruction Fuzzy Hash: 3C123B62D2EB928AF713973994411A5E714BFB37C5F40D33EED48B1962EF2DA285C204
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: be502c8ead80bebfbfe77d043e568ca3a0a8ce4edc7be230b4086f3fd1946650
                                  • Instruction ID: 6f8c5bdc0700f6c5a38cadeed2fd2071194f8117f4b6618e8325481dffe2d2ad
                                  • Opcode Fuzzy Hash: be502c8ead80bebfbfe77d043e568ca3a0a8ce4edc7be230b4086f3fd1946650
                                  • Instruction Fuzzy Hash: 22610772B19B4482EB10CB29E4853BA6361FB597D4F169239DE5D9BB88EF3CE541C300
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 411132b9b5f4139ac38d7da8d79306580da653bce6b27a9533105b3bb8729670
                                  • Instruction ID: 47880cebe94db6433b2de04ceaf96231a01dc69d3e1ec9ef4d93d43aba0157e8
                                  • Opcode Fuzzy Hash: 411132b9b5f4139ac38d7da8d79306580da653bce6b27a9533105b3bb8729670
                                  • Instruction Fuzzy Hash: A051E6A3B0568443DB248B49FC42796F7A5FB987C5F00A12AEE8D57B59EB3CD581C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$CounterPerformanceQuery
                                  • String ID: Closing connection %ld
                                  • API String ID: 3490100708-2599090834
                                  • Opcode ID: e80a5c45c2fbc61c03caec9667a15343ead06bc13587425625102b30d7791c5a
                                  • Instruction ID: bd4d2dfd5e8ccf00ca272ce3f100c57597d3109619a82ffb4b96f607f231864f
                                  • Opcode Fuzzy Hash: e80a5c45c2fbc61c03caec9667a15343ead06bc13587425625102b30d7791c5a
                                  • Instruction Fuzzy Hash: 81C1D935908B91C2E740DF21E4942AE33A4FF89FA9F08413ADE5D8B76ACF789195C711
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408204D
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF684082063
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF684082077
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408208B
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408209F
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840820B3
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840820C7
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840820DB
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840820EF
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF684082103
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF684082117
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408212B
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408213F
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF684082153
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF684082167
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408217B
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408218F
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840821A3
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840821B7
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840821CB
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840821DF
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840821F3
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF684082207
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408221B
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408222F
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF684082243
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF684082257
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408226B
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408227F
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF684082293
                                    • Part of subcall function 00007FF684082320: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822A8,?,?,?,00007FF684080FEC), ref: 00007FF68408233B
                                    • Part of subcall function 00007FF684082320: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822A8,?,?,?,00007FF684080FEC), ref: 00007FF684082369
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840822BD
                                    • Part of subcall function 00007FF68407EAD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EAE1
                                    • Part of subcall function 00007FF68407EAD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EAF1
                                    • Part of subcall function 00007FF68407EAD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EAFF
                                    • Part of subcall function 00007FF68407EAD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EB0D
                                    • Part of subcall function 00007FF68407EAD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EB1B
                                    • Part of subcall function 00007FF68407EAD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EB29
                                    • Part of subcall function 00007FF68407EAD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EB37
                                    • Part of subcall function 00007FF68407EAD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EB45
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840822E9
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF6840822FD
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684080FEC), ref: 00007FF68408230D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 612b7994febc0894b6a3b54fb1c2012ff0fd11eee57b91fa269ae5f3b08af1db
                                  • Instruction ID: 88567473c14a3fbbad2119e29c1f0026e8b93f9eb2c91f7e07692439fbd34786
                                  • Opcode Fuzzy Hash: 612b7994febc0894b6a3b54fb1c2012ff0fd11eee57b91fa269ae5f3b08af1db
                                  • Instruction Fuzzy Hash: B5712B39908B91C1D781DF61E5D42BD33E4FF89F6AF08013ADE4D8A625CF7891A9C621
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: calloc$_strdupfreehtonsmemset
                                  • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                  • API String ID: 130798683-4053692942
                                  • Opcode ID: 2376efacac7a7c13eed5fd21e3b9ea0609f8bc9267aa0cb42899edf89a9a6fb1
                                  • Instruction ID: d3e8b30532c378f88af49f83f49ec0d9f190ea8fea4e81e1c4836cb1c515ab41
                                  • Opcode Fuzzy Hash: 2376efacac7a7c13eed5fd21e3b9ea0609f8bc9267aa0cb42899edf89a9a6fb1
                                  • Instruction Fuzzy Hash: 8FE18F32A08696C6EB608F21D4843AF77A4FF49B89F44413ADA8D8B759DF3CE544C740
                                  APIs
                                    • Part of subcall function 00007FF6840751D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF68407F7B0,?,?,?,?,?,?,?,?,?,?,?,00007FF684070081), ref: 00007FF6840751F7
                                    • Part of subcall function 00007FF6840751D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF68407F7B0,?,?,?,?,?,?,?,?,?,?,?,00007FF684070081), ref: 00007FF684075203
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407BB14
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407BB1C
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407BB43
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407BB4C
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407BBD0
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407BBD9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                  • API String ID: 1294909896-1595554923
                                  • Opcode ID: b682de3eece8feb867e7239ccd0f3352b4ab0f2defb2e658447cb5f826a01fe9
                                  • Instruction ID: ec96ed388bc5fd79302c7cab6190273d3108d5c27d77e8d70e4e0cf55e0872f8
                                  • Opcode Fuzzy Hash: b682de3eece8feb867e7239ccd0f3352b4ab0f2defb2e658447cb5f826a01fe9
                                  • Instruction Fuzzy Hash: 76E17E22A0C796D6EA659B1195802BB77F0FF64B88F484439CE4DC7691EF3DE954C302
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$Authorization$Authorization:$Authorization: Bearer %s$Basic$Bearer$CONNECT$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                                  • API String ID: 1294909896-115817326
                                  • Opcode ID: e29f94e91b14c516705d7abe3b68fd551f7be7e6036667c3f6e228bc5bd66962
                                  • Instruction ID: 72d7d1da522ded5761a6099f9cf97cb5b8d2cfb9493db2f46aa087a69501dab6
                                  • Opcode Fuzzy Hash: e29f94e91b14c516705d7abe3b68fd551f7be7e6036667c3f6e228bc5bd66962
                                  • Instruction Fuzzy Hash: 83916022E0CA92C1FA658B65988437B6BA0FF48794F15403BDA4D876A5DE3EE851CB10
                                  APIs
                                    • Part of subcall function 00007FF68407A400: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,?,00007FF684079E7E,00000000,?,?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39), ref: 00007FF68407A423
                                    • Part of subcall function 00007FF68407A400: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A479
                                    • Part of subcall function 00007FF68407A400: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A483
                                    • Part of subcall function 00007FF68407A400: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A48D
                                    • Part of subcall function 00007FF68407A400: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A497
                                    • Part of subcall function 00007FF68407A400: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A4A1
                                    • Part of subcall function 00007FF68407A400: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A4AB
                                    • Part of subcall function 00007FF68407A400: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A4B5
                                    • Part of subcall function 00007FF68407A400: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A4BF
                                    • Part of subcall function 00007FF68407A400: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A4C8
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6840795A7
                                  • strchr.VCRUNTIME140 ref: 00007FF6840795C1
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840795EB
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6840795F8
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF684079622
                                  • strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF684079636
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF684079643
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407965C
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407966A
                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF684079678
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF684079693
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6840796AF
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6840796CB
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6840796E7
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF684079703
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF68407971F
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF68407973B
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF684079753
                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840797EB
                                  • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF684079822
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF684079863
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                  • String ID:
                                  • API String ID: 1087521380-0
                                  • Opcode ID: 9b21f2effd09ba26ff34bf38ffa85f2f4d8dc2c75ae2ef68b790464c7baad98f
                                  • Instruction ID: b56fe2d6ebeccbbb13b499d66e89d0e3ce5648e165a195c213d53c3da843a7ba
                                  • Opcode Fuzzy Hash: 9b21f2effd09ba26ff34bf38ffa85f2f4d8dc2c75ae2ef68b790464c7baad98f
                                  • Instruction Fuzzy Hash: A0B1AC25A0EB92C1FB5A8FA595D067A27B0BF05BA8F080239CE5D87791DF3DE494C311
                                  APIs
                                  • memset.VCRUNTIME140 ref: 00007FF68406B767
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406B88D
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68406B8BB
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68406B8C8
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406B901
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406B953
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406BAD7
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68406BB04
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68406BB11
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406BB4B
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406BB9E
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406BC87
                                  • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406BCA4
                                  • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406BCB5
                                  • ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z.MSVCP140 ref: 00007FF68406BCD8
                                  • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406BCE6
                                    • Part of subcall function 00007FF684065A60: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065C05
                                    • Part of subcall function 00007FF684062270: memcpy.VCRUNTIME140 ref: 00007FF68406234B
                                    • Part of subcall function 00007FF684066590: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,00007FF684065CC1), ref: 00007FF68406666F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$D@std@@@std@@U?$char_traits@__std_exception_destroy$?gptr@?$basic_streambuf@memcpy$?eback@?$basic_streambuf@?gbump@?$basic_streambuf@memset
                                  • String ID: value
                                  • API String ID: 1588778072-494360628
                                  • Opcode ID: 67147f57c6dc1e2c1145923f1f563ad28232d93d3e3abbaa53a1b4a983ca43a6
                                  • Instruction ID: 6f087846bce2d597e8abd298420d6f34df5092393da47d09e4d190b0d384d1c1
                                  • Opcode Fuzzy Hash: 67147f57c6dc1e2c1145923f1f563ad28232d93d3e3abbaa53a1b4a983ca43a6
                                  • Instruction Fuzzy Hash: 1E02A362A18781C5EB109B68E4803AE7760FF957A4F105339EBAD86ADADF6CD1C5C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpystrchrtolower$__stdio_common_vsscanfstrtoul
                                  • String ID: %255[^:]:%d$:%u$@$Added %s:%d:%s to DNS cache$Couldn't parse CURLOPT_RESOLVE entry '%s'!$Couldn't parse CURLOPT_RESOLVE removal entry '%s'!$RESOLVE %s:%d is - old addresses discarded!$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal!$]
                                  • API String ID: 1094891576-1753329177
                                  • Opcode ID: 7692ac17e6a48b90e756d37d904991859b81e12b7338eecaa5e9eeef7e4d781e
                                  • Instruction ID: 47abf3f73bd710bbb758c6204f8a7d2d92b7a486dbbcd42d6fb16811a24aab04
                                  • Opcode Fuzzy Hash: 7692ac17e6a48b90e756d37d904991859b81e12b7338eecaa5e9eeef7e4d781e
                                  • Instruction Fuzzy Hash: 97D1AE22A5968AC5FB219B21D9807FE6760FF41B98F44523ADA5D87AC6DF3CE505C300
                                  APIs
                                  • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF684079E93
                                  • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF684079F0D
                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF684079F31
                                  • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF684079F80
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF684079FBA
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF684079FCC
                                  • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF684079FDF
                                  • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF684079FFA
                                  • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A010
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A019
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$fclose$__acrt_iob_func_unlinkcallocfputsqsort
                                  • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                  • API String ID: 1368378007-4087121635
                                  • Opcode ID: e3b2afd92ea6f81b05b8ba3760086f1a6a76aaf88807d070b20613fb0673ce67
                                  • Instruction ID: bf9c3bbb0b7ab5bbd8211cb0d530b10f1026ba3e1787e030785034619a6f1308
                                  • Opcode Fuzzy Hash: e3b2afd92ea6f81b05b8ba3760086f1a6a76aaf88807d070b20613fb0673ce67
                                  • Instruction Fuzzy Hash: 0751BD25A0D742C2FE649B62A8942BB22B0BF48BC4F44843DDD4EC7790EE3EE445C752
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Failed to resolve "%s" for SOCKS4 connect.$Failed to send SOCKS4 connect request.$SOCKS4 communication to %s:%d$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 non-blocking resolve of %s$SOCKS4 reply has wrong version, version should be 0.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$SOCKS4: Failed receiving connect request ack: %s$SOCKS4: too long host name$Too long SOCKS proxy name, can't use!$[
                                  • API String ID: 0-3760664348
                                  • Opcode ID: 3f7cead770a38b83153c58d78604856fd57274a014a01c933667454c6ba67ce8
                                  • Instruction ID: f906df3d30e57120f14677c74f89f204f79ba15cf177dc4a2fdcf4a9801b3dd3
                                  • Opcode Fuzzy Hash: 3f7cead770a38b83153c58d78604856fd57274a014a01c933667454c6ba67ce8
                                  • Instruction Fuzzy Hash: 4BE19072A0C681C9EB548B26E59037EBBA0FF45788F48813ADA8D8B795DF7DE444C710
                                  APIs
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404DAF2
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68404DB20
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68404DB2E
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404DB67
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404DBB8
                                  • memset.VCRUNTIME140 ref: 00007FF68404D9D5
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C3F8
                                    • Part of subcall function 00007FF68404E3A0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?), ref: 00007FF68404E4E9
                                    • Part of subcall function 00007FF684052440: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405252A
                                    • Part of subcall function 00007FF684052440: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684052579
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404DD57
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68404DD83
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68404DD91
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404DDCB
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404DE1E
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404DEFB
                                  • _CxxThrowException.VCRUNTIME140 ref: 00007FF68404DF19
                                  • _CxxThrowException.VCRUNTIME140 ref: 00007FF68404DF36
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$ExceptionThrow$memcpymemset
                                  • String ID: value
                                  • API String ID: 107301382-494360628
                                  • Opcode ID: a506774963bf0fd04d576fb5aadbf1131414a9e7a0cf612f8343dd910cfc4c36
                                  • Instruction ID: 6c24563edc8cb76be885a9ee30afbd2eed20f47b728275dc1263d031510977e3
                                  • Opcode Fuzzy Hash: a506774963bf0fd04d576fb5aadbf1131414a9e7a0cf612f8343dd910cfc4c36
                                  • Instruction Fuzzy Hash: 5D02A262E18B85C5EB20DB75D4803AE2761FF957E8F10523AEA5D87AD9DF2CD184C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$Token$InformationProcess$CloseCurrentErrorHandleLastOpenProfileUnloadUsercallocmallocmemcpy
                                  • String ID: none
                                  • API String ID: 4155466088-2140143823
                                  • Opcode ID: 88748b59d470862b585a309cf1dc6f10a87e667c55d2e218f5134258565c475c
                                  • Instruction ID: 42450ebbbf9878ab4f00305f3b3edae9f66d09b9d3afa435f0ace4e88f437fac
                                  • Opcode Fuzzy Hash: 88748b59d470862b585a309cf1dc6f10a87e667c55d2e218f5134258565c475c
                                  • Instruction Fuzzy Hash: ABC14332A09BC1C6EB609F25D8803EA33A0FF55B64F44863ADA6D87B95DF39D594C301
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$strchr$_strdup
                                  • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                  • API String ID: 1922034842-2519073162
                                  • Opcode ID: edf5fb029dcbae739827d8720a47ab500ed05b29ee59ba182a914ed7b177a24a
                                  • Instruction ID: 2fad23ceccf55a1965d925d926ea672bf89610ed6f0958546f0ce60983a1ac01
                                  • Opcode Fuzzy Hash: edf5fb029dcbae739827d8720a47ab500ed05b29ee59ba182a914ed7b177a24a
                                  • Instruction Fuzzy Hash: 77918F22E0D692C5FBA18B2698807BB6B90BF45B84F64403DCF8DC7695FE2EE545C710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$_strdup
                                  • String ID:
                                  • API String ID: 2653869212-0
                                  • Opcode ID: 0da613db8baf2f75be555bcb47abc665285e600db8ae2f3ad3041a993a025973
                                  • Instruction ID: 99838e999ded21c792a121d3378d9a6d39488ca6130b34470021c904df639a68
                                  • Opcode Fuzzy Hash: 0da613db8baf2f75be555bcb47abc665285e600db8ae2f3ad3041a993a025973
                                  • Instruction Fuzzy Hash: BBB13736A0AB85CAEB55CB65E58426A33B0FF48B54F140139CB8E87B50DF3DE4A5C341
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$_strdupmalloc
                                  • String ID:
                                  • API String ID: 111713529-0
                                  • Opcode ID: e7ccae6fa04aa127cef6ef6141946a0f93b71349dff57f909425b0b01f0fd207
                                  • Instruction ID: 49e2a47186a4fadffeaf91e0e85d48993db4cf5a3091559eab0a29c761caa909
                                  • Opcode Fuzzy Hash: e7ccae6fa04aa127cef6ef6141946a0f93b71349dff57f909425b0b01f0fd207
                                  • Instruction Fuzzy Hash: 61617866A05B92C2EB65DF16A48452A77A0FF48B91F05803ACF4E87B61EF7CE495C700
                                  APIs
                                    • Part of subcall function 00007FF684065A60: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065C05
                                    • Part of subcall function 00007FF684062270: memcpy.VCRUNTIME140 ref: 00007FF68406234B
                                    • Part of subcall function 00007FF684066590: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,00007FF684065CC1), ref: 00007FF68406666F
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405E0D9
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68405E107
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68405E114
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405E14D
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405E1AB
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405E26C
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68405E29A
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68405E2A7
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405E2E0
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405E332
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405E376
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                  • String ID: value
                                  • API String ID: 3212548336-494360628
                                  • Opcode ID: edb9a2db59c94ea912e99f678b649a56b4b8f30a90520118c6e5ce283cc8180b
                                  • Instruction ID: 409953e3c01bfb3612f7565ad390c5b0673840a32212890c8914086ec8000510
                                  • Opcode Fuzzy Hash: edb9a2db59c94ea912e99f678b649a56b4b8f30a90520118c6e5ce283cc8180b
                                  • Instruction Fuzzy Hash: 0DA1C562E18782C5FB00DB68E4853AE6361FF853A4F105739EAAD92AD9DF6CD084C740
                                  APIs
                                    • Part of subcall function 00007FF684065A60: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684065C05
                                    • Part of subcall function 00007FF684062270: memcpy.VCRUNTIME140 ref: 00007FF68406234B
                                    • Part of subcall function 00007FF684066590: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,00007FF684065CC1), ref: 00007FF68406666F
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405F2C2
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68405F2EE
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68405F2FB
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405F335
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405F394
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405F452
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68405F47E
                                  • __std_exception_destroy.VCRUNTIME140 ref: 00007FF68405F48B
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405F4C5
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405F518
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405F55C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                  • String ID: value
                                  • API String ID: 3212548336-494360628
                                  • Opcode ID: 3b19abd6e09084c4d903c86aa92d96cc0f5d9f6c1526345be9fefb4141ed036e
                                  • Instruction ID: cbdc8422a41f173542634d780b93e59eb071b0ded5b27ebc2eb6c6f683132c9a
                                  • Opcode Fuzzy Hash: 3b19abd6e09084c4d903c86aa92d96cc0f5d9f6c1526345be9fefb4141ed036e
                                  • Instruction Fuzzy Hash: A8A1B762E18786C5FB00DB68D4843AE2361FF857A4F104739DBAD92AD9DF6CE485C304
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                  • String ID: Set-Cookie:$ignoring failed cookie_init for %s$none
                                  • API String ID: 4109794434-4095489131
                                  • Opcode ID: 8161a31dbd1b1eb81b9d9d9f5028a5bfdf29c55bfe295cc4d5a28cb1b5ae4093
                                  • Instruction ID: cd503de770736046499f6679546a261bc598a4442b4f638cce4f43c8f808d2bf
                                  • Opcode Fuzzy Hash: 8161a31dbd1b1eb81b9d9d9f5028a5bfdf29c55bfe295cc4d5a28cb1b5ae4093
                                  • Instruction Fuzzy Hash: 6561BC62A0DB82C1FB549B6195942BB2BE4BF45B88F48443CDE8D87B91DF3EE401D312
                                  APIs
                                  • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF684047A82
                                  • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF684047AA1
                                  • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF684047AD3
                                  • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF684047AEE
                                  • ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF684047B18
                                  • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF684047B35
                                  • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF684047B5C
                                  • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF684047BA7
                                    • Part of subcall function 00007FF68404BE00: ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BE2D
                                    • Part of subcall function 00007FF68404BE00: ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BE47
                                    • Part of subcall function 00007FF68404BE00: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BE79
                                    • Part of subcall function 00007FF68404BE00: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BEA4
                                    • Part of subcall function 00007FF68404BE00: std::_Facet_Register.LIBCPMT ref: 00007FF68404BEBD
                                    • Part of subcall function 00007FF68404BE00: ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BEDC
                                  • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF684047BBC
                                  • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF684047BD3
                                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF684047C14
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$Lockit@std@@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@Bid@locale@std@@D@std@@@1@_Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU_iobuf@@V42@@V?$basic_streambuf@Vfacet@locale@2@Vlocale@2@_get_stream_buffer_pointersstd::_
                                  • String ID: C:\Windows\System32\WindowIME.exe
                                  • API String ID: 3067465659-1868641194
                                  • Opcode ID: df807cdc90f79d9d27df7c2e24dfd6b891c1cafcf9c5c8bb51b4186830722420
                                  • Instruction ID: 0c4e2407a5ebae13ef9e2636b4ab255cbc2f8913a9618dc0b24073232463b471
                                  • Opcode Fuzzy Hash: df807cdc90f79d9d27df7c2e24dfd6b891c1cafcf9c5c8bb51b4186830722420
                                  • Instruction Fuzzy Hash: 09512832A09B86C6DB10DF25E89426A77A4FB89F88F544139DA8E83B28DF3CD155C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast_errno$strrchr$__sys_nerrstrerrorstrncpy
                                  • String ID: Unknown error %d (%#x)
                                  • API String ID: 4262108436-2414550090
                                  • Opcode ID: e52d76b5e6cc75359235ad2bddd53c6ad9cd8ed833f49987e50af8e26ef4ff57
                                  • Instruction ID: 3bd1061cc287ecbe385b604d52706e7f669d376f3b470bccfe48998499eb0d6c
                                  • Opcode Fuzzy Hash: e52d76b5e6cc75359235ad2bddd53c6ad9cd8ed833f49987e50af8e26ef4ff57
                                  • Instruction Fuzzy Hash: 18314D21A08742C6FA156F22A89427B6692BF85F80F48443DDF4FC7B95DE3CE881C714
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$calloc$malloc
                                  • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                  • API String ID: 3103867982-1477229593
                                  • Opcode ID: a6e5d35169d29f51be9566600c421b602c32743840e1877c0d13cb3e89be58db
                                  • Instruction ID: 2567065d1738a83cceb7213fe815d8985250c9ebca390086e2936f79605d9cb4
                                  • Opcode Fuzzy Hash: a6e5d35169d29f51be9566600c421b602c32743840e1877c0d13cb3e89be58db
                                  • Instruction Fuzzy Hash: 97C14A72A08B56C6EB50CF65E8902AE77A4FF48B88F10413ADE4D87B58DF38E955C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$_invalid_parameter_noinfo_noreturn$memcmp
                                  • String ID: signature
                                  • API String ID: 1674799469-2928148801
                                  • Opcode ID: e4b72c20b795460903aa7700c683ab11d6cae79eb9e2138e37db704ef0985484
                                  • Instruction ID: 59e1e29f4a8a6477e7352f124c462aeceeb017b9f937d24fd5a9bc338669859d
                                  • Opcode Fuzzy Hash: e4b72c20b795460903aa7700c683ab11d6cae79eb9e2138e37db704ef0985484
                                  • Instruction Fuzzy Hash: 02A19422F18B4189FB109B75D5803AE2262BF047E8F40463ADE6EA7BD9DE3CD095C344
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdup$freestrchrstrncmpstrtol
                                  • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                  • API String ID: 2070079882-2404041592
                                  • Opcode ID: c49bf3d2e74e294dd691b4e6442442a073627f1ac63041f82eaa3987aff2b077
                                  • Instruction ID: 6d24da010fcd41eb8398a7b73b42a240896787b946d204bc6dc90c90af42d108
                                  • Opcode Fuzzy Hash: c49bf3d2e74e294dd691b4e6442442a073627f1ac63041f82eaa3987aff2b077
                                  • Instruction Fuzzy Hash: 5151F321A4CA96C5FB618B2599E037B67D1BF89B94F48403ACECD86685DE3EE485C310
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                  • String ID: Set-Cookie:$none
                                  • API String ID: 4109794434-3629594122
                                  • Opcode ID: 6a072f90b8997f3e741f4e5ccd6cc9de7282e0c1e85ac19e3591e65d34f0775a
                                  • Instruction ID: 9652aee0bef8f86137059d23a720a87d4f6ff40a71aa737de47058fa5e6283eb
                                  • Opcode Fuzzy Hash: 6a072f90b8997f3e741f4e5ccd6cc9de7282e0c1e85ac19e3591e65d34f0775a
                                  • Instruction Fuzzy Hash: 0451C321A0D782D1FB558B6665D02BB67E0BF85B88F48443CDE8E86792DF3EE445C312
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy
                                  • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                  • API String ID: 3510742995-1652449680
                                  • Opcode ID: 3872a77681eae6a7efc78573aa0d725652e54cc419975f0e17e584d83e237168
                                  • Instruction ID: 08eb12d07d3809e02bf737c318063a7fceabba032e74a8062c906832e5d66fd6
                                  • Opcode Fuzzy Hash: 3872a77681eae6a7efc78573aa0d725652e54cc419975f0e17e584d83e237168
                                  • Instruction Fuzzy Hash: 09A17F32A4CB82C1E7509B2199803FB2760FF85B98F494139DE8E8B686EF7DE445C711
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                  • API String ID: 1294909896-3146291949
                                  • Opcode ID: c44b0adeffbf34a0a474f34b6fa48de3365fb117dc1ee4835c3dc13800846399
                                  • Instruction ID: ce828bd998891d48677ba7938326c2c6ab06db49530d6d9bd82e45e2e604064a
                                  • Opcode Fuzzy Hash: c44b0adeffbf34a0a474f34b6fa48de3365fb117dc1ee4835c3dc13800846399
                                  • Instruction Fuzzy Hash: 33915C21F0CB82C6EA649B2195D07BB6AA0FF55B84F04403DDA5EC7686DF7DE494C342
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$ExceptionThrow__std_fs_code_pagememset
                                  • String ID: &
                                  • API String ID: 2428206523-1010288
                                  • Opcode ID: 75d1ed8466dbd504d92c8e58e05997f5808fc35bd7b228822ed4c822dcb99d7b
                                  • Instruction ID: 72f9bff231b9f67f9091c130fe21cb00f3dbd4efc794226fb95c7dcdecf6b8e0
                                  • Opcode Fuzzy Hash: 75d1ed8466dbd504d92c8e58e05997f5808fc35bd7b228822ed4c822dcb99d7b
                                  • Instruction Fuzzy Hash: E6D1D572E19682D5E7119B35E4803AAB361FF627C4F40933AEA5CA6A96DF3CD584C340
                                  APIs
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C3F8
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?), ref: 00007FF68404E4E9
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404E645
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404E69F
                                    • Part of subcall function 00007FF68404AC80: memcpy.VCRUNTIME140 ref: 00007FF68404ACC6
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404E768
                                    • Part of subcall function 00007FF68404CB90: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00000000,?,?,?,00007FF684049045), ref: 00007FF68404CC6F
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404E845
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy
                                  • String ID: ; expected $; last read: '$syntax error $unexpected $while parsing
                                  • API String ID: 3063020102-4239264347
                                  • Opcode ID: efadc1dd42412e2bac164294a01f2b5057f4eee50cfc200e13496a9cdd7ca0cb
                                  • Instruction ID: 90b551414712d705504e312778509113733e91bc0908eee06b9def9a985f5b69
                                  • Opcode Fuzzy Hash: efadc1dd42412e2bac164294a01f2b5057f4eee50cfc200e13496a9cdd7ca0cb
                                  • Instruction Fuzzy Hash: 52D14E62F14652C9FB10DBA5D8803AE2762BF607ECF514239DE1D5AAD9DF7C9484C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$malloc$_time64calloctolower
                                  • String ID: :%u$Shuffling %i addresses
                                  • API String ID: 133842801-338667637
                                  • Opcode ID: e4c168355f3d8feea1d2c9b22935771a5ddb96b77d7d80a8c5bcc37c88757fb0
                                  • Instruction ID: 6dc4a34c6b53fc6f46c99368f3e63ff414b8295c03c1219c68c79f7bd07280e2
                                  • Opcode Fuzzy Hash: e4c168355f3d8feea1d2c9b22935771a5ddb96b77d7d80a8c5bcc37c88757fb0
                                  • Instruction Fuzzy Hash: 8371F432A09A92C1EB548F15EA847BA73A1FF48B94F44413ADE4E87796DF3CD445C300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdupfree
                                  • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                  • API String ID: 1865132094-1312055526
                                  • Opcode ID: 581be3addc2186a0b3a625a044c1d95f525359a6204171a2ad3bedd9d2db7927
                                  • Instruction ID: 0a06a3860a9fae10d2939e5908a71b2f866dc25bf282afc6725b26a5566baa13
                                  • Opcode Fuzzy Hash: 581be3addc2186a0b3a625a044c1d95f525359a6204171a2ad3bedd9d2db7927
                                  • Instruction Fuzzy Hash: A3719062A4C782C1E7608B2599803BF37A1FF85B94F180539DE4D8BA96DF3DE481CB10
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080A6D
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080A8A
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080A9E
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080ABA
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080AD7
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080AFA
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080B0E
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080B22
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080B48
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080B5C
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080B70
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080BBF
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080BCC
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684081075), ref: 00007FF684080BF5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 92faa97243cf25a4b29131afba3ee1ae76f79bc544f58ae04f9f377f2ba8741b
                                  • Instruction ID: 54f3cfed6b26b75aede764e069130bc6237a0d74ac98adbbc03101e222717c47
                                  • Opcode Fuzzy Hash: 92faa97243cf25a4b29131afba3ee1ae76f79bc544f58ae04f9f377f2ba8741b
                                  • Instruction Fuzzy Hash: BA51FC36A49A82C1EB44DF61D9D42FE23A0FF88F95F084039DE0E8B756CE799495C320
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$malloc
                                  • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$MAILINDEX$PARTIAL$SECTION$UID$UIDVALIDITY
                                  • API String ID: 2190258309-1670639106
                                  • Opcode ID: 1efa868b5462c200d09081fb29ee884b4892aca32957e5d129525548eb663066
                                  • Instruction ID: f64c22f256262d05773a83bca0ea1264933bccb459b942707cd3cf820d67fbef
                                  • Opcode Fuzzy Hash: 1efa868b5462c200d09081fb29ee884b4892aca32957e5d129525548eb663066
                                  • Instruction Fuzzy Hash: D6A15F22E0DA86C5EB65CF21D4803BA2BA0FF45B98F044039EB4E87A95DF3AD595C351
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdup$free$strrchr$_access_stat64
                                  • String ID:
                                  • API String ID: 2557200964-0
                                  • Opcode ID: df5435a5cef8bf91394a0fd372ddef6b175cf16ed303a68cf195f371a0bc8ca1
                                  • Instruction ID: b7183b013673317172aeaef4f7977b1b46df081a2127abec6ae17ad742d0cb7a
                                  • Opcode Fuzzy Hash: df5435a5cef8bf91394a0fd372ddef6b175cf16ed303a68cf195f371a0bc8ca1
                                  • Instruction Fuzzy Hash: 28415F21B0DB42C6FB549B11A4D427A23A0FF49B90F480139DE5E87B95EF3DE595C202
                                  APIs
                                  • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840ACFC5
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840ACFDF
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840ACFFA
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD016
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD032
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD04A
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD062
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD07A
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD092
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD0AA
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684084035,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840AD0C4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdup$callocfree
                                  • String ID:
                                  • API String ID: 1183638330-0
                                  • Opcode ID: 197c484ae14026e3044d3d1e06053f72212b74990030b463fd0feab530d5baf2
                                  • Instruction ID: 3b798b5a2e44e33243f4c3070e0e4a66301c389ee30a267147f6622a8313bd6d
                                  • Opcode Fuzzy Hash: 197c484ae14026e3044d3d1e06053f72212b74990030b463fd0feab530d5baf2
                                  • Instruction Fuzzy Hash: D231EC25A0BB46C6EF99CB55B0D063A33B1FF48B41B08053ECA5E96785EF3CE4A5C251
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$mallocmemcpy$strchr
                                  • String ID:
                                  • API String ID: 1615377186-0
                                  • Opcode ID: 5ff26d22d78fe8902c9b44893557b1d8ac17fb0e1b520e5ea82e4aa316e7b38c
                                  • Instruction ID: b749ccd9de208b66947bcc6d4d0f814cb9627b4632d9f083a15ca18356c9d6ba
                                  • Opcode Fuzzy Hash: 5ff26d22d78fe8902c9b44893557b1d8ac17fb0e1b520e5ea82e4aa316e7b38c
                                  • Instruction Fuzzy Hash: 22518E25B19B85C5EA65CF15AA8467B62E1FF48BC5F084439DE8E8B748DF3CE445C300
                                  APIs
                                  Strings
                                  • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF684083789
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$_strdup
                                  • String ID: Couldn't find host %s in the .netrc file; using defaults
                                  • API String ID: 2653869212-3983049644
                                  • Opcode ID: e05d1c515552f19627924009d350ebda3a1b17ef808468171835d53564a434c7
                                  • Instruction ID: e8e3cc273d4d090668f1002e01a53acc10dfebe438cf614e11259eb06f26c22c
                                  • Opcode Fuzzy Hash: e05d1c515552f19627924009d350ebda3a1b17ef808468171835d53564a434c7
                                  • Instruction Fuzzy Hash: FE717C26A08B82C6EB69CB259A9476B77A0FF88784F04413ADF5D87791DF3EE454C700
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF68409314A), ref: 00007FF684087E4F
                                  • strchr.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF68409314A), ref: 00007FF684087EA1
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF68409314A), ref: 00007FF684087EC5
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF68409314A), ref: 00007FF684087F15
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF68409314A), ref: 00007FF684087F58
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$_strdupstrchr
                                  • String ID: %.*s$%sAuthorization: Digest %s$Digest$Proxy-
                                  • API String ID: 153040452-3976116069
                                  • Opcode ID: 6b2858b05afccb99d1fafdf82c3af446890752d1cc33cab3502580c249f60c8c
                                  • Instruction ID: 0820d340aa6a7ecb06065bd21bcdeffa93b18afabad8b32d6dd9028c2c54f91c
                                  • Opcode Fuzzy Hash: 6b2858b05afccb99d1fafdf82c3af446890752d1cc33cab3502580c249f60c8c
                                  • Instruction Fuzzy Hash: 1A416E26A08B86D2E625DF12E8843AB77A0FF85B84F540439EE8D87796DF3DD556C300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast_errno$FormatMessagestrchr
                                  • String ID: Unknown error %u (0x%08X)
                                  • API String ID: 1897771742-1058733786
                                  • Opcode ID: d3d265ad11455a821d92ce5a028ceb9086d69f18f1f626cb40ca2a66129ebce5
                                  • Instruction ID: 7b567ac7661d8432064b8c3aaee8a357d34c04a7215fe4d57aefc59451aff723
                                  • Opcode Fuzzy Hash: d3d265ad11455a821d92ce5a028ceb9086d69f18f1f626cb40ca2a66129ebce5
                                  • Instruction Fuzzy Hash: FF214122A0C782C6E7215F35A48422B7A90BF99B94F09453DDE8A83B65CE3CD491C755
                                  APIs
                                  • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000010,?,00007FF684073114,?,?,?,?,?,?,00000000,00007FF68407356D), ref: 00007FF684073002
                                  • _invalid_parameter_noinfo.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000010,?,00007FF684073114,?,?,?,?,?,?,00000000,00007FF68407356D), ref: 00007FF68407306A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _errno_invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 2959964966-0
                                  • Opcode ID: 979777dfe6e642dd387f63d658240e46867c5cb43d9353d50230877717a36a5e
                                  • Instruction ID: a6214f189f90962ab23946a767257a168e04cc84dbd004ae8260b30b954eb5be
                                  • Opcode Fuzzy Hash: 979777dfe6e642dd387f63d658240e46867c5cb43d9353d50230877717a36a5e
                                  • Instruction Fuzzy Hash: 7041BD66A0D642C6FA249B25D49427E63B0BF84B90F14843EDB0E87795CF3EE451C752
                                  APIs
                                  • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,?,00007FF684079E7E,00000000,?,?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39), ref: 00007FF68407A423
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A479
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A483
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A48D
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A497
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A4A1
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A4AB
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A4B5
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A4BF
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000000,?,00000000,00007FF684079D7F,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407A4C8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$_time64
                                  • String ID:
                                  • API String ID: 3087401894-0
                                  • Opcode ID: da83276a5ff9a3e3f79460aaedf5a239e8ab4e78e86da4fbc64eb4e0faf8dd0f
                                  • Instruction ID: acfc04718b199a853c29edd5db5ffad18146f66ce5e5f7eda4ddfd72364debf3
                                  • Opcode Fuzzy Hash: da83276a5ff9a3e3f79460aaedf5a239e8ab4e78e86da4fbc64eb4e0faf8dd0f
                                  • Instruction Fuzzy Hash: 6021FA3AA48A51C1DB50DF61E88812A63B0FF88FA5F044036DE4E87B25DE7DD495C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdup
                                  • String ID: Authentication problem. Ignoring this.$Basic$Bearer$Digest$Ignoring duplicate digest auth header.$NTLM$Negotiate
                                  • API String ID: 1169197092-907567932
                                  • Opcode ID: 6b9b772c88feea62f66b81e050b445242f84a26114786bf1c30213ddbd46f529
                                  • Instruction ID: ba272eaa3b2020d6cf14f2e6124a47dea9a3c9d85a40c2d3e75d5abd536573da
                                  • Opcode Fuzzy Hash: 6b9b772c88feea62f66b81e050b445242f84a26114786bf1c30213ddbd46f529
                                  • Instruction Fuzzy Hash: 08718161B0C292D6F7289B22998127B7BE1BF45785F448039DA9ACB7C2DF3EE515C310
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdup
                                  • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$__Host-$__Secure-
                                  • API String ID: 1169197092-978722393
                                  • Opcode ID: e89d265a69367e9fb7c34e38e43304d511000fdf3773d4a6e3fcd46a4d4c2d38
                                  • Instruction ID: 45051df6f52bc6577482c0b6fa80ca0fbf4c9dc8d30c5f4de5ab43cef61b0645
                                  • Opcode Fuzzy Hash: e89d265a69367e9fb7c34e38e43304d511000fdf3773d4a6e3fcd46a4d4c2d38
                                  • Instruction Fuzzy Hash: 39714C62A0D786C5FB718B21A4C437B67B1BF54794F08403EDB8E86691EF2DE484E312
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                  • API String ID: 0-808606891
                                  • Opcode ID: 07070e74a38b1066fca4947df0a40e7fdc471d53dac74dc5c5d85d0a3db8fb05
                                  • Instruction ID: c9f806b2e395502e8fa567eeb4e9e00ee3010737438b3a47009f82c9ce45163c
                                  • Opcode Fuzzy Hash: 07070e74a38b1066fca4947df0a40e7fdc471d53dac74dc5c5d85d0a3db8fb05
                                  • Instruction Fuzzy Hash: C5614C72A08A41C5EB24DF28D48036E6761FF65B8CF944539CA1D877A5DF3DE885D340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _errno$strtoull
                                  • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                  • API String ID: 642117244-808606891
                                  • Opcode ID: 98d42f262c17dd816a3d5d76244878c8a6e2570df487fdb33b40205c7b89c5ed
                                  • Instruction ID: e1ed2368c94229a8338bce89ee87b36f323b7af423d634dbff5cd4e7dd4189e8
                                  • Opcode Fuzzy Hash: 98d42f262c17dd816a3d5d76244878c8a6e2570df487fdb33b40205c7b89c5ed
                                  • Instruction Fuzzy Hash: D3611432A0CB0AC6EB649F24E48433A2761FF54B88F50453ACB4E87698DF3CE884C351
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$strchrstrtol
                                  • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                                  • API String ID: 137861075-1224060940
                                  • Opcode ID: 8d4a233b44dbc48a6a179b13297119cbb41492f9f71017406b7dfd01ab76d869
                                  • Instruction ID: 9d3d1701d293e2662164032914cc38e8a2794d34317e245eedad505ddd3dc25f
                                  • Opcode Fuzzy Hash: 8d4a233b44dbc48a6a179b13297119cbb41492f9f71017406b7dfd01ab76d869
                                  • Instruction Fuzzy Hash: DF51BF62A08BD2C5EB318F25A9803AB6790FF89B98F44453ADE8D87795CF3ED555C300
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684079DF9,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407915D
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684079DF9,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF684079187
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684079DF9,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF684079191
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684079DF9,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF68407919B
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684079DF9,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF6840791A5
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684079DF9,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF6840791AF
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684079DF9,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF6840791B9
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684079DF9,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF6840791C3
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684079DF9,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF6840791CD
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684079DF9,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF6840791D6
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF684079DF9,?,?,00000000,00007FF684080B39,?,?,00000000,00007FF684081075), ref: 00007FF6840791F1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 236577dbf7bb203ca069bfa7b472e215313e47da6346e6954d20d22b83e46b93
                                  • Instruction ID: 2c3f8fa04bda6082a4d89d088d30b434d27e1a62cabca37f6068440194c0fc96
                                  • Opcode Fuzzy Hash: 236577dbf7bb203ca069bfa7b472e215313e47da6346e6954d20d22b83e46b93
                                  • Instruction Fuzzy Hash: 9221AB3AA18A91C2D750DF61E8D816A63B0FF88FA5F141036DE4E87725CE79D899C700
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840ACF92,?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ADF6C
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840ACF92,?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ADF76
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840ACF92,?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ADF80
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840ACF92,?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ADF8A
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840ACF92,?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ADF94
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840ACF92,?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ADF9E
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840ACF92,?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ADFA8
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840ACF92,?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ADFB2
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840ACF92,?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ADFBC
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840ACF92,?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ADFC6
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840ACF92,?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ADFD0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 1d84c8a59a3a33b28bf0f57a82db746be9173bac72c5cb000d001eb6440a98a1
                                  • Instruction ID: 73f9cbec46a1e270495065940d0dd5e894ecdcb996a1961746072d3a5299c800
                                  • Opcode Fuzzy Hash: 1d84c8a59a3a33b28bf0f57a82db746be9173bac72c5cb000d001eb6440a98a1
                                  • Instruction Fuzzy Hash: AF01B92AE14951C2D754DF65D8D803923B0FF8CF66B141036CE0E8A235DE78D8E9C740
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF684093128), ref: 00007FF6840AF940
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF684093128), ref: 00007FF6840AF977
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF684093128), ref: 00007FF6840AF99E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                  • API String ID: 1294909896-3948863929
                                  • Opcode ID: cb1008db4b75b855c02e0c10aa1f22642e3ed388845649f09924b78b9fa0f944
                                  • Instruction ID: 9a225cec4410353700ed80d7f0976d65b1ddf071f71185189b785df2ed192bca
                                  • Opcode Fuzzy Hash: cb1008db4b75b855c02e0c10aa1f22642e3ed388845649f09924b78b9fa0f944
                                  • Instruction Fuzzy Hash: EC612536A08B82C6EBA0CB15E8883AB77A5FF84B84F00403ADA8D87764DF7CD555C701
                                  APIs
                                  • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406B5B7
                                  • ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406B5C3
                                  • ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ.MSVCP140 ref: 00007FF68406B5D9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: D@std@@@std@@U?$char_traits@$?epptr@?$basic_streambuf@?pptr@?$basic_streambuf@Pninc@?$basic_streambuf@
                                  • String ID:
                                  • API String ID: 4060314879-0
                                  • Opcode ID: 01de81444fe7f2bab53abf222cd956e2c2f37a125a5ac1acc463110a705fbed3
                                  • Instruction ID: 175e0efd25f6c3c2c6f94f8c81f2e26dcb8477ced9d202d9f927ead57185e2aa
                                  • Opcode Fuzzy Hash: 01de81444fe7f2bab53abf222cd956e2c2f37a125a5ac1acc463110a705fbed3
                                  • Instruction Fuzzy Hash: 9741C322F08751C2EA029B76A5842BA63A0BF58BE4F080139DF1DC7BD1DE3CD496C310
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                  • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                  • API String ID: 1392894463-1168109407
                                  • Opcode ID: 2353849a177cbcbba9085eaa15c96ce531cc083882f181b8cf4098a73a329d43
                                  • Instruction ID: 17694c63c3cfee58fe70c0733a0e3cc372daf66a1e65ad586a7bf427ad303646
                                  • Opcode Fuzzy Hash: 2353849a177cbcbba9085eaa15c96ce531cc083882f181b8cf4098a73a329d43
                                  • Instruction Fuzzy Hash: AB41A161E0CA82C2EB50DB25A9C02BB67A0BF45B84F4C4539EA9EDB7D5DF2DE501C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: malloc$Ioctlsetsockopt
                                  • String ID: Failed to alloc scratch buffer!$We are completely uploaded and fine
                                  • API String ID: 3352517165-607151321
                                  • Opcode ID: aec9e1daadfd6b2eba953f43d8328ccf9e7019431e9ea4a1bf8904c1e73d87cc
                                  • Instruction ID: 980fc166fc40ffc217ffcda53bfac466c3ecd3d3eca457d64d9a0f472ea815d9
                                  • Opcode Fuzzy Hash: aec9e1daadfd6b2eba953f43d8328ccf9e7019431e9ea4a1bf8904c1e73d87cc
                                  • Instruction Fuzzy Hash: C9B18F32A4DB86C5EB658F2499843EA27A0FF45B98F084139CF4D8A789DF789495C311
                                  APIs
                                    • Part of subcall function 00007FF6840491B0: memcpy.VCRUNTIME140(?,?,?,00007FF684042779,?,?,?,?,?,?,?,0000006E00000006,00000000,?,0000000100000000,00007FF684041A7E), ref: 00007FF6840492A3
                                    • Part of subcall function 00007FF6840491B0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF684042779,?,?,?,?,?,?,?,0000006E00000006,00000000,?,0000000100000000,00007FF684041A7E), ref: 00007FF68404927D
                                    • Part of subcall function 00007FF6840491B0: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6840492BF
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,0000006E00000006,00000000,?,0000000100000000,00007FF684041A7E), ref: 00007FF684042997
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,0000006E00000006,00000000,?,0000000100000000,00007FF684041A7E), ref: 00007FF68404299E
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,0000006E00000006,00000000,?,0000000100000000,00007FF684041A7E), ref: 00007FF6840429A5
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,0000006E00000006,00000000,?,0000000100000000,00007FF684041A7E), ref: 00007FF6840429AC
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,0000006E00000006,00000000,?,0000000100000000,00007FF684041A7E), ref: 00007FF6840429B3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy
                                  • String ID: 2.8$Y4fXNocay3
                                  • API String ID: 2318677668-3372409175
                                  • Opcode ID: 41eda736f416a27eb45952499296369ebdf0309d209fd55224c7b5bd7cec7263
                                  • Instruction ID: 1c751f00318977fbec5d641cdec867b2444f6dcf9cd1143726a26c84952ff537
                                  • Opcode Fuzzy Hash: 41eda736f416a27eb45952499296369ebdf0309d209fd55224c7b5bd7cec7263
                                  • Instruction Fuzzy Hash: C4715A62A08B86C1EA20DB25E8D837E3361BF51BC4F41403DCA8D87AA6DF7DE494C340
                                  APIs
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C3F8
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C499
                                    • Part of subcall function 00007FF684043CB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684043E73
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405252A
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684052579
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840525B8
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684052607
                                  • __std_exception_copy.VCRUNTIME140 ref: 00007FF68405265A
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840526AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                  • String ID: parse_error
                                  • API String ID: 2484256320-3903021949
                                  • Opcode ID: 1ce5e2a91f1b759885d8fb5230b26e6ab9208db82c65edec517d5cdce130265e
                                  • Instruction ID: aed3dc8f82ab288a1391433aaeaa6488689708128d92242e4c536d62d3fd64cc
                                  • Opcode Fuzzy Hash: 1ce5e2a91f1b759885d8fb5230b26e6ab9208db82c65edec517d5cdce130265e
                                  • Instruction Fuzzy Hash: 12719162F14A42C9EB10DB75E4803BE2361FF547A8F105339DA6DA6AD9EE3CE084C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                  • String ID: value
                                  • API String ID: 1346393832-494360628
                                  • Opcode ID: 05d1fe4779a3e33b3737455aa13704ef5ac668f39179eaeacce6db6384c569e9
                                  • Instruction ID: 0441d5d8685ac2b0ddfbe788500818bc411b1589c1d46caa2ffbbca237d48e36
                                  • Opcode Fuzzy Hash: 05d1fe4779a3e33b3737455aa13704ef5ac668f39179eaeacce6db6384c569e9
                                  • Instruction Fuzzy Hash: B361B562E18B81C5FB00CB78E4853AE6361FF857A4F105739EA9D92AD9DF6CE085C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                  • String ID: value
                                  • API String ID: 1346393832-494360628
                                  • Opcode ID: 8231dd6ac417d0defb5af280270a6b63a6a64430f9b2b457d54b74d689c4d495
                                  • Instruction ID: 82691b0dde385c7757b400dba8ec0a88b6ce5d0712920fbd5b42eea877e299ef
                                  • Opcode Fuzzy Hash: 8231dd6ac417d0defb5af280270a6b63a6a64430f9b2b457d54b74d689c4d495
                                  • Instruction Fuzzy Hash: 17618462E18B86C5EB00DB79D4843AE6361FF457A8F104739EA6D92AD9DF7CE081C704
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: __std_fs_convert_wide_to_narrow$__std_fs_code_pagegetenv
                                  • String ID: "$ALLUSERSPROFILE$current_path()
                                  • API String ID: 1312788774-2599894315
                                  • Opcode ID: 9d9fc603f0128d483cded6c753f2aadf6d5920afa59710756b7859b5dbc4015b
                                  • Instruction ID: ff8ea39fb2c67a00635bacfb775c0f9c5560e24b5f49a561d9e46b6c620de58a
                                  • Opcode Fuzzy Hash: 9d9fc603f0128d483cded6c753f2aadf6d5920afa59710756b7859b5dbc4015b
                                  • Instruction Fuzzy Hash: DB41E222E2C782C2E7509F21A5902BBA661FF947D4F145639EB5E83A86DF7CE0D1C740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 1775671525-0
                                  • Opcode ID: bd0270364365b950f00053c234b6ea5eddfc34cb00b369f2b9fea811336a0384
                                  • Instruction ID: e3543d91a2de1a22c8f425c56d81003f3b11537b5566cdc5698df990be77aedb
                                  • Opcode Fuzzy Hash: bd0270364365b950f00053c234b6ea5eddfc34cb00b369f2b9fea811336a0384
                                  • Instruction Fuzzy Hash: 7D41B162708A85C1EE20DF16A5846AAA361FF44BD4F444639EFAE97BC9DF3CE140C304
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdup
                                  • String ID:
                                  • API String ID: 1169197092-0
                                  • Opcode ID: 0d0dc56d1a14ed3c47d37207053793dc72b803be03eb677f01c24dc3b000db43
                                  • Instruction ID: 09a3078f82d21bf2eeb8af4ec28323baa2dc9ecdf6509b7ba105533e4d043353
                                  • Opcode Fuzzy Hash: 0d0dc56d1a14ed3c47d37207053793dc72b803be03eb677f01c24dc3b000db43
                                  • Instruction Fuzzy Hash: BB510D2661AB91C2EB95CF55A08012977B4FF48B84B08117AEF9D43B45EF2DE4E1C740
                                  APIs
                                  • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406012D
                                  • ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406013B
                                  • ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF684060143
                                  • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406014F
                                  • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406015B
                                  • ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z.MSVCP140 ref: 00007FF684060198
                                  • ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD0@Z.MSVCP140 ref: 00007FF6840601A6
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840601CC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: D@std@@@std@@U?$char_traits@$?eback@?$basic_streambuf@$?egptr@?$basic_streambuf@?epptr@?$basic_streambuf@?pptr@?$basic_streambuf@?setg@?$basic_streambuf@?setp@?$basic_streambuf@D00@_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 3548242540-0
                                  • Opcode ID: 78ce68a4615c2ea9c355b4ab6d7337ad2983796efdf07f051f3995579ea083d4
                                  • Instruction ID: 3c2c044ede0f691352e2310f4597908bfe48ae8b6c648554e426d7b84110bdf3
                                  • Opcode Fuzzy Hash: 78ce68a4615c2ea9c355b4ab6d7337ad2983796efdf07f051f3995579ea083d4
                                  • Instruction Fuzzy Hash: 94116621F55B42C2FA14DF75A8A833A22A1BF89BE5F14013CDA5E86BE4EF3C9445C610
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: e11dcf402101bbd2ab2fb51d68396bc55f6db62fd9203dd325ee244a60494153
                                  • Instruction ID: 171014e82df95b72c6d5d2784c7a6c75b160df5b3aa28b6585a1e5d2fcc5b16e
                                  • Opcode Fuzzy Hash: e11dcf402101bbd2ab2fb51d68396bc55f6db62fd9203dd325ee244a60494153
                                  • Instruction Fuzzy Hash: A831E736A08A91C2E7509F51E89412A67B4FF88FE5F084036DE8D87B69CF7DD895C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 724426f40b970118e676b92283394d933f38cccffd79957ab4d68307f84e61de
                                  • Instruction ID: c40c6605ea22a05829fc4eeea2d1314a3686493a5c2700eb74fd29094ee91c42
                                  • Opcode Fuzzy Hash: 724426f40b970118e676b92283394d933f38cccffd79957ab4d68307f84e61de
                                  • Instruction Fuzzy Hash: D321763AA08A91C2E750DF61E89402A73B4FF88BA5F140536DE8D87769CF7DD499CB40
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 24aad61765fb371559719b25e44a52fbd0b755cf9a324cd1c795ed68a70edf68
                                  • Instruction ID: 5b78e8156e55aef776cc68438cb5ac0a11b0dda4d7b5faf94c2893f7d1e08b14
                                  • Opcode Fuzzy Hash: 24aad61765fb371559719b25e44a52fbd0b755cf9a324cd1c795ed68a70edf68
                                  • Instruction Fuzzy Hash: 81017929A18A51C2EB44DF61E9D842963B0FF8CFA6B041036CD4E87635CE7CD8E9C740
                                  APIs
                                  • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF6840B13E3), ref: 00007FF6840B2078
                                  • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF6840B13E3), ref: 00007FF6840B20BA
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF6840B13E3), ref: 00007FF6840B215F
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF6840B13E3), ref: 00007FF6840B2172
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840B2657
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$memcpystrchr
                                  • String ID: %s?dns=%s$Failed to encode DOH packet [%d]
                                  • API String ID: 1438451818-3030351490
                                  • Opcode ID: 36fec14e1bbd67fccae0dda245758d614816c572b2a40c3942353d4171865a80
                                  • Instruction ID: b7eedb50983269d58aee642517bf2126e4083b1644028923f3f4c6feb7bf28fe
                                  • Opcode Fuzzy Hash: 36fec14e1bbd67fccae0dda245758d614816c572b2a40c3942353d4171865a80
                                  • Instruction Fuzzy Hash: BC029B61B087C386E711DBA689887BB2796FF95B88F44443DDE0DC7B8ADE68D841C305
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturnmemcpy
                                  • String ID:
                                  • API String ID: 931391446-0
                                  • Opcode ID: 2562d930ac40b19a94c735b89cf790d78e249dd8e07283ee6e0bd7dea48cefed
                                  • Instruction ID: bae4e957ceed27196d12846eddddd0211c005df5641620397e4d2e7a604fec7a
                                  • Opcode Fuzzy Hash: 2562d930ac40b19a94c735b89cf790d78e249dd8e07283ee6e0bd7dea48cefed
                                  • Instruction Fuzzy Hash: D9029B62A087C6C8EB218B64D8843EE6761FF55798F404239DB9E5BADADF78D1C4C340
                                  APIs
                                  • __std_fs_code_page.MSVCPRT ref: 00007FF684044EB3
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684044F1A
                                  • memset.VCRUNTIME140 ref: 00007FF684044FC9
                                    • Part of subcall function 00007FF6840488C0: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6840488FB
                                    • Part of subcall function 00007FF6840488C0: ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF68404891A
                                    • Part of subcall function 00007FF6840488C0: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF68404894C
                                    • Part of subcall function 00007FF6840488C0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF684048967
                                    • Part of subcall function 00007FF6840488C0: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6840489B6
                                  • memcmp.VCRUNTIME140 ref: 00007FF684045058
                                  • memcmp.VCRUNTIME140 ref: 00007FF6840450CD
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840451D8
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840451DF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: U?$char_traits@$D@std@@@std@@$_invalid_parameter_noinfo_noreturn$memcmp$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@?setstate@?$basic_ios@D@std@@@1@_Init@?$basic_streambuf@V?$basic_streambuf@__std_fs_code_pagememset
                                  • String ID:
                                  • API String ID: 2198800852-0
                                  • Opcode ID: 96e04a60a0dea7c5fbb7d0be3f201897ce63114416915f333ca16fbb785a6cff
                                  • Instruction ID: 6de3e6251715596b6ddb2adcbb11f62d5f0a5f0245e3ad9eb823e49bbc22be39
                                  • Opcode Fuzzy Hash: 96e04a60a0dea7c5fbb7d0be3f201897ce63114416915f333ca16fbb785a6cff
                                  • Instruction Fuzzy Hash: 20A1D162B08685D1EA20DB15D0843BE6361FF65BC8F50403ADB9D8BA96DF7DE885D380
                                  APIs
                                  • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF684073DF8), ref: 00007FF684073F45
                                  • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF684073DF8), ref: 00007FF684073F5F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: strncmp
                                  • String ID: I32$I64$Internal error removing splay node = %d
                                  • API String ID: 1114863663-13178787
                                  • Opcode ID: c612636b00941bb0d968f6a997d5425309f41637d4633a51da22dce9a178c224
                                  • Instruction ID: 0c7aaa6b1876cae1d3b2ab3f021c3091e2a9f699f4ccd00df4477573a6c07c39
                                  • Opcode Fuzzy Hash: c612636b00941bb0d968f6a997d5425309f41637d4633a51da22dce9a178c224
                                  • Instruction Fuzzy Hash: 50A19032A0CA52C6E7218B14E48477E7BB4FB59B8CF46813ADA9D86255DF3DD208C741
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: fgetc
                                  • String ID:
                                  • API String ID: 2807381905-0
                                  • Opcode ID: 15340b8e76f80d9301a0cdae3e2f7caaf9d294c23945ee6541366021856f8643
                                  • Instruction ID: a850099755c15cdb0c1cea74f605f41b3701d3323a30c2e622541d80c70c6447
                                  • Opcode Fuzzy Hash: 15340b8e76f80d9301a0cdae3e2f7caaf9d294c23945ee6541366021856f8643
                                  • Instruction Fuzzy Hash: 35917937B18A41C9EB108F65D4802AD37B0FB987A8F545A3ADA5D93B98DF38D494D310
                                  APIs
                                  • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF68407A3BA,?,?,?,?,?,?,?,00007FF68407A187), ref: 00007FF684096551
                                  • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF6840966F3
                                  • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF684096710
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: strchr$_errno
                                  • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                  • API String ID: 2644425738-1191287149
                                  • Opcode ID: 19e0d8a6545280a39074cb474d7240d372549f18391b478acce31439f1a51c10
                                  • Instruction ID: 612513612bbc51eca558f5144df36fea5e0699294eff2cc71151f2d9cacbb50d
                                  • Opcode Fuzzy Hash: 19e0d8a6545280a39074cb474d7240d372549f18391b478acce31439f1a51c10
                                  • Instruction Fuzzy Hash: BC510562F0C786C1EE618B2594D057BAB90BF95B88F944939DE8D87789EE3DE541C300
                                  APIs
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF684078DAC
                                    • Part of subcall function 00007FF684096330: strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF684079D59), ref: 00007FF684096366
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF684078E01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdup$strchr
                                  • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                  • API String ID: 3404610657-2292467869
                                  • Opcode ID: 7d7d9bdf5c698196913900de261d88f93add4d8f50983a08f8cd2f90cc65448f
                                  • Instruction ID: 8c74a65e6ef73145ca075bd5aa28430bfdd8de33231a1f79e779ceae90f59e0b
                                  • Opcode Fuzzy Hash: 7d7d9bdf5c698196913900de261d88f93add4d8f50983a08f8cd2f90cc65448f
                                  • Instruction Fuzzy Hash: 9B614C62A0D786C5FB718B25A5D437B67B1BF44794F08003ADB8E86791DF2EE484E312
                                  APIs
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C3F8
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C499
                                    • Part of subcall function 00007FF684043CB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684043E73
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840572BE
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405730D
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405734C
                                  • __std_exception_copy.VCRUNTIME140 ref: 00007FF684057398
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840573E5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                  • String ID: invalid_iterator
                                  • API String ID: 2484256320-2508626007
                                  • Opcode ID: 5ed6dbc9a48e8f8dd430e8fab2fb15630dfbfd7bcb5350e8d440697e21c01665
                                  • Instruction ID: 11ebb69817c63e99a9c0109171968b64c5b462e245bd6071ed3c43c4fec79bb9
                                  • Opcode Fuzzy Hash: 5ed6dbc9a48e8f8dd430e8fab2fb15630dfbfd7bcb5350e8d440697e21c01665
                                  • Instruction Fuzzy Hash: E351A362F18B42D5EB00DB75D4803AE2361FF557A8F105339EA6D93AD9EE2CE195D300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID: Digest$stale$true
                                  • API String ID: 1294909896-2487968700
                                  • Opcode ID: 856f2025eab7895e7ca4470ecb7e355778202c4ac5b276e812be7926a17a38d0
                                  • Instruction ID: 29dd4a4a9bdb710f211402affea7b070dd9a27c670951693f5616119d9b43ded
                                  • Opcode Fuzzy Hash: 856f2025eab7895e7ca4470ecb7e355778202c4ac5b276e812be7926a17a38d0
                                  • Instruction Fuzzy Hash: 60515F22A08A82D1FB608B25E9D03BA73E0FF84B94F544139DA9DD76C6EF2CE555C704
                                  APIs
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C3F8
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C499
                                    • Part of subcall function 00007FF684043CB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684043E73
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404C10E
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404C15D
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404C19C
                                  • __std_exception_copy.VCRUNTIME140 ref: 00007FF68404C1E8
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404C235
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                  • String ID: type_error
                                  • API String ID: 2484256320-1406221190
                                  • Opcode ID: 733d880df8a4bbcf6e852e2bc2a124678c135d29bcf1648add04835b104a964c
                                  • Instruction ID: 47959bcac70eae8870976a8d12aac9a3ad08ccea1a2a1bd9950f7e8cef6ff2be
                                  • Opcode Fuzzy Hash: 733d880df8a4bbcf6e852e2bc2a124678c135d29bcf1648add04835b104a964c
                                  • Instruction Fuzzy Hash: 5C51A362F18B42D5FB10DB75D4803AE2361FF597A8F10533ADA6D92AD9EE2CE195C300
                                  APIs
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C3F8
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C499
                                    • Part of subcall function 00007FF684043CB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684043E73
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404D482
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404D4D1
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404D510
                                  • __std_exception_copy.VCRUNTIME140 ref: 00007FF68404D560
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404D5AD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                  • String ID: other_error
                                  • API String ID: 2484256320-896093151
                                  • Opcode ID: 01b70a6a201622379a0fcf26651f76e5499b20ac347b88902697740af46eeb2c
                                  • Instruction ID: caa128b7d4ea0a541529ff56ef3cadf32e1feb18f4d9192c8b822992349ae7a5
                                  • Opcode Fuzzy Hash: 01b70a6a201622379a0fcf26651f76e5499b20ac347b88902697740af46eeb2c
                                  • Instruction Fuzzy Hash: F5519362E04B46D5EB10DB75D4803AE2361FF597A8F50533AEA6C96AD9DF2CE194C300
                                  APIs
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C3F8
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C499
                                    • Part of subcall function 00007FF684043CB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684043E73
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684054F72
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684054FC1
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684055000
                                  • __std_exception_copy.VCRUNTIME140 ref: 00007FF684055050
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405509D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                  • String ID: out_of_range
                                  • API String ID: 2484256320-3053435996
                                  • Opcode ID: 0e683bc9670512e3906f4092e2b2d6e70aae8aaad1e645ad342e01c57568f849
                                  • Instruction ID: 0f718ee9bf46ff43014967a5a06ce566314b0de132e1fd4069e3320cee60b4a3
                                  • Opcode Fuzzy Hash: 0e683bc9670512e3906f4092e2b2d6e70aae8aaad1e645ad342e01c57568f849
                                  • Instruction Fuzzy Hash: 3A518162E18B82D5EB10DB65D4803AE2361FF597A8F405339EA6C56AD9DF2CE194C340
                                  APIs
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C3F8
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C499
                                    • Part of subcall function 00007FF684043CB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684043E73
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684059022
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684059071
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840590B0
                                  • __std_exception_copy.VCRUNTIME140 ref: 00007FF684059100
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405914D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                  • String ID: type_error
                                  • API String ID: 2484256320-1406221190
                                  • Opcode ID: 7dfaca2aff1c52614702f73080e9c1088288ea855c7f1a8901f22eb568eb260a
                                  • Instruction ID: 0bdbb05122dc560af298f5010e0c9e6d10fb3e7744e8e2be57da499ba4f4bda9
                                  • Opcode Fuzzy Hash: 7dfaca2aff1c52614702f73080e9c1088288ea855c7f1a8901f22eb568eb260a
                                  • Instruction Fuzzy Hash: C851A262E04B82D8EB10DB75D4803AE2361FF587A8F405739EA6C96AD9DF2CE194C300
                                  APIs
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C3F8
                                    • Part of subcall function 00007FF68404C3C0: memcpy.VCRUNTIME140(?,?,?,?,00007FF68404119B), ref: 00007FF68404C499
                                    • Part of subcall function 00007FF684043CB0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684043E73
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404D1C2
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404D211
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404D250
                                  • __std_exception_copy.VCRUNTIME140 ref: 00007FF68404D2A0
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404D2ED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                  • String ID: type_error
                                  • API String ID: 2484256320-1406221190
                                  • Opcode ID: 68c66c01c25f2a8babfe7f9ed8184e27cb858112e4e6280c39d203db4d86206e
                                  • Instruction ID: ec65bc0256dedee8bd9e8e1302e412bc4323ceb8d7e37e452df773683e67565b
                                  • Opcode Fuzzy Hash: 68c66c01c25f2a8babfe7f9ed8184e27cb858112e4e6280c39d203db4d86206e
                                  • Instruction Fuzzy Hash: 7E519172E14B86D4EB10CB65D4803AE2360FF597A8F009339EA5C52AD9EF6CE194C340
                                  APIs
                                  • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(0000006E00000006,?,00000000,00000000,0000000F,00007FF684046FAB), ref: 00007FF684050B5F
                                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(0000006E00000006,?,00000000,00000000,0000000F,00007FF684046FAB), ref: 00007FF684050BB6
                                  • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(0000006E00000006,?,00000000,00000000,0000000F,00007FF684046FAB), ref: 00007FF684050BE3
                                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,0000000F,00007FF684046FAB), ref: 00007FF684050C06
                                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,0000000F,00007FF684046FAB), ref: 00007FF684050C4C
                                  • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,0000000F,00007FF684046FAB), ref: 00007FF684050C53
                                  • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,0000000F,00007FF684046FAB), ref: 00007FF684050C60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                                  • String ID:
                                  • API String ID: 1492985063-0
                                  • Opcode ID: d33b8abf8af6216a2d3c7c327e7b4ec8a8c139db3470449fdc41a0ad0e4ea6ee
                                  • Instruction ID: 69ed1bed1301a0c0d5a59d2b7d7f70e90a8445d5929465e97e1cdde95dad63dc
                                  • Opcode Fuzzy Hash: d33b8abf8af6216a2d3c7c327e7b4ec8a8c139db3470449fdc41a0ad0e4ea6ee
                                  • Instruction Fuzzy Hash: 2A511022619A41C2EA208F19D5D423EABA0FF85F95F668539CE5E937A0DF39D446C300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                  • API String ID: 1294909896-1255959952
                                  • Opcode ID: b4ae401fda2d6b3550a5e6fe799174b36d49b281ee9c742f0ba86cee9c0150ca
                                  • Instruction ID: 4b915b417a2284424752637fbf6564d3b1479a22ce2d41e5f81937a4c4023e39
                                  • Opcode Fuzzy Hash: b4ae401fda2d6b3550a5e6fe799174b36d49b281ee9c742f0ba86cee9c0150ca
                                  • Instruction Fuzzy Hash: 5D51BD22E08682D6FB21CB65E4C02BA2790FF40B94F48403ADA8CD7791EF3DE465C750
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: fseek
                                  • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                  • API String ID: 623662203-959247533
                                  • Opcode ID: 5de02ce979b79a16e9d1e982747456c0288ae879287f64a714ccbac509e18158
                                  • Instruction ID: be043f0612089befab954d4f9dbbe5affb02d17dd621975e45520eb1122bc7e5
                                  • Opcode Fuzzy Hash: 5de02ce979b79a16e9d1e982747456c0288ae879287f64a714ccbac509e18158
                                  • Instruction Fuzzy Hash: 8E417761B58642C1EB54DF2699843BA23A1FF89B94F881039DE0DCF78ADE7DE481C710
                                  APIs
                                    • Part of subcall function 00007FF68409AB80: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68407FF39,?,?,?,?,00007FF68407F2DB), ref: 00007FF68409ABA8
                                    • Part of subcall function 00007FF68409AB80: GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF68407FF39,?,?,?,?,00007FF68407F2DB), ref: 00007FF68409ABCE
                                    • Part of subcall function 00007FF68409AB80: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68407FF39,?,?,?,?,00007FF68407F2DB), ref: 00007FF68409ABEF
                                    • Part of subcall function 00007FF68409AB80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF68407FF39,?,?,?,?,00007FF68407F2DB), ref: 00007FF68409AC00
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840AEDFF
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840AEE48
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840AEE51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$realloc$EnvironmentVariable
                                  • String ID: %s%s.netrc$%s%s_netrc$HOME
                                  • API String ID: 4174189579-3384076093
                                  • Opcode ID: cc6066385937efad528a1198f2ce5c2d90bd52225e61cc8a90b3d90624d8da05
                                  • Instruction ID: d336478c3c2cd8701d355155c73d4a88e9e05e05ba87af62d4d8675738b58317
                                  • Opcode Fuzzy Hash: cc6066385937efad528a1198f2ce5c2d90bd52225e61cc8a90b3d90624d8da05
                                  • Instruction Fuzzy Hash: 7831A731A0CB52C1EA10DB16B8841AB63A0FF48BD4F48453AED8C97765EF3CE545C780
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskD@std@@Facet_Getcat@?$ctype@Getgloballocale@locale@std@@Locimp@12@RegisterV42@@Vfacet@locale@2@std::_
                                  • String ID:
                                  • API String ID: 3790006010-0
                                  • Opcode ID: f08aa6f66354e4c5da6f9b99104fb983d8cc56c51dd2f8a086d6a38ea95eb317
                                  • Instruction ID: d9be7a1bb6b6bf38051e4572d39810a8d97a65933ed7a2c37d22ae9dfa02e611
                                  • Opcode Fuzzy Hash: f08aa6f66354e4c5da6f9b99104fb983d8cc56c51dd2f8a086d6a38ea95eb317
                                  • Instruction Fuzzy Hash: 2C314F22A08B45C1EB649F25E49016B7770FFA8BD8F480639DA9E87BA5DF3CE454C700
                                  APIs
                                  • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BE2D
                                  • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BE47
                                  • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BE79
                                  • ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BEA4
                                  • std::_Facet_Register.LIBCPMT ref: 00007FF68404BEBD
                                  • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BEDC
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68404BF07
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
                                  • String ID:
                                  • API String ID: 762505753-0
                                  • Opcode ID: 5e01878f125e7231926093e7bdf42e0a635cc13540f0a5d970c766dc126fd259
                                  • Instruction ID: 503a75af8ced951c82746d2b04c4cc55580e452ad50ee8626b0f5acc0742fc71
                                  • Opcode Fuzzy Hash: 5e01878f125e7231926093e7bdf42e0a635cc13540f0a5d970c766dc126fd259
                                  • Instruction Fuzzy Hash: FB313C22A08B46C1EA249F12E48016A7370FFA8BD8F480639DB9E87B65DF3CE555C700
                                  APIs
                                  • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E6FC
                                  • ?pbase@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E70A
                                  • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E716
                                  • ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E73A
                                  • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E74B
                                  • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E759
                                  • ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E765
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: D@std@@@std@@U?$char_traits@$?pptr@?$basic_streambuf@$?eback@?$basic_streambuf@?egptr@?$basic_streambuf@?epptr@?$basic_streambuf@?gptr@?$basic_streambuf@?pbase@?$basic_streambuf@
                                  • String ID:
                                  • API String ID: 2869409680-0
                                  • Opcode ID: 3e417acb1497fbfbe7a2ef8c0f4dfddc95c0233a6d927cde783718bd2aa23060
                                  • Instruction ID: 5efd67845dcc82cad5eea1f68428ab51225d8db84807ec05387e76d6bee98802
                                  • Opcode Fuzzy Hash: 3e417acb1497fbfbe7a2ef8c0f4dfddc95c0233a6d927cde783718bd2aa23060
                                  • Instruction Fuzzy Hash: 0A21BF62E18B82C1EB159F21A88466A67A0FF95FC4F084139DE8E83B64DF3CD4D5C740
                                  APIs
                                  • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E862
                                  • ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E877
                                  • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E898
                                  • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E8C0
                                  • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E8CC
                                  • ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z.MSVCP140 ref: 00007FF68406E8DE
                                  • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E8E7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: D@std@@@std@@U?$char_traits@$?gptr@?$basic_streambuf@$?eback@?$basic_streambuf@?egptr@?$basic_streambuf@?pptr@?$basic_streambuf@?setg@?$basic_streambuf@D00@
                                  • String ID:
                                  • API String ID: 1210260451-0
                                  • Opcode ID: c177bac2188691ff1d4d917977eb0d29e4dfd1277919924ec515a437e75aeb35
                                  • Instruction ID: cad3abae13d62016e674efd03ef814968636dafd72ac45d9c72b648cfffe2c45
                                  • Opcode Fuzzy Hash: c177bac2188691ff1d4d917977eb0d29e4dfd1277919924ec515a437e75aeb35
                                  • Instruction Fuzzy Hash: 1C116D21E09B95C2EA419B26B68413A67A0BF49FD0F48043CDF5E57F95DF2CD492C760
                                  APIs
                                  • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF68408243C), ref: 00007FF6840850F5
                                  • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF68408243C), ref: 00007FF684085121
                                  • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF68408243C), ref: 00007FF684085129
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF68408243C), ref: 00007FF68408514B
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF68408243C), ref: 00007FF684085162
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$_errnostrerrorstrtoul
                                  • String ID: Invalid zoneid: %s; %s
                                  • API String ID: 439826447-2159854051
                                  • Opcode ID: 9756b61cddbcdcd4deeea024d3a40c443a7b283f7a550faef10e1ddb4154df75
                                  • Instruction ID: 42c13033f3c2271d459754241a84f7b92baa96f227eff05cffebd8798007974c
                                  • Opcode Fuzzy Hash: 9756b61cddbcdcd4deeea024d3a40c443a7b283f7a550faef10e1ddb4154df75
                                  • Instruction Fuzzy Hash: BB113022A09A42C2EF50DB65E8C417A63A0FFC9B59F540039DA5D87BA4DE3CD889C700
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF684085004
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF68408501A
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF68408502E
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF684085042
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF684085056
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF68408506A
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF68408507E
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF684085092
                                    • Part of subcall function 00007FF6840ACF80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840850AB,?,?,00000000,00007FF684080AF3,?,?,00000000,00007FF684081075), ref: 00007FF6840ACF95
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 5003987b014b47f24ed155500f404a42e8ec8e749dd90c37285b786f354bfd7c
                                  • Instruction ID: 20c75aa70625decf528e323936fdda9307341c973ace8ee5b37620f43dd7e262
                                  • Opcode Fuzzy Hash: 5003987b014b47f24ed155500f404a42e8ec8e749dd90c37285b786f354bfd7c
                                  • Instruction Fuzzy Hash: 4911543A908E81C1D740DF61E9D40E923E4FBC9BAAB180136DE4E8E669DF7490A5C610
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EAE1
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EAF1
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EAFF
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EB0D
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EB1B
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EB29
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EB37
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840822D6,?,?,?,00007FF684080FEC), ref: 00007FF68407EB45
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: e883815722c5bbc57823aa3e768bf2f5cd21de75d423c11894fd6dfea7572e31
                                  • Instruction ID: 4445f4c3603a538bc6639cbc9530df72239e5f3f8ff80b83f5ecccf7ba653329
                                  • Opcode Fuzzy Hash: e883815722c5bbc57823aa3e768bf2f5cd21de75d423c11894fd6dfea7572e31
                                  • Instruction Fuzzy Hash: 7201493A908A51C2D7449F61E5D812973E8FB88FAAB10112ACE4E86629CF78D4A9C640
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF684079D59), ref: 00007FF68407A24D
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF684079D59), ref: 00007FF68407A257
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF684079D59), ref: 00007FF68407A261
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF684079D59), ref: 00007FF68407A26B
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF684079D59), ref: 00007FF68407A275
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF684079D59), ref: 00007FF68407A27F
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF684079D59), ref: 00007FF68407A289
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF684079D59), ref: 00007FF68407A293
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 122ba8865d073139b219c9cbe59c17a0b87aa5a145bf6f966e267ae82bce3926
                                  • Instruction ID: 0f44bd2b6f969ed9394dd7383b054a14371bd02941910544c6c76a12842950f4
                                  • Opcode Fuzzy Hash: 122ba8865d073139b219c9cbe59c17a0b87aa5a145bf6f966e267ae82bce3926
                                  • Instruction Fuzzy Hash: D4F0E42AA14951C2D754DFA2E8D802923B0FF8CF66B141036CD0E8A235CE78D8E9C640
                                  APIs
                                  • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E1F8
                                  • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E20E
                                  • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E229
                                  • ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z.MSVCP140 ref: 00007FF68406E2DC
                                  • ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E2F0
                                  • ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z.MSVCP140 ref: 00007FF68406E302
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: D@std@@@std@@U?$char_traits@$D00@$?eback@?$basic_streambuf@?epptr@?$basic_streambuf@?gptr@?$basic_streambuf@?pptr@?$basic_streambuf@?setg@?$basic_streambuf@?setp@?$basic_streambuf@
                                  • String ID:
                                  • API String ID: 2849800682-0
                                  • Opcode ID: 8fe1b38005505addbf593d4c580ddc8b5a908bec17e285d33585f04ce8b251ee
                                  • Instruction ID: 673ceaad2d515fcc2b5f30dbd73b396af527b394336f082a9d8ebddd9a4c405c
                                  • Opcode Fuzzy Hash: 8fe1b38005505addbf593d4c580ddc8b5a908bec17e285d33585f04ce8b251ee
                                  • Instruction Fuzzy Hash: 42418132A0A752C6EFAA4F3A958933B7691BF04B94F144138CF5F82794DF3CA482C640
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$memcpy
                                  • String ID: 1.1
                                  • API String ID: 4107583993-2150719395
                                  • Opcode ID: e8dd6914026635c5d2ef617e904371cdeee4448ba79735c15029e630777cf029
                                  • Instruction ID: 8fae995380bf8b20f5ff7bfa43be1c8578fdc55c2faa194c3ceadcf636f3643e
                                  • Opcode Fuzzy Hash: e8dd6914026635c5d2ef617e904371cdeee4448ba79735c15029e630777cf029
                                  • Instruction Fuzzy Hash: D7515B72608B85C6D6A48F26E9803AB77A4FB49B84F148039DF9E87755DF3DE0A5C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 1775671525-0
                                  • Opcode ID: bba463771a00061b01fdc418636a7e0c1e9d679ed3ff795c268c3de7682a9f49
                                  • Instruction ID: c5ed2adf7311e4f93482496662e66a8d76b02244fe95bfd2dd4202ac7527138a
                                  • Opcode Fuzzy Hash: bba463771a00061b01fdc418636a7e0c1e9d679ed3ff795c268c3de7682a9f49
                                  • Instruction Fuzzy Hash: 3541C162B08646C1EA309B12A58436FA351BF14BD8F444639DF9E8BBC6DF3CE140D315
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ConditionMask$InfoVerifyVersion
                                  • String ID:
                                  • API String ID: 2793162063-0
                                  • Opcode ID: 8f408ca3503e87afcc84a6c6398a3bc1b5520e4c765e81d1078e0296109e99a6
                                  • Instruction ID: 17854acc376bf55dbc128a1f117bad6fb12ee305ebe0ee8c134779bd707077af
                                  • Opcode Fuzzy Hash: 8f408ca3503e87afcc84a6c6398a3bc1b5520e4c765e81d1078e0296109e99a6
                                  • Instruction Fuzzy Hash: C041B033E5CA92C6E6708B11A9647BBA7A0FFE5300F05523DE9C942A55DE3DE581EB00
                                  APIs
                                  • ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z.MSVCP140 ref: 00007FF68404B1BA
                                  • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF68404B1D7
                                  • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF68404B200
                                  • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF68404B24B
                                    • Part of subcall function 00007FF68404BE00: ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BE2D
                                    • Part of subcall function 00007FF68404BE00: ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BE47
                                    • Part of subcall function 00007FF68404BE00: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BE79
                                    • Part of subcall function 00007FF68404BE00: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BEA4
                                    • Part of subcall function 00007FF68404BE00: std::_Facet_Register.LIBCPMT ref: 00007FF68404BEBD
                                    • Part of subcall function 00007FF68404BE00: ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF68404B25A), ref: 00007FF68404BEDC
                                  • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF68404B260
                                  • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF68404B277
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: D@std@@@std@@U?$char_traits@$Init@?$basic_streambuf@Lockit@std@@$??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@Bid@locale@std@@Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU_iobuf@@V42@@Vfacet@locale@2@Vlocale@2@_get_stream_buffer_pointersstd::_
                                  • String ID:
                                  • API String ID: 3911317180-0
                                  • Opcode ID: 6d11de9bccbcca062ff2073877efb767d97b081e9a1167cba498922b59b8f0c4
                                  • Instruction ID: 1a954e272c88faa21d933a1286ebb89b155f27b9a2c6692eed945ba46384b9fa
                                  • Opcode Fuzzy Hash: 6d11de9bccbcca062ff2073877efb767d97b081e9a1167cba498922b59b8f0c4
                                  • Instruction Fuzzy Hash: CF315732A19B46C2EB609F25A98466A73A4FF98FC8F040039DA8E87B58DF3CD054C740
                                  APIs
                                  • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E376
                                  • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E38C
                                  • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E3A7
                                  • ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z.MSVCP140 ref: 00007FF68406E3F7
                                  • ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF68406E40B
                                  • ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z.MSVCP140 ref: 00007FF68406E41D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: D@std@@@std@@U?$char_traits@$D00@$?eback@?$basic_streambuf@?epptr@?$basic_streambuf@?gptr@?$basic_streambuf@?pptr@?$basic_streambuf@?setg@?$basic_streambuf@?setp@?$basic_streambuf@
                                  • String ID:
                                  • API String ID: 2849800682-0
                                  • Opcode ID: eb5163eb5fd1b2dd38a8edd1230076511407c43b0b8afc35f401cdfc8d185aae
                                  • Instruction ID: fe8e0b50e4a11d0e89f82130b2b0134215135d47c3ebe6eaa605f3af9f243502
                                  • Opcode Fuzzy Hash: eb5163eb5fd1b2dd38a8edd1230076511407c43b0b8afc35f401cdfc8d185aae
                                  • Instruction Fuzzy Hash: 90315021A09B51C5EA559F26AA8837B6690BF48FE4F08053CDF5E87B90DF7CE4D2C640
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                  • String ID:
                                  • API String ID: 469868127-0
                                  • Opcode ID: 9d77cf97d3dd94289c113b3f5874c1fe4c36f853213a7426328a02fcde803e66
                                  • Instruction ID: e006aa801cb259c0109ea48b42035e65fa3a04bac75be818dccc1c43a19816c0
                                  • Opcode Fuzzy Hash: 9d77cf97d3dd94289c113b3f5874c1fe4c36f853213a7426328a02fcde803e66
                                  • Instruction Fuzzy Hash: 3821E526A08B41C6E6209F52E58426A6370FF89B90F044139DF8E83B52DF7AE4A5C701
                                  APIs
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000010), ref: 00007FF68406B084
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000010), ref: 00007FF68406B0D3
                                    • Part of subcall function 00007FF68404CE90: memcpy.VCRUNTIME140(?,?,?,?,?,?,00007FF68404ACF8), ref: 00007FF68404CF84
                                    • Part of subcall function 00007FF68404CE90: memcpy.VCRUNTIME140(?,?,?,?,?,?,00007FF68404ACF8), ref: 00007FF68404CF92
                                    • Part of subcall function 00007FF68404CE90: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00007FF68404ACF8), ref: 00007FF68404CFCB
                                    • Part of subcall function 00007FF68404CE90: memcpy.VCRUNTIME140(?,?,?,?,?,?,00007FF68404ACF8), ref: 00007FF68404CFD5
                                    • Part of subcall function 00007FF68404CE90: memcpy.VCRUNTIME140(?,?,?,?,?,?,00007FF68404ACF8), ref: 00007FF68404CFE3
                                    • Part of subcall function 00007FF68404CE90: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68404D018
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000010), ref: 00007FF68406B112
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000010), ref: 00007FF68406B161
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_task
                                  • String ID: [json.exception.
                                  • API String ID: 73660495-791563284
                                  • Opcode ID: 50a169a9b886d07dbfc40a9b8f693939edf98e1ee38dbadfe7e7240148894614
                                  • Instruction ID: 44e8d5d033ccbf4d8ba2b8c14d3884ac31f1ca058f21f494f9f5aae77dca31d7
                                  • Opcode Fuzzy Hash: 50a169a9b886d07dbfc40a9b8f693939edf98e1ee38dbadfe7e7240148894614
                                  • Instruction Fuzzy Hash: 29817F62B18B46C5FB00CB64D4843AE2331FF957A8F504639DA6D96BD9DF7CE185C240
                                  APIs
                                  • __std_fs_code_page.MSVCPRT ref: 00007FF6840435EF
                                    • Part of subcall function 00007FF6840BDBC0: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,00007FF6840435F4), ref: 00007FF6840BDBC4
                                    • Part of subcall function 00007FF6840BDBC0: AreFileApisANSI.KERNEL32(?,?,?,?,00007FF6840435F4), ref: 00007FF6840BDBD3
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684043769
                                    • Part of subcall function 00007FF68404CB90: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00000000,?,?,?,00007FF684049045), ref: 00007FF68404CC6F
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840437B7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$ApisFile___lc_codepage_func__std_fs_code_pagememcpy
                                  • String ID: ", "$: "
                                  • API String ID: 2077005984-747220369
                                  • Opcode ID: c27543c3e5653693d9eb150a5c4ab83a7efb3fda78952b32471401d245e52635
                                  • Instruction ID: 58956f22aa0f8a9958825f5884232952f59863bf2e3b1bb98d9ce13919bdd803
                                  • Opcode Fuzzy Hash: c27543c3e5653693d9eb150a5c4ab83a7efb3fda78952b32471401d245e52635
                                  • Instruction Fuzzy Hash: 2A616762B14B418AEB20DF65E4807AE2371FB58B9CF00953ADE5D97B89DE38D055C384
                                  APIs
                                    • Part of subcall function 00007FF6840963E0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF684079D59), ref: 00007FF684096401
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF684078E01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _errno_strdup
                                  • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                  • API String ID: 2151398962-2292467869
                                  • Opcode ID: 32ee72b3bad2a6ab19b4697144a170ca4b94b334b729e1da7f01ca7a978cd6c7
                                  • Instruction ID: c8301d144708e6f915b52bc1dc6b9f7eb979049659ffe06742308f1173cfc4fb
                                  • Opcode Fuzzy Hash: 32ee72b3bad2a6ab19b4697144a170ca4b94b334b729e1da7f01ca7a978cd6c7
                                  • Instruction Fuzzy Hash: 5F615F62A0D786C5FB718B2194C43BB67B1BF44794F08003ADB8D86691DF2DE844E312
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$freemalloc
                                  • String ID:
                                  • API String ID: 3313557100-0
                                  • Opcode ID: 91e7a434831de679f0de08126bbf2b097460883ab83f5ca03a87c3906e6f2e2c
                                  • Instruction ID: f2ae52f4798dbfb64efc3aec9fd6b1cbe487f4fb70471870d5694a4833e8b201
                                  • Opcode Fuzzy Hash: 91e7a434831de679f0de08126bbf2b097460883ab83f5ca03a87c3906e6f2e2c
                                  • Instruction Fuzzy Hash: 7661FC13E18BC5C6E7119B35D9412F96320FBA9788F41A325EE8D56A5BEF68E2D4C300
                                  APIs
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684044112
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684044153
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn
                                  • String ID: at line $, column $>
                                  • API String ID: 3668304517-1466611262
                                  • Opcode ID: 00882d304056da878f86d5817e14e2589f32648ab85675b3a87b9845aecc3a4c
                                  • Instruction ID: c3c333c049829b549b6e98d7583f69a2dfdec976764fefe01f43b8a05589d2b5
                                  • Opcode Fuzzy Hash: 00882d304056da878f86d5817e14e2589f32648ab85675b3a87b9845aecc3a4c
                                  • Instruction Fuzzy Hash: 6A51C472A18B85C2EA20DB25E0803AEB761FB99BD4F404236DB9D47B99DF3CD145CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdupfree
                                  • String ID: Forcing HTTP/1.1 for NTLM$The requested URL returned error: %d
                                  • API String ID: 1865132094-1204028548
                                  • Opcode ID: 29d0968c2b84b10ca83d8a6f300e2813c472982773e8d41990bc2775817a843d
                                  • Instruction ID: aaaf7439576cf1f6908879ea921c243b8ff7b00d397ad075ac174b75f4630b07
                                  • Opcode Fuzzy Hash: 29d0968c2b84b10ca83d8a6f300e2813c472982773e8d41990bc2775817a843d
                                  • Instruction Fuzzy Hash: 7C518532A0C682C1FB648B2495D03BB2B91FF45794F68413DDA4DCBA96EF2EE950C711
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdupfree
                                  • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                  • API String ID: 1865132094-195851662
                                  • Opcode ID: de18f5c6648f63eb59fa09185a57bbec85e0afbe45011833a6c5bab62526b43f
                                  • Instruction ID: 6a7ec5cfc78f3e41ce3c2b98a962c3f1d37da5706849d2df28d9c9f8c3a3c4f6
                                  • Opcode Fuzzy Hash: de18f5c6648f63eb59fa09185a57bbec85e0afbe45011833a6c5bab62526b43f
                                  • Instruction Fuzzy Hash: 5341C522B49A86C1EB55DB25E9903AE27A0FF84B88F485035EB4DC7796CF7CD490C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID: Resolving timed out after %I64d milliseconds
                                  • API String ID: 1294909896-3343404259
                                  • Opcode ID: d474b412fa9f6bc6b68beee52d9ac1ea6dcd8c6f932fb5a16a01f9dd1a97b0db
                                  • Instruction ID: b0f5b8342a422d17666a5565ae25d061aa834ea0ce296ca484e1500d6d466ef5
                                  • Opcode Fuzzy Hash: d474b412fa9f6bc6b68beee52d9ac1ea6dcd8c6f932fb5a16a01f9dd1a97b0db
                                  • Instruction Fuzzy Hash: A4D19F61A0D686C5FB249F6994803BE23B1FF44B8CF04553ACE0E9769ADF3AE541C352
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memset$_invalid_parameter_noinfo_noreturnlocaleconvmalloc
                                  • String ID:
                                  • API String ID: 4120556116-0
                                  • Opcode ID: aca268ce0600bd6c87c05b4e6e99bd65ef1b8c08c786ea833555ed0de7ed6575
                                  • Instruction ID: fb0184b26d8f4f9ca8fa89c588b4b001597912e11a870938dd873a866c898577
                                  • Opcode Fuzzy Hash: aca268ce0600bd6c87c05b4e6e99bd65ef1b8c08c786ea833555ed0de7ed6575
                                  • Instruction Fuzzy Hash: 66818E33A04B8186E720DF25D8903AE77A0FB98B98F188639DA8D87755DF3CD485C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: callocfreememset
                                  • String ID: CONNECT phase completed!$allocate connect buffer!
                                  • API String ID: 3505321882-591125384
                                  • Opcode ID: 5df088f42047ef61d671fa01b3da81d69a118745e8c236a2928cb02cd7f18850
                                  • Instruction ID: 51facced75924793de34d5bdc5846cfeaec8dac94ac4c958ce14decb38f5ed93
                                  • Opcode Fuzzy Hash: 5df088f42047ef61d671fa01b3da81d69a118745e8c236a2928cb02cd7f18850
                                  • Instruction Fuzzy Hash: E4519232A08BC2C6EB589B25DA883BA7390FF84748F045039CF5C87A91CF79E5A5C704
                                  APIs
                                  • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6840488FB
                                  • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF68404891A
                                  • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF68404894C
                                  • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF684048967
                                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6840489B6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@?setstate@?$basic_ios@D@std@@@1@_Init@?$basic_streambuf@V?$basic_streambuf@
                                  • String ID:
                                  • API String ID: 1184074665-0
                                  • Opcode ID: 36efe0cf8498bdce60566f789f773af8637e017f9e3e2cacbbd19cf0e6178b84
                                  • Instruction ID: b9eef3a6b686d8c81c5a29a7bb240d7e3c5900534074ca0517293cfd166a977e
                                  • Opcode Fuzzy Hash: 36efe0cf8498bdce60566f789f773af8637e017f9e3e2cacbbd19cf0e6178b84
                                  • Instruction Fuzzy Hash: F9313A72A05B81C5EB10DF25EA9472A77A1FB45B89F048139CA4D83B24CF3DD56AC740
                                  APIs
                                  • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF68404A0AF
                                  • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF68404A0CE
                                  • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF68404A100
                                  • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF68404A11B
                                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF68404A168
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?setstate@?$basic_ios@D@std@@@1@_Init@?$basic_streambuf@V?$basic_streambuf@
                                  • String ID:
                                  • API String ID: 1830095303-0
                                  • Opcode ID: 66a719390e75bdd5aafbe7d01f3baa3d29bfbf40bed87e6b0437d88fcaa2e848
                                  • Instruction ID: 4e5844f34ae4dbaf3d6de22697d3cf17621fa4798173555f684c3ea82cd0b542
                                  • Opcode Fuzzy Hash: 66a719390e75bdd5aafbe7d01f3baa3d29bfbf40bed87e6b0437d88fcaa2e848
                                  • Instruction Fuzzy Hash: 64316D32B09B81C5EB109F29E99476A77A0FF89B99F048039CA4D83B64DF3CD055C750
                                  APIs
                                  • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF68404A0AF
                                  • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF68404A0CE
                                  • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF68404A100
                                  • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF68404A11B
                                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF68404A168
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?setstate@?$basic_ios@D@std@@@1@_Init@?$basic_streambuf@V?$basic_streambuf@
                                  • String ID:
                                  • API String ID: 1830095303-0
                                  • Opcode ID: da6b95756efa0e59ce8e1a150cf64de23a0fc9648f3a8dedb06ee2e264fe522f
                                  • Instruction ID: 22fbcf1e04551d18c1cf76862f6fbc263af38df6f2accc73a77331f2af36321c
                                  • Opcode Fuzzy Hash: da6b95756efa0e59ce8e1a150cf64de23a0fc9648f3a8dedb06ee2e264fe522f
                                  • Instruction Fuzzy Hash: C5315932B05B81C9EB209F29E99476A77A0FF89B99F048039CA4D83B64DF3CD059C750
                                  APIs
                                    • Part of subcall function 00007FF6840571F0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840572BE
                                    • Part of subcall function 00007FF6840571F0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405730D
                                    • Part of subcall function 00007FF6840571F0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68405734C
                                  • _CxxThrowException.VCRUNTIME140 ref: 00007FF684055E2C
                                    • Part of subcall function 00007FF68404C040: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404C10E
                                    • Part of subcall function 00007FF68404C040: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404C15D
                                    • Part of subcall function 00007FF68404C040: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68404C19C
                                  • _CxxThrowException.VCRUNTIME140 ref: 00007FF684055E6D
                                    • Part of subcall function 00007FF6840571F0: __std_exception_copy.VCRUNTIME140 ref: 00007FF684057398
                                    • Part of subcall function 00007FF6840571F0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840573E5
                                  • _CxxThrowException.VCRUNTIME140 ref: 00007FF684055EA5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$ExceptionThrow$__std_exception_copy
                                  • String ID: iterator does not fit current value$iterator out of range
                                  • API String ID: 3586130244-1046077056
                                  • Opcode ID: a256f99d3c86dbaec2a8df62834edc97bd27fc1d66b5a4d5107c364ebdf20331
                                  • Instruction ID: 8bdb5244ec1e0cb358cc6073fe65c6af93020f5765bb97e68ac957c1c0dbc362
                                  • Opcode Fuzzy Hash: a256f99d3c86dbaec2a8df62834edc97bd27fc1d66b5a4d5107c364ebdf20331
                                  • Instruction Fuzzy Hash: D721622254DA8293E710DB64D4901FFA761FF95348F94813AD78D83566DE2DDA0ACB04
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$calloc$memcpy
                                  • String ID:
                                  • API String ID: 3478730034-0
                                  • Opcode ID: e9c57da48b3bdcd8d7ccb71cf866c7ca6fbbd9c6e089ec251f1c606e016a0428
                                  • Instruction ID: 80b6ed633208fecc46ce686412621f55bcc164bea5e7227238b56351107aa250
                                  • Opcode Fuzzy Hash: e9c57da48b3bdcd8d7ccb71cf866c7ca6fbbd9c6e089ec251f1c606e016a0428
                                  • Instruction Fuzzy Hash: CA218E62E08B82C6E714CF25949023B6AA0FF48BE0F544239DE9E9B79ADF7DD451C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                  • String ID:
                                  • API String ID: 469868127-0
                                  • Opcode ID: 1da22c7366462aba51bca6a144647d043b9fd18cdd1de1f2463061639beb365e
                                  • Instruction ID: dd3322fa49f468d2a112c463c55b72c5adc0d2d5f4d92487962ffff1d5ee145e
                                  • Opcode Fuzzy Hash: 1da22c7366462aba51bca6a144647d043b9fd18cdd1de1f2463061639beb365e
                                  • Instruction Fuzzy Hash: 8511E336A09B41D6E6209F52E18022AB770FF89B90F144139DF8E83B55DF7AE4A5CB11
                                  APIs
                                  Strings
                                  • ** Resuming transfer from byte position %I64d, xrefs: 00007FF684094458
                                  • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 00007FF68409446B
                                  • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 00007FF6840946B5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: fflush
                                  • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                                  • API String ID: 497872470-664487449
                                  • Opcode ID: 546769f59e4992199159a10680f9d4ef048ef89c0d5b739e9b99cb3db6efc00f
                                  • Instruction ID: d8c79f4b0df347cb4244302c4267b8eb7d98dde8b7047de07808a0ca8a050a90
                                  • Opcode Fuzzy Hash: 546769f59e4992199159a10680f9d4ef048ef89c0d5b739e9b99cb3db6efc00f
                                  • Instruction Fuzzy Hash: 3591B02261AB86C5DA60DB15E584BABB764FB84BC4F82103ADE5D8BB95FF3DD001D700
                                  APIs
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406217C
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6840621CB
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF68406223E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn
                                  • String ID: ange
                                  • API String ID: 3668304517-4159947239
                                  • Opcode ID: 5a821b9034ccd780b6e65f0daaa75ae135f764b8c14232be609300797b9fd468
                                  • Instruction ID: 639ec88153f7b539cfb8bd0450edac24387625ce1730d68545f1b78226fba04b
                                  • Opcode Fuzzy Hash: 5a821b9034ccd780b6e65f0daaa75ae135f764b8c14232be609300797b9fd468
                                  • Instruction Fuzzy Hash: B3517C62E18B46C5FB00DF69D4803AE2361FF99798F009639EB6D56AD9DE6CE0D4C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: fwrite
                                  • String ID: ...$...
                                  • API String ID: 3559309478-2253869979
                                  • Opcode ID: e6a949566048ff31d7bbba707800bc1fbc69c524edc41005eb075d9e3c42d6ed
                                  • Instruction ID: 2d96eb9d67e17962a58574c3014b51b28f86e51d9fb69faa43c2956352b2219c
                                  • Opcode Fuzzy Hash: e6a949566048ff31d7bbba707800bc1fbc69c524edc41005eb075d9e3c42d6ed
                                  • Instruction Fuzzy Hash: 3C31D521A1CA81D1EB64DB21D5947FAA3A1FF84B80F808239CA9D837D4CF3DD559C781
                                  APIs
                                  • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840927A9), ref: 00007FF684092DFD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: realloc
                                  • String ID: Failed to alloc memory for big header!$Rejected %zu bytes header (max is %d)!
                                  • API String ID: 471065373-1365219457
                                  • Opcode ID: b1927de0a4823707454b68872d7ef51465a834518fa426e036663695675c6494
                                  • Instruction ID: 766d9bb9b83a3063268b7a5554648f6521465d832e6715698e55e3c5f17074be
                                  • Opcode Fuzzy Hash: b1927de0a4823707454b68872d7ef51465a834518fa426e036663695675c6494
                                  • Instruction Fuzzy Hash: 57212C32B19A85C6DB04DB15E5802AEA761FB49FC4F44403AEB9D47B59CF3CD4A2C744
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$_strdup
                                  • String ID: :
                                  • API String ID: 2653869212-336475711
                                  • Opcode ID: 03b32bf35b58e1952b9fb5c8d94eb12ec4b70198ca38e5ce222575a15a310553
                                  • Instruction ID: b111bc9aec558293365b2a1211393d299f65bf0ea4a5ff20438539741f2d6144
                                  • Opcode Fuzzy Hash: 03b32bf35b58e1952b9fb5c8d94eb12ec4b70198ca38e5ce222575a15a310553
                                  • Instruction Fuzzy Hash: E3217C2270DB86C5EB659F14A5803AA73B0BF44BA4F484239CA9D86399EF3DD494C750
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$_strdup
                                  • String ID: :
                                  • API String ID: 2653869212-336475711
                                  • Opcode ID: 39daee4d1075e9e8954fd0d72e8de271ad016377caa0a5609e8f389a47ecc7fe
                                  • Instruction ID: 362ebfa51ff8a97aadd29c91e97d91d96f71b07f637c2c024cc89b8669911c8c
                                  • Opcode Fuzzy Hash: 39daee4d1075e9e8954fd0d72e8de271ad016377caa0a5609e8f389a47ecc7fe
                                  • Instruction Fuzzy Hash: 46116D22A0DB85C5EB659F14A5803AA73B0BF44BA5F48423ACF9D863D5EF3ED494C710
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: %s%s$LIST "%s" *
                                  • API String ID: 0-1744359683
                                  • Opcode ID: d327a4d32715310628d43346b16bf389924de49833de915ff0ad22a07eac9b47
                                  • Instruction ID: d5710ea62edcfd3dd6a95ec1b73ef8bd867752048847706e80af2bae9ba17fd0
                                  • Opcode Fuzzy Hash: d327a4d32715310628d43346b16bf389924de49833de915ff0ad22a07eac9b47
                                  • Instruction Fuzzy Hash: 71115921E0D682C1EA148F55E4C42BA27A0BF48BC4F48413EEE8E87755DF6DE985C341
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy
                                  • String ID:
                                  • API String ID: 3510742995-0
                                  • Opcode ID: 9b57819bd4982c99ac53aea23cdb682c3689279d1eed93cbe84ec02240c3fa36
                                  • Instruction ID: 0067db664c85609b112f819578c379db3dc27afd92cd92730424bfa4e0e444cf
                                  • Opcode Fuzzy Hash: 9b57819bd4982c99ac53aea23cdb682c3689279d1eed93cbe84ec02240c3fa36
                                  • Instruction Fuzzy Hash: 6E41E322A04B81D2EB109F2AE6442AA6361FB25BD4F154735DFAC97796CF3CE1D0C341
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpymemset
                                  • String ID:
                                  • API String ID: 1297977491-0
                                  • Opcode ID: 4d4ef1a97561200f8a793bdd5abd71fbcd4be22461a2c3be5614d988191f06ca
                                  • Instruction ID: 4d16b1d69f678df79518a622b8785193df4f293a3e6c4c3c1d006bbd30c4dcbc
                                  • Opcode Fuzzy Hash: 4d4ef1a97561200f8a793bdd5abd71fbcd4be22461a2c3be5614d988191f06ca
                                  • Instruction Fuzzy Hash: 80412726B286D1C3EB24CB2881816AE6795FF617C0F458139CB5D8BB86DF3DE51AC300
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840905F5), ref: 00007FF684090218
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840905F5), ref: 00007FF684090221
                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840905F5), ref: 00007FF68409029A
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840905F5), ref: 00007FF6840902AB
                                  • memcpy.VCRUNTIME140(?,?,00000000,00007FF6840905F5), ref: 00007FF6840902D4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$mallocmemcpy
                                  • String ID:
                                  • API String ID: 3401966785-0
                                  • Opcode ID: faf6754aaa2460d381419aa19d295673b7e6b1cc65fae786d9f94e910edb12ac
                                  • Instruction ID: f742f4ebdceca1369a61d833303fdbb7a106768d00aad2a3abeb4ce2c1d040b3
                                  • Opcode Fuzzy Hash: faf6754aaa2460d381419aa19d295673b7e6b1cc65fae786d9f94e910edb12ac
                                  • Instruction Fuzzy Hash: 8E315A32A09B85C1EB589F51E58026A67A0BF49BE4F14423ADE6E877D5EF3DE490C300
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Resolving timed out after %I64d milliseconds
                                  • API String ID: 0-3343404259
                                  • Opcode ID: cbd7e8e3272cff41d466281ff36a6333442e63177f243a0ad45836c1d5c7ce89
                                  • Instruction ID: e7c4883ba886d909771dcf9b417a9730620ca4c6ac7d96e3b6b55928f5dd36d0
                                  • Opcode Fuzzy Hash: cbd7e8e3272cff41d466281ff36a6333442e63177f243a0ad45836c1d5c7ce89
                                  • Instruction Fuzzy Hash: 07B19F71E1D642C5EB249B2994D027E26B1FF45B98F54583ECA0EC7286DE7AF880C342
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy__std_exception_destroy
                                  • String ID:
                                  • API String ID: 2138705365-0
                                  • Opcode ID: 7fe9b36c23d692cfa151b80dabf1faa9589a531f1f66605188228b2883409076
                                  • Instruction ID: 76a90a5c8dc08c0425cf7a2fc199107c7cf21a43d87611e0482ebf7636f9d09e
                                  • Opcode Fuzzy Hash: 7fe9b36c23d692cfa151b80dabf1faa9589a531f1f66605188228b2883409076
                                  • Instruction Fuzzy Hash: 20817AB2B04A81D1EB149F29E48436E6361FF54BC8F54903ADA4D47AA9EF7DD894C380
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: calloc$free
                                  • String ID: chunked
                                  • API String ID: 171065143-1066005980
                                  • Opcode ID: a8eaee4497cbc6ca652fd406c0d2f7b42814a1174c19701cd2bcb36804364914
                                  • Instruction ID: faaa037a8393d6f635ab5d4e65c87f55c161ed854161101c21742006e0e3e5e0
                                  • Opcode Fuzzy Hash: a8eaee4497cbc6ca652fd406c0d2f7b42814a1174c19701cd2bcb36804364914
                                  • Instruction Fuzzy Hash: 0E51D432A49A92C5FB658B129E803BB6791BF54BC4F484039DE5D83789EF3CE456D300
                                  APIs
                                  • memcpy.VCRUNTIME140(?,?,00000000,?,?,?,00007FF684049045), ref: 00007FF68404CAD9
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,?,00007FF684049045), ref: 00007FF68404CB2D
                                  • memcpy.VCRUNTIME140(?,?,00000000,?,?,?,00007FF684049045), ref: 00007FF68404CB37
                                    • Part of subcall function 00007FF6840BE310: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF68404C47E,?,?,?,?,00007FF68404119B), ref: 00007FF6840BE32A
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68404CB84
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                  • String ID:
                                  • API String ID: 1155477157-0
                                  • Opcode ID: e1f1fe3be785b13f71ad7f347590f7a0a98f61f9bf7a51e4dccb99fd98f01535
                                  • Instruction ID: 8b25f24f546f359083e1e5e868bcbc777f492be9f54a21c5f206875afde61dcd
                                  • Opcode Fuzzy Hash: e1f1fe3be785b13f71ad7f347590f7a0a98f61f9bf7a51e4dccb99fd98f01535
                                  • Instruction Fuzzy Hash: B141FE61B08A41D1EA20DB15E08427E62A0BF58BE8F910739DE7D87BD4EE3CE052C301
                                  APIs
                                  • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00007FF684050213,?,?,?,00007FF68404EA9C), ref: 00007FF68405531E
                                  • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00007FF684050213,?,?,?,00007FF68404EA9C), ref: 00007FF68405534C
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF684050213,?,?,?,00007FF68404EA9C), ref: 00007FF6840553B5
                                    • Part of subcall function 00007FF6840BE310: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF68404C47E,?,?,?,?,00007FF68404119B), ref: 00007FF6840BE32A
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6840553C2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                  • String ID:
                                  • API String ID: 2942768764-0
                                  • Opcode ID: a9b606400e0ea1629a13ad569f25f31fc2223cb43e4af202120b53c3fe94b378
                                  • Instruction ID: 3d39232071b8963a394504d7d2ce7ef7ca620c094d645f899bd41729836be9fa
                                  • Opcode Fuzzy Hash: a9b606400e0ea1629a13ad569f25f31fc2223cb43e4af202120b53c3fe94b378
                                  • Instruction Fuzzy Hash: D9419D72B05B86C6EB148F65D08427EA361FF44BA0F958A39DAAD977D8DF6CE051C300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                  • String ID:
                                  • API String ID: 1155477157-0
                                  • Opcode ID: a43a2258c746172ac1796535bba661411df8a48737158f9de7ca4662200e5949
                                  • Instruction ID: d9da12faec190e36e36ab08e01713be82e918b487f2cba46bdac1cd44c43d2de
                                  • Opcode Fuzzy Hash: a43a2258c746172ac1796535bba661411df8a48737158f9de7ca4662200e5949
                                  • Instruction Fuzzy Hash: 0541C066B14A86C5EE04CB26D4842BE6350FF48BE0F444639CA6D97BC6DF2CE191C300
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ed7b6d7da68a1d1e43c304b2689d7fec68aa19245766a7a4a421bd83ab8bc21a
                                  • Instruction ID: f23b94830eaf35a057345cef394aa8d9cf5c491b80aa3fa1d5509762389b9aca
                                  • Opcode Fuzzy Hash: ed7b6d7da68a1d1e43c304b2689d7fec68aa19245766a7a4a421bd83ab8bc21a
                                  • Instruction Fuzzy Hash: EB513E37608A81C6DB648F29E49036E77A1FF94BD8F54463ADA9D877A8DF38D444C700
                                  APIs
                                  • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,00000000,?,00007FF684050213,?,?,?,00007FF68404EA9C,?,?,?,?,?,00007FF684050A57), ref: 00007FF6840551B3
                                  • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,00000000,?,00007FF684050213,?,?,?,00007FF68404EA9C,?,?,?,?,?,00007FF684050A57), ref: 00007FF6840551C6
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,00000000,?,00007FF684050213,?,?,?,00007FF68404EA9C,?,?,?,?,?,00007FF684050A57), ref: 00007FF68405522C
                                    • Part of subcall function 00007FF6840BE310: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF68404C47E,?,?,?,?,00007FF68404119B), ref: 00007FF6840BE32A
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF684055239
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                  • String ID:
                                  • API String ID: 1155477157-0
                                  • Opcode ID: 58acd8f46fa08c665f0531892ae20c5cfeac97a1f67f207f38a682d4cf6ad5ea
                                  • Instruction ID: 88adbd794b777ac63a87c05c282a7b05cce8935ce0d2651a8cb84e8feb681b08
                                  • Opcode Fuzzy Hash: 58acd8f46fa08c665f0531892ae20c5cfeac97a1f67f207f38a682d4cf6ad5ea
                                  • Instruction Fuzzy Hash: A5410122709B85C5EA24DF66E4842BAA760FF45BD0F144A39DBAD97BD5DE3CE040C300
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF68409CC90,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF6840B95F3
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6840B967C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID: %s
                                  • API String ID: 1294909896-3043279178
                                  • Opcode ID: 2903f218c8b265c425e9c652228ce8d6f59ced1a85f5e80c9bab286c59e96dfc
                                  • Instruction ID: 9f222f0922c99004e311b207c79a054c8f08283bab233c2a8bf7bdcd515288e1
                                  • Opcode Fuzzy Hash: 2903f218c8b265c425e9c652228ce8d6f59ced1a85f5e80c9bab286c59e96dfc
                                  • Instruction Fuzzy Hash: 5D417432A18B85C2EA51DB65B58016BB3A0FF45B94F144139DF8D87BA1DF3CE091C304
                                  APIs
                                  • memcpy.VCRUNTIME140(?,?,?,00000000,?,00007FF684049080), ref: 00007FF68404C34B
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FF684049080), ref: 00007FF68404C37F
                                  • memcpy.VCRUNTIME140(?,?,?,00000000,?,00007FF684049080), ref: 00007FF68404C389
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68404C3B2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 1775671525-0
                                  • Opcode ID: f2299fbde33537dfc263cdf526cb1c84cda6cd61a8f1022f3c2ff0890eb02e87
                                  • Instruction ID: 48b85bfe347bc6e7ab9ddace8f04427c88b30dde1db327b04a164e024b38e532
                                  • Opcode Fuzzy Hash: f2299fbde33537dfc263cdf526cb1c84cda6cd61a8f1022f3c2ff0890eb02e87
                                  • Instruction Fuzzy Hash: EF31D271B0D742C1EE309B12A5842AEA392FF18BE5F484639DE5D8BBD5DE7CE141C205
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy
                                  • String ID:
                                  • API String ID: 3510742995-0
                                  • Opcode ID: 07fa50e3be99eb7fe95ea155dc8bf215f98a5944493ade8d73604e6a89d6997e
                                  • Instruction ID: bc5e038434e626b333bee733a1232bbb63d8062d098fd827e4ebefed771aabb5
                                  • Opcode Fuzzy Hash: 07fa50e3be99eb7fe95ea155dc8bf215f98a5944493ade8d73604e6a89d6997e
                                  • Instruction Fuzzy Hash: B531D222B09782C5FA269B25A58437E2250EF10BF5F250638CE6C67BD1EE3864C3D340
                                  APIs
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,7FFFFFFFFFFFFFFF), ref: 00007FF68405FB46
                                    • Part of subcall function 00007FF6840BE310: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF68404C47E,?,?,?,?,00007FF68404119B), ref: 00007FF6840BE32A
                                  • memcpy.VCRUNTIME140(?,?,?,7FFFFFFFFFFFFFFF), ref: 00007FF68405FB73
                                  • memcpy.VCRUNTIME140(?,?,?,7FFFFFFFFFFFFFFF), ref: 00007FF68405FB82
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68405FBA3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                  • String ID:
                                  • API String ID: 1155477157-0
                                  • Opcode ID: dc625c4bf227a810765d776d1fd9bbe7f2b11b1ce597af149af722d38ff5c26d
                                  • Instruction ID: 79bf0935cb4755e6f063906b61f86a8b8284c950b742dab41fc1d9d798d3d3a7
                                  • Opcode Fuzzy Hash: dc625c4bf227a810765d776d1fd9bbe7f2b11b1ce597af149af722d38ff5c26d
                                  • Instruction Fuzzy Hash: 5E218422A05A85C0EE25DB12A9942AAA255FF44BF4F194B39DE7D97BD5DE3CD081C300
                                  APIs
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF68405B0FB), ref: 00007FF6840616AE
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6840616CA
                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF684061717
                                    • Part of subcall function 00007FF6840BE310: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF68404C47E,?,?,?,?,00007FF68404119B), ref: 00007FF6840BE32A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmalloc
                                  • String ID:
                                  • API String ID: 4234954712-0
                                  • Opcode ID: 0b04c2f650ea99c06479401e37785c68164c9641ce9b22fe6e1f6520c65b6db3
                                  • Instruction ID: bd2a86bb73af2b83fc539f3e1d8e672297637051288dda7e117ab83a80f3ebcd
                                  • Opcode Fuzzy Hash: 0b04c2f650ea99c06479401e37785c68164c9641ce9b22fe6e1f6520c65b6db3
                                  • Instruction Fuzzy Hash: 3631E166E0A742C1EE28936184C623E22A1BF557B1F940B3DD37E4A7D0EE6C9591C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: memcpy$Concurrency::cancel_current_task
                                  • String ID:
                                  • API String ID: 326894585-0
                                  • Opcode ID: 5f2df91895d34574547742d8ad66c826e47f3838bc8a57f0ba28a8925784d77d
                                  • Instruction ID: beeebee2cd98f268e4cd630d85b311b41ab8617ec924eff8ed48ae77876f3668
                                  • Opcode Fuzzy Hash: 5f2df91895d34574547742d8ad66c826e47f3838bc8a57f0ba28a8925784d77d
                                  • Instruction Fuzzy Hash: 9B210B22B0E756C5FA359B51A68437A2240BF54BE8F550B38DE6D47BCADF3CA491C301
                                  APIs
                                  • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF684073DF8), ref: 00007FF684073F45
                                  • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF684073DF8), ref: 00007FF684073F5F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: strncmp
                                  • String ID: I32$I64
                                  • API String ID: 1114863663-3980630743
                                  • Opcode ID: 690dfba8f5c3aa5ef38dbafbb669d497a95976d88d1ad140b47f3d28d9d7ee22
                                  • Instruction ID: d9e057b2799fa9cfa5accbd255d87446b0263e3ecb87175020c5573d234f4b1e
                                  • Opcode Fuzzy Hash: 690dfba8f5c3aa5ef38dbafbb669d497a95976d88d1ad140b47f3d28d9d7ee22
                                  • Instruction Fuzzy Hash: F721D532E0C563C5EB215B60D4D03BA7BF8BF55F88F0A8139CA4AC6285DE2DE604C752
                                  APIs
                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840B27C9,00000000,?,?,00007FF6840B1D86), ref: 00007FF6840B1A89
                                  • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840B27C9,00000000,?,?,00007FF6840B1D86), ref: 00007FF6840B1AC0
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6840B27C9,00000000,?,?,00007FF6840B1D86), ref: 00007FF6840B1AD2
                                  • memcpy.VCRUNTIME140(?,?,?,00007FF6840B27C9,00000000,?,?,00007FF6840B1D86), ref: 00007FF6840B1AFA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: freemallocmemcpyrealloc
                                  • String ID:
                                  • API String ID: 3881842442-0
                                  • Opcode ID: 4e31179edb012fc3068fe3a1aa07e365098b9f57db527d239cde6aa1a290680b
                                  • Instruction ID: 44eb48f8aef2b56eeecf61fb08ab09d5bef7e6b5bfb761477e5f06b21fa6017b
                                  • Opcode Fuzzy Hash: 4e31179edb012fc3068fe3a1aa07e365098b9f57db527d239cde6aa1a290680b
                                  • Instruction Fuzzy Hash: E8214D26A1AB81C2DB44CF56E49022A63A0FB48FC8B488135EE5E87759DF3CD592C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ByteCharErrorLastMultiWide
                                  • String ID:
                                  • API String ID: 203985260-0
                                  • Opcode ID: af8163f06192995d998680606efb5d7c8a04c53febd0cfa1b9df8af7b8dd437e
                                  • Instruction ID: dba9f9429d99d8d533e9e56b22895f5e7a7ff7640e756cfe464bc49ebbc57366
                                  • Opcode Fuzzy Hash: af8163f06192995d998680606efb5d7c8a04c53febd0cfa1b9df8af7b8dd437e
                                  • Instruction Fuzzy Hash: 0221E876A18B95C7E3108F21A48432EBAB4FB99F94F140139DB8997B58DF38D445CB44
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID: Proxy-Connection: Keep-Alive
                                  • API String ID: 1294909896-2835282938
                                  • Opcode ID: cc35ecba79e70a9bc6cb3ea24a3edfdf6970ce08f53f74da24f7ef8e875cc6ed
                                  • Instruction ID: 8bf5ea2ed33429eaf205ab7bf4e6a8a3444bf8fc3454a02f767c373803a4b0fe
                                  • Opcode Fuzzy Hash: cc35ecba79e70a9bc6cb3ea24a3edfdf6970ce08f53f74da24f7ef8e875cc6ed
                                  • Instruction Fuzzy Hash: ED01C422F04641C2FB159B55F4803AA6690AF88BF1F044238DE6D8B3D0EF7C98D5C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: strncmp
                                  • String ID: I32$I64
                                  • API String ID: 1114863663-3980630743
                                  • Opcode ID: 1a23a1c8f3207d80e665eb28a0440c9501873568427f8f909d50fa7ef9c5ee02
                                  • Instruction ID: 5c85ed4dd45a4d44b65cd7f69754a32bfc46b4815d56e1b3b709c38ddb2a4844
                                  • Opcode Fuzzy Hash: 1a23a1c8f3207d80e665eb28a0440c9501873568427f8f909d50fa7ef9c5ee02
                                  • Instruction Fuzzy Hash: D3F08235B1C953C1FB154B21A8D477627B87F55BC4F0A513EC95ACA694CE2DE200D322
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: strncmp
                                  • String ID: I32$I64
                                  • API String ID: 1114863663-3980630743
                                  • Opcode ID: becde2ecbcb4abba6d902d87fc19e3fabf59d894aa72799254ccc749e9a7db61
                                  • Instruction ID: fcde83cb627b4c5f34b9cb15d08686287456dc8bdb97c2454e4b12a29d798003
                                  • Opcode Fuzzy Hash: becde2ecbcb4abba6d902d87fc19e3fabf59d894aa72799254ccc749e9a7db61
                                  • Instruction Fuzzy Hash: 85F08225B1C953C1FB154B21A8D477727B8BF55BC4F0A513EC95ACA694CE2DE200D322
                                  APIs
                                  • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF684085F46), ref: 00007FF6840AFB04
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _errno
                                  • String ID: %lx
                                  • API String ID: 2918714741-1448181948
                                  • Opcode ID: f5d2032c4728092e21dc87321e433a489388819b9718c86401f3a2fa3b628327
                                  • Instruction ID: 25cac8efa7c4880fad959ac69dc08f3c17dfc37160de62962cd00c1a2a03ebb3
                                  • Opcode Fuzzy Hash: f5d2032c4728092e21dc87321e433a489388819b9718c86401f3a2fa3b628327
                                  • Instruction Fuzzy Hash: C1812622A1C1D1C6E769CB25949427B7AD1FF85794F14823EEA9EE67C1DE3CD841CB00
                                  APIs
                                  • __std_fs_convert_narrow_to_wide.LIBCPMT ref: 00007FF6840431B8
                                    • Part of subcall function 00007FF6840BDBE8: MultiByteToWideChar.KERNEL32 ref: 00007FF6840BDC04
                                    • Part of subcall function 00007FF6840BDBE8: GetLastError.KERNEL32 ref: 00007FF6840BDC12
                                  • __std_fs_convert_narrow_to_wide.LIBCPMT ref: 00007FF684043264
                                    • Part of subcall function 00007FF68404C9C0: memcpy.VCRUNTIME140(?,?,00000000,?,?,?,00007FF684049045), ref: 00007FF68404CAD9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: __std_fs_convert_narrow_to_wide$ByteCharErrorLastMultiWidememcpy
                                  • String ID: Unknown exception
                                  • API String ID: 3269794198-410509341
                                  • Opcode ID: 20826a4a13eb8551ff8e744c1e06abc889af632be6793b07ef5414edb56623ab
                                  • Instruction ID: ec015aa514c5ecc70e396408bdb09700f8f67d99bae0e4ca8007394e1314f9f5
                                  • Opcode Fuzzy Hash: 20826a4a13eb8551ff8e744c1e06abc889af632be6793b07ef5414edb56623ab
                                  • Instruction Fuzzy Hash: 2541DE72B1874582EB288F629554A6E7294FFA4FCCF14613AEE4D83B44DF3DE451C280
                                  APIs
                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF68409B333), ref: 00007FF68409BA22
                                  • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF68409B333), ref: 00007FF68409BA73
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdupmalloc
                                  • String ID: (){ %*]
                                  • API String ID: 3515966317-731572209
                                  • Opcode ID: ead2ff6340fc06aeed3a66c306d213061de8f722bccf28ed03eadb82498dc3ad
                                  • Instruction ID: 2cd857a64a72e2263eab698cbb942a4e4c075e22791159004fc572593627bf4e
                                  • Opcode Fuzzy Hash: ead2ff6340fc06aeed3a66c306d213061de8f722bccf28ed03eadb82498dc3ad
                                  • Instruction Fuzzy Hash: FC31D51190D69AC4FE624B1560D037A2FE1BF66BB4F98413DDA9EC72D7CE2EA905C210
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdupmalloc
                                  • String ID: identity
                                  • API String ID: 3515966317-1788209604
                                  • Opcode ID: 6aed3678c7b39903fd45e71fbf86153a1c4f051a402b1ad76210efd2657cbff1
                                  • Instruction ID: 6acf5cfc143c5bba3ed57feb973e5af2c57a8565ddafd238dc3e5ef3d4a8f78d
                                  • Opcode Fuzzy Hash: 6aed3678c7b39903fd45e71fbf86153a1c4f051a402b1ad76210efd2657cbff1
                                  • Instruction Fuzzy Hash: A8318E62E49A86C1EB118B15DAC037A67A1BF94BE4F094639CE2D877D9EF6CE411C300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _dsignmemset
                                  • String ID: 0$null
                                  • API String ID: 210716287-2239106201
                                  • Opcode ID: 8565fcecba9d6086032a1b8e3780475e9d78d3e60eaf0654684494e326ebc3a9
                                  • Instruction ID: fdc71e3b27054ccd5ff05e91a1ebd85d31d89844383812a6a7679e9ff315df4f
                                  • Opcode Fuzzy Hash: 8565fcecba9d6086032a1b8e3780475e9d78d3e60eaf0654684494e326ebc3a9
                                  • Instruction Fuzzy Hash: 20316D22A18AC5C5D6618F29E0812EBB364FF94B88F449236EB8D53A55EF3CE585C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: mallocrealloc
                                  • String ID:
                                  • API String ID: 948496778-3916222277
                                  • Opcode ID: 3e64a6d1cf71b294bb3c8629c112c03f3c728d13f071cfbe4ba9339ff907718b
                                  • Instruction ID: bd96b1924c645836ef1f7c27884d6fb921e4ab7d1cc83324e03f69dc0058f6ab
                                  • Opcode Fuzzy Hash: 3e64a6d1cf71b294bb3c8629c112c03f3c728d13f071cfbe4ba9339ff907718b
                                  • Instruction Fuzzy Hash: F3117C7260AF81C2EB448F15E18022A73A0FB48BD4F44813ADB5E47798EF79D9A0C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: _strdupfree
                                  • String ID: %I64d-
                                  • API String ID: 1865132094-19666937
                                  • Opcode ID: c21ab5f7aa5f3c0a48473f0e636ee9e19cf949b7d4d23f0c8de1c84f835ba419
                                  • Instruction ID: 16d0c495ae464ddcf53d0c894fa83906f8da6384e2bfdce0307114271c1c9a05
                                  • Opcode Fuzzy Hash: c21ab5f7aa5f3c0a48473f0e636ee9e19cf949b7d4d23f0c8de1c84f835ba419
                                  • Instruction Fuzzy Hash: 2D118272A0A682C1FB158B6488853FA27E1FF54B49F18543DC90C8E367EF2DA4D6D311
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407827A
                                  • memcpy.VCRUNTIME140 ref: 00007FF6840783AC
                                  • memcpy.VCRUNTIME140 ref: 00007FF6840783C8
                                    • Part of subcall function 00007FF68408CA10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684076193,?,?,00000000,00007FF684080A42,?,?,00000000,00007FF684081075), ref: 00007FF68408CA4C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: freememcpy
                                  • String ID:
                                  • API String ID: 3223336191-0
                                  • Opcode ID: 8f4038719b5ab9af2b443d7a1587076df06882b9b98dcb21ac2aad8ed78968df
                                  • Instruction ID: 939f236f73b9139effe524e0ab43de09486e35776903a6f0ca38660573080ef8
                                  • Opcode Fuzzy Hash: 8f4038719b5ab9af2b443d7a1587076df06882b9b98dcb21ac2aad8ed78968df
                                  • Instruction Fuzzy Hash: 88C15D32B08A02CAEB548B69D4807AE33B5BF45BA8F044639CE2D977D8DF39D446D741
                                  APIs
                                    • Part of subcall function 00007FF6840751D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF68407F7B0,?,?,?,?,?,?,?,?,?,?,?,00007FF684070081), ref: 00007FF6840751F7
                                    • Part of subcall function 00007FF6840751D0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF68407F7B0,?,?,?,?,?,?,?,?,?,?,?,00007FF684070081), ref: 00007FF684075203
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407B6B6
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407B6C6
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF68407B6D4
                                  • memset.VCRUNTIME140 ref: 00007FF68407B70F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free$memset
                                  • String ID:
                                  • API String ID: 2717317152-0
                                  • Opcode ID: 2a9bef5cc960539725e56acd80ee0917e3aa3e8f4b00392ea9bc446efc1007e6
                                  • Instruction ID: cb6820a1b4b072bc76356aa2980ff74d434e5c6e74180bcab10148520adbf62b
                                  • Opcode Fuzzy Hash: 2a9bef5cc960539725e56acd80ee0917e3aa3e8f4b00392ea9bc446efc1007e6
                                  • Instruction Fuzzy Hash: B4210C32E18B91D3E304DB22D6942A963B0FBA9744F11922AEB8C83A11DF74F1F5C300
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840AF26E,?,?,?,00007FF684080F22), ref: 00007FF6840B3196
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840AF26E,?,?,?,00007FF684080F22), ref: 00007FF6840B31B7
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840AF26E,?,?,?,00007FF684080F22), ref: 00007FF6840B31D2
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6840AF26E,?,?,?,00007FF684080F22), ref: 00007FF6840B31E0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 0b9d77558f6272cd9c8681e4e2914bccac0962b864b0b769413d0feb90ad9545
                                  • Instruction ID: 1c12e271a0b4716acb8364bc8c07bc6203ceb4b6f44215fa49e9c652ce31a18d
                                  • Opcode Fuzzy Hash: 0b9d77558f6272cd9c8681e4e2914bccac0962b864b0b769413d0feb90ad9545
                                  • Instruction Fuzzy Hash: AF11A536A18B41C2EB44DF66E8D402D73A8FF98F99714052ACA4D87769CF38D8A5C780
                                  APIs
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684087D35,?,?,00000000,00007FF684080B41,?,?,00000000,00007FF684081075), ref: 00007FF6840B0B20
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684087D35,?,?,00000000,00007FF684080B41,?,?,00000000,00007FF684081075), ref: 00007FF6840B0B46
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684087D35,?,?,00000000,00007FF684080B41,?,?,00000000,00007FF684081075), ref: 00007FF6840B0B54
                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF684087D35,?,?,00000000,00007FF684080B41,?,?,00000000,00007FF684081075), ref: 00007FF6840B0B62
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2086648316.00007FF684041000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF684040000, based on PE: true
                                  • Associated: 00000000.00000002.2086612743.00007FF684040000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086720171.00007FF6840C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086770421.00007FF6840E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.2086808425.00007FF6840E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff684040000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: free
                                  • String ID:
                                  • API String ID: 1294909896-0
                                  • Opcode ID: 11a7c4e0c8cd0aec6bfa656a786d95a47c048f4229927679e41d232e9eb2b00f
                                  • Instruction ID: 78895f828c13a5b3fc570615ea5a7696ed997f4ecf858a779e33aa4bf9e73ac9
                                  • Opcode Fuzzy Hash: 11a7c4e0c8cd0aec6bfa656a786d95a47c048f4229927679e41d232e9eb2b00f
                                  • Instruction Fuzzy Hash: 1FF0B236A08B41C2DB44CF62E9D402973E4FF98F99B154126CA5E8B769CF38C8A4C740