Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe

Overview

General Information

Sample name:SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe
Analysis ID:1544200
MD5:23d85c693614bedaed9142bfcbd7cb77
SHA1:e5556d7ef81d95dc7cdf1b78ef28d2decb93654c
SHA256:b6cd79a1fc147046cdca607e3ad30274ad7a5aa8544a0221455a1b4305962d42
Tags:exe
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe (PID: 7140 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe" MD5: 23D85C693614BEDAED9142BFCBD7CB77)
    • conhost.exe (PID: 7160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6540 cmdline: C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe" MD5 | find /i /v "md5" | find /i /v "certutil" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • certutil.exe (PID: 2364 cmdline: certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe" MD5 MD5: F17616EC0522FC5633151F7CAA278CAA)
      • find.exe (PID: 2008 cmdline: find /i /v "md5" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • find.exe (PID: 3260 cmdline: find /i /v "certutil" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
    • cmd.exe (PID: 1816 cmdline: C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • cmd.exe (PID: 1892 cmdline: cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 4312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 4420 cmdline: timeout /t 5 MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • WerFault.exe (PID: 2380 cmdline: C:\Windows\system32\WerFault.exe -u -p 7140 -s 484 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeAvira: detected
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeReversingLabs: Detection: 42%
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeVirustotal: Detection: 30%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197CC1BD strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF7197CC1BD
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197E7A40 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF7197E7A40
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197F0EA0 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7197F0EA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197EEDB0 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7197EEDB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197CE2C0 CryptHashData,0_2_00007FF7197CE2C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197CE2D0 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7197CE2D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197CE270 CryptAcquireContextA,CryptCreateHash,0_2_00007FF7197CE270
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197CB4B0 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF7197CB4B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197E8360 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF7197E8360
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197CB580 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7197CB580
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF7197B21A0
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF7197DABB0
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197C6CE0 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF7197C6CE0
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe, 00000000.00000002.1699091200.000001D7B54FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe, 00000000.00000002.1699091200.000001D7B54FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/9
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe, 00000000.00000002.1699091200.000001D7B54FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/ace
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197EEDB0 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7197EEDB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF71979C9800_2_00007FF71979C980
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197B99900_2_00007FF7197B9990
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197BACD00_2_00007FF7197BACD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197CC1BD0_2_00007FF7197CC1BD
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF71979E1200_2_00007FF71979E120
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197984900_2_00007FF719798490
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197993B00_2_00007FF7197993B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197BB8F00_2_00007FF7197BB8F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF71978A7C00_2_00007FF71978A7C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197D6AA00_2_00007FF7197D6AA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF719799AD00_2_00007FF719799AD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197C4B100_2_00007FF7197C4B10
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF719793B080_2_00007FF719793B08
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF719784B100_2_00007FF719784B10
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF71978EA200_2_00007FF71978EA20
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197E7A400_2_00007FF7197E7A40
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197ABA500_2_00007FF7197ABA50
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197939DE0_2_00007FF7197939DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197979700_2_00007FF719797970
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF719783B300_2_00007FF719783B30
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF719796F040_2_00007FF719796F04
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197F0E300_2_00007FF7197F0E30
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197EEDB00_2_00007FF7197EEDB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF71979A0C90_2_00007FF71979A0C9
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197C9F400_2_00007FF7197C9F40
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF719784F700_2_00007FF719784F70
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197842C00_2_00007FF7197842C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197DF2D00_2_00007FF7197DF2D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197CC2850_2_00007FF7197CC285
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197CC27C0_2_00007FF7197CC27C
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197E24F00_2_00007FF7197E24F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197955000_2_00007FF719795500
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197B63F00_2_00007FF7197B63F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197B36C00_2_00007FF7197B36C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197C76600_2_00007FF7197C7660
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197876700_2_00007FF719787670
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197CE6800_2_00007FF7197CE680
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197DB5D00_2_00007FF7197DB5D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197E35200_2_00007FF7197E3520
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197855300_2_00007FF719785530
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF71979B8A00_2_00007FF71979B8A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF71979289A0_2_00007FF71979289A
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197927AC0_2_00007FF7197927AC
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197C18100_2_00007FF7197C1810
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197BC7300_2_00007FF7197BC730
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197987400_2_00007FF719798740
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: String function: 00007FF7197BBD00 appears 33 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: String function: 00007FF7197B8980 appears 380 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: String function: 00007FF7197BBC70 appears 36 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: String function: 00007FF7197A7230 appears 40 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: String function: 00007FF7197F26DE appears 47 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: String function: 00007FF7197B3300 appears 70 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: String function: 00007FF7197A7300 appears 37 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: String function: 00007FF7197A3860 appears 49 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: String function: 00007FF7197BBDE0 appears 33 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: String function: 00007FF7197B8B00 appears 310 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7140 -s 484
Source: classification engineClassification label: mal64.winEXE@18/0@1/2
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197A22E0 GetLastError,_errno,FormatMessageA,strchr,strncpy,_errno,_errno,GetLastError,SetLastError,0_2_00007FF7197A22E0
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2380:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4312:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7160:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\52b4248b-35fa-4094-88a8-ded2194e74c4Jump to behavior
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeReversingLabs: Detection: 42%
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeVirustotal: Detection: 30%
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe" MD5
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7140 -s 484
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197BB5D0 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,0_2_00007FF7197BB5D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197876CA push rdx; ret 0_2_00007FF7197876CB
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeAPI coverage: 4.3 %
Source: C:\Windows\System32\timeout.exe TID: 4960Thread sleep count: 43 > 30Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe, 00000000.00000002.1699091200.000001D7B54FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllFF
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197833E0 _invalid_parameter_noinfo_noreturn,IsDebuggerPresent,Sleep,IsDebuggerPresent,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,0_2_00007FF7197833E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197F2578 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF7197F2578
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197BB5D0 GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,0_2_00007FF7197BB5D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197A63C0 GetProcessHeap,0_2_00007FF7197A63C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197F1C20 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7197F1C20
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_00007FF7197F1160
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197F23F8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7197F23F8
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197C6CE0 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF7197C6CE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197D6AA0 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF7197D6AA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197BA640 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF7197BA640
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197DD5D4 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF7197DD5D4
Source: C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeCode function: 0_2_00007FF7197DD800 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF7197DD800
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
22
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1544200 Sample: SecuriteInfo.com.W64.GenKry... Startdate: 29/10/2024 Architecture: WINDOWS Score: 64 32 keyauth.win 2->32 38 Antivirus / Scanner detection for submitted sample 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 Machine Learning detection for sample 2->42 44 AI detected suspicious sample 2->44 9 SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe 1 2->9         started        signatures3 process4 dnsIp5 34 keyauth.win 104.26.0.5, 443, 49734 CLOUDFLARENETUS United States 9->34 36 127.0.0.1 unknown unknown 9->36 12 cmd.exe 1 9->12         started        14 cmd.exe 1 9->14         started        16 conhost.exe 9->16         started        18 WerFault.exe 2 9->18         started        process6 process7 20 certutil.exe 3 1 12->20         started        22 find.exe 1 12->22         started        24 find.exe 1 12->24         started        26 cmd.exe 1 14->26         started        process8 28 conhost.exe 26->28         started        30 timeout.exe 1 26->30         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe42%ReversingLabsWin64.Trojan.Generic
SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe31%VirustotalBrowse
SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe100%AviraHEUR/AGEN.1315740
SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
keyauth.win0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html#0%VirustotalBrowse
https://keyauth.win/api/1.2/90%VirustotalBrowse
https://keyauth.win/api/1.2/0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://keyauth.win/api/1.2/aceSecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe, 00000000.00000002.1699091200.000001D7B54FC000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    https://keyauth.win/api/1.2/9SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe, 00000000.00000002.1699091200.000001D7B54FC000.00000004.00000020.00020000.00000000.sdmpfalseunknown
    https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exefalse
    • URL Reputation: safe
    unknown
    https://curl.haxx.se/docs/http-cookies.html#SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exefalseunknown
    https://keyauth.win/api/1.2/SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe, 00000000.00000002.1699091200.000001D7B54FC000.00000004.00000020.00020000.00000000.sdmpfalseunknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    104.26.0.5
    keyauth.winUnited States
    13335CLOUDFLARENETUSfalse
    IP
    127.0.0.1
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1544200
    Start date and time:2024-10-29 02:18:08 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 47s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:17
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe
    Detection:MAL
    Classification:mal64.winEXE@18/0@1/2
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 97%
    • Number of executed functions: 52
    • Number of non-executed functions: 227
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing disassembly code.
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    104.26.0.5SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
      SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
        SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
          SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
            lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
              xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                  xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                    4aOgNkVU5z.exeGet hashmaliciousUnknownBrowse
                      xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        keyauth.winSecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                        • 104.26.1.5
                        SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                        • 104.26.1.5
                        SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                        • 104.26.1.5
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CLOUDFLARENETUSfile.exeGet hashmaliciousLummaCBrowse
                        • 188.114.97.3
                        https://api.inspectrealestate.com.au/email/track?eta=1&t=B32-5UARLGTXC6GHXC7PJPHCGUP7HMF6FJEQ76L6MOL7WYB6P6EYQNBONANBBGKOXFRO3HPDET5TXGOZXG5FJNMJJC437YUYUWDF5VEVIWPK6LECEZJV3OMRCXF6VI76ZOGYOFIOERVACTHYB4KHK22IKKEWLYPTUBLONXLA7QVY2SW2TZMW4ULVG2UAKDR3DM3RL4TTJAF3F3ROXQ3ZLRVYS7Z2T4TIQETEEUV73V42AQLF65YKSUX6JMYEW3ZHXPREAMXXBOQV32GKOYOISFZKX4GPTPR2IMSMCULLR2V4QUSMU3MWF7NQ%3D%3D%3D%3DGet hashmaliciousUnknownBrowse
                        • 188.114.96.3
                        Payment Advice.xlsGet hashmaliciousUnknownBrowse
                        • 104.21.21.60
                        file.exeGet hashmaliciousLummaCBrowse
                        • 188.114.96.3
                        https://hianime.toGet hashmaliciousUnknownBrowse
                        • 104.21.11.245
                        (No subject) (98).emlGet hashmaliciousHTMLPhisherBrowse
                        • 104.17.25.14
                        file.exeGet hashmaliciousLummaCBrowse
                        • 188.114.97.3
                        https://mail.kb4.io/XT0VNMzRJS3djRnBKZnFha1JaVThBUHFHRmpuS2FmSUY4aUszUlY3Sm0rWmpyUWR3ekQzL2xjN0xhVVJlTzhvZzgyMGtTUkxmSWtGdWlUY2I0NStmRWlLS2xHcGZsNTZUN3VyanNiKzVaNjhaeTRSTXFXVGdwc0J4amUxRFFPMU5DTTd5ejl5aXZxUlBwL1NDaDBRSk9DWVJkc09KRUZodTl0SFh5bFVVWEdYZTMzcm5ZTCtCSGpmZWRIMEprQjhiZExvOE9wSGkwUS9KTjQwSVdjQT0tLVBNYWNLTzcyT0xCdDkzb3ItLURlVmNvdGI3d3BGenM5UWJzc1EreXc9PQ==?cid=2260646675Get hashmaliciousUnknownBrowse
                        • 104.18.90.62
                        https://mail.kb4.io/XV2pCbFUvdkZ0U1V3cHZQWXpqL3hjTU9wcmY4ZmEyNXZRWTRiU1VvMTVwRnRrYWdnVjdlM0lLQ3VmVXlCSlpGdkkvQUNJWjZLaHpVWnRmYjY0VktjbmJLUFlpV0xzWTVEdkJsa1hrWXY0dGZHMUNoclZ3aDRORWlpQlNhTlpLSy9pdXMwQXozSHVrYSthQnJrS2J6T0EvSVBMYUFYRG1EZ254WlBRUGdyZU55TkdBZjB0aWhCMFdIN081T2RsdFFIMVpIdFAvU2Q2NXlLKzNJY1JZQ1JNMTBwaDlZPS0tNE01L0hRZXp6Tm50TW1MTS0tSlkrYWNuVllJcXZpelZWZ2ppaVRSdz09?cid=2260646675Get hashmaliciousUnknownBrowse
                        • 104.18.89.62
                        file.exeGet hashmaliciousLummaCBrowse
                        • 188.114.96.3
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        ce5f3254611a8c095a3d821d44539877SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.FileRepMalware.12632.12594.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win64.MalwareX-gen.29573.28124.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                        • 104.26.0.5
                        No context
                        No created / dropped files found
                        File type:PE32+ executable (console) x86-64, for MS Windows
                        Entropy (8bit):6.456567607049873
                        TrID:
                        • Win64 Executable Console (202006/5) 92.65%
                        • Win64 Executable (generic) (12005/4) 5.51%
                        • Generic Win/DOS Executable (2004/3) 0.92%
                        • DOS Executable Generic (2002/1) 0.92%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe
                        File size:607'232 bytes
                        MD5:23d85c693614bedaed9142bfcbd7cb77
                        SHA1:e5556d7ef81d95dc7cdf1b78ef28d2decb93654c
                        SHA256:b6cd79a1fc147046cdca607e3ad30274ad7a5aa8544a0221455a1b4305962d42
                        SHA512:b82bf7690219fe0aba54b3180aea8daf8ccc97741b2ba23641cc1437a8fd3c889b5006167a36fc79a131de61bd690c7a08c641d84dd03205ba82e46c9130edfc
                        SSDEEP:12288:31ixytRvGF+JAx05dew7msZN0XLpUP6w:CytlGkGxQew7mWILpfw
                        TLSH:1CD47D56A7E904EAD1A7C13C8647C613E7B2B45A13109BDB43A0C9792F13BE56F3E720
                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........................<......yR......y.......y.......y.......y.......|..........m...N........................x.......xP......x.....
                        Icon Hash:90cececece8e8eb0
                        Entrypoint:0x140071930
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows cui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x66FB2767 [Mon Sep 30 22:34:15 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:323a540f00c2b993579bbdc97e09167b
                        Instruction
                        dec eax
                        sub esp, 28h
                        call 00007FA2A4C39244h
                        dec eax
                        add esp, 28h
                        jmp 00007FA2A4C385F7h
                        int3
                        int3
                        inc eax
                        push ebx
                        dec eax
                        sub esp, 20h
                        dec eax
                        mov ebx, ecx
                        dec eax
                        lea ecx, dword ptr [0001F194h]
                        call dword ptr [0000292Eh]
                        mov eax, dword ptr [0001E714h]
                        dec eax
                        lea ecx, dword ptr [0001F181h]
                        mov edx, dword ptr [0001F183h]
                        inc eax
                        mov dword ptr [0001E6FFh], eax
                        mov dword ptr [ebx], eax
                        dec eax
                        mov eax, dword ptr [00000058h]
                        inc ecx
                        mov ecx, 00000004h
                        dec esp
                        mov eax, dword ptr [eax+edx*8]
                        mov eax, dword ptr [0001E6E4h]
                        inc ebx
                        mov dword ptr [ecx+eax], eax
                        call dword ptr [000028F6h]
                        dec eax
                        lea ecx, dword ptr [0001F13Fh]
                        dec eax
                        add esp, 20h
                        pop ebx
                        dec eax
                        jmp dword ptr [000028C3h]
                        int3
                        int3
                        int3
                        inc eax
                        push ebx
                        dec eax
                        sub esp, 20h
                        dec eax
                        mov ebx, ecx
                        dec eax
                        lea ecx, dword ptr [0001F128h]
                        call dword ptr [000028C2h]
                        cmp dword ptr [ebx], 00000000h
                        jne 00007FA2A4C387A4h
                        or dword ptr [ebx], FFFFFFFFh
                        jmp 00007FA2A4C387C7h
                        inc ebp
                        xor ecx, ecx
                        dec eax
                        lea edx, dword ptr [0001F10Eh]
                        inc ecx
                        or eax, FFFFFFFFh
                        dec eax
                        lea ecx, dword ptr [0001F0FBh]
                        call dword ptr [00002895h]
                        jmp 00007FA2A4C3875Bh
                        cmp dword ptr [ebx], FFFFFFFFh
                        je 00007FA2A4C38760h
                        dec eax
                        mov eax, dword ptr [00000058h]
                        Programming Language:
                        • [IMP] VS2008 SP1 build 30729
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x8c4500x1f4.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x970000x1e8.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x920000x4c08.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x980000x5c4.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x83f600x38.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x840000x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x83e200x140.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x740000xb58.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x72d800x72e005e4517b582cef5cd4c8dc9dcf102da43False0.5149576645810664data6.391370609924596IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x740000x1b1dc0x1b2003fa35070c0a8402f40a942e8dd94c84bFalse0.3824974798387097OpenPGP Public Key5.624820765468368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x900000x14c80xa009b4091fe32573f9d20204ff808ed9d70False0.196875data3.5496317521529486IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x920000x4c080x4e007d2ea751bdeb80154ec68584a7f44bc6False0.47806490384615385data5.710918288582408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x970000x1e80x200bd319242e0d4994db1e7d370d3a05a5bFalse0.5390625data4.768131151703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x980000x5c40x600847fa98c492d41f8bc58c0bc6e82b439False0.5865885416666666data5.298964399411476IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_MANIFEST0x970600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                        DLLImport
                        KERNEL32.dllMultiByteToWideChar, GetEnvironmentVariableA, GetFileType, ReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, WideCharToMultiByte, OutputDebugStringW, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentProcessId, IsProcessorFeaturePresent, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, LeaveCriticalSection, EnterCriticalSection, LocalFree, FormatMessageA, SetLastError, QueryFullProcessImageNameW, GetModuleFileNameA, UnmapViewOfFile, MapViewOfFile, CreateFileMappingW, DeleteCriticalSection, InitializeCriticalSectionEx, GetProcessHeap, HeapSize, HeapFree, HeapReAlloc, HeapAlloc, HeapDestroy, GetLastError, CloseHandle, MoveFileExA, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, WakeAllConditionVariable, GetCurrentThreadId, SleepConditionVariableSRW, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, AreFileApisANSI, SetCurrentDirectoryW, GetLocaleInfoEx, WaitForSingleObjectEx, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, FreeLibrary, GetSystemDirectoryA, QueryPerformanceFrequency, VerSetConditionMask, SleepEx, CreateFileW, IsDebuggerPresent, GetConsoleWindow, GetModuleHandleW, GetProcAddress, CreateThread, LoadLibraryA, GetCurrentThread, Sleep, GetModuleHandleA, GetStdHandle, GetCurrentProcess, SetConsoleTitleA, VirtualProtect, WriteProcessMemory
                        USER32.dllMoveWindow, FindWindowA, ShowWindow, MessageBoxA
                        ADVAPI32.dllCryptReleaseContext, AddAccessAllowedAce, GetLengthSid, GetTokenInformation, InitializeAcl, IsValidSid, SetSecurityInfo, CopySid, ConvertSidToStringSidA, CryptAcquireContextA, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptEncrypt, CryptImportKey, OpenProcessToken
                        SHELL32.dllShellExecuteA
                        MSVCP140.dll?always_noconv@codecvt_base@std@@QEBA_NXZ, ??Bid@locale@std@@QEAA_KXZ, ?setf@ios_base@std@@QEAAHHH@Z, ?pbase@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD0@Z, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, _Thrd_detach, _Query_perf_counter, _Cnd_do_broadcast_at_thread_exit, ?_Syserror_map@std@@YAPEBDH@Z, ?_Xlength_error@std@@YAXPEBD@Z, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?_Xbad_function_call@std@@YAXXZ, ?_Winerror_map@std@@YAHH@Z, ?_Xout_of_range@std@@YAXPEBD@Z, ?uncaught_exception@std@@YA_NXZ, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_Throw_Cpp_error@std@@YAXH@Z, ??0_Lockit@std@@QEAA@H@Z, ??1_Lockit@std@@QEAA@XZ, _Query_perf_frequency, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
                        Normaliz.dllIdnToAscii
                        WLDAP32.dll
                        CRYPT32.dllCertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertOpenStore, CertGetNameStringA, CertFindExtension, CertFreeCertificateChain, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertAddCertificateContextToStore
                        WS2_32.dllbind, send, recv, closesocket, connect, getpeername, getsockname, getsockopt, htons, ntohs, setsockopt, WSAGetLastError, socket, WSASetLastError, select, __WSAFDIsSet, ioctlsocket, listen, recvfrom, htonl, accept, WSACleanup, WSAStartup, freeaddrinfo, ntohl, gethostname, sendto, WSAIoctl, getaddrinfo
                        RPCRT4.dllUuidToStringA, UuidCreate, RpcStringFreeA
                        PSAPI.DLLGetModuleInformation
                        USERENV.dllUnloadUserProfile
                        VCRUNTIME140_1.dll__CxxFrameHandler4
                        VCRUNTIME140.dll__std_exception_destroy, __std_exception_copy, __std_terminate, _CxxThrowException, memchr, memcmp, memcpy, memmove, memset, strchr, __current_exception_context, strstr, __C_specific_handler, __current_exception, strrchr
                        api-ms-win-crt-runtime-l1-1-0.dll_set_app_type, _cexit, _get_initial_narrow_environment, _initterm, _initterm_e, _exit, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _crt_atexit, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _invalid_parameter_noinfo_noreturn, strerror, __sys_nerr, _errno, _getpid, terminate, system, _invalid_parameter_noinfo, _beginthreadex, exit, _seh_filter_exe, _resetstkoflw
                        api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsscanf, fputc, feof, fflush, fseek, __acrt_iob_func, fclose, fopen, ftell, _open, _close, _write, _popen, _pclose, fgets, _read, fgetc, __p__commode, _set_fmode, _get_stream_buffer_pointers, _lseeki64, _fseeki64, fread, fsetpos, ungetc, setvbuf, fgetpos, fwrite, __stdio_common_vsprintf, fputs
                        api-ms-win-crt-heap-l1-1-0.dllrealloc, _set_new_mode, calloc, free, _callnewh, malloc
                        api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                        api-ms-win-crt-convert-l1-1-0.dllatoi, strtoll, strtol, strtoul, strtod, strtoull
                        api-ms-win-crt-utility-l1-1-0.dllqsort, rand
                        api-ms-win-crt-filesystem-l1-1-0.dll_access, _stat64, _unlock_file, _unlink, _lock_file, _fstat64
                        api-ms-win-crt-locale-l1-1-0.dll___lc_codepage_func, localeconv, _configthreadlocale
                        api-ms-win-crt-string-l1-1-0.dllstrcmp, strspn, strpbrk, _strdup, tolower, strncmp, isupper, strncpy, strcspn
                        api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 29, 2024 02:19:01.797086000 CET49734443192.168.2.4104.26.0.5
                        Oct 29, 2024 02:19:01.797173977 CET44349734104.26.0.5192.168.2.4
                        Oct 29, 2024 02:19:01.797261000 CET49734443192.168.2.4104.26.0.5
                        Oct 29, 2024 02:19:01.809922934 CET49734443192.168.2.4104.26.0.5
                        Oct 29, 2024 02:19:01.809962034 CET44349734104.26.0.5192.168.2.4
                        Oct 29, 2024 02:19:02.433577061 CET44349734104.26.0.5192.168.2.4
                        Oct 29, 2024 02:19:02.433656931 CET49734443192.168.2.4104.26.0.5
                        Oct 29, 2024 02:19:03.437453032 CET49734443192.168.2.4104.26.0.5
                        Oct 29, 2024 02:19:03.437496901 CET44349734104.26.0.5192.168.2.4
                        Oct 29, 2024 02:19:03.437572002 CET49734443192.168.2.4104.26.0.5
                        Oct 29, 2024 02:19:03.437663078 CET44349734104.26.0.5192.168.2.4
                        Oct 29, 2024 02:19:03.437719107 CET49734443192.168.2.4104.26.0.5
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 29, 2024 02:19:01.782392979 CET5588453192.168.2.41.1.1.1
                        Oct 29, 2024 02:19:01.792089939 CET53558841.1.1.1192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Oct 29, 2024 02:19:01.782392979 CET192.168.2.41.1.1.10xcb74Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Oct 29, 2024 02:19:01.792089939 CET1.1.1.1192.168.2.40xcb74No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                        Oct 29, 2024 02:19:01.792089939 CET1.1.1.1192.168.2.40xcb74No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                        Oct 29, 2024 02:19:01.792089939 CET1.1.1.1192.168.2.40xcb74No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:21:19:00
                        Start date:28/10/2024
                        Path:C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe"
                        Imagebase:0x7ff719780000
                        File size:607'232 bytes
                        MD5 hash:23D85C693614BEDAED9142BFCBD7CB77
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:21:19:00
                        Start date:28/10/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:21:19:01
                        Start date:28/10/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                        Imagebase:0x7ff611370000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:21:19:01
                        Start date:28/10/2024
                        Path:C:\Windows\System32\certutil.exe
                        Wow64 process (32bit):false
                        Commandline:certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exe" MD5
                        Imagebase:0x7ff763d10000
                        File size:1'651'712 bytes
                        MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:4
                        Start time:21:19:01
                        Start date:28/10/2024
                        Path:C:\Windows\System32\find.exe
                        Wow64 process (32bit):false
                        Commandline:find /i /v "md5"
                        Imagebase:0x7ff7912d0000
                        File size:17'920 bytes
                        MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:5
                        Start time:21:19:01
                        Start date:28/10/2024
                        Path:C:\Windows\System32\find.exe
                        Wow64 process (32bit):false
                        Commandline:find /i /v "certutil"
                        Imagebase:0x7ff7912d0000
                        File size:17'920 bytes
                        MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:6
                        Start time:21:19:02
                        Start date:28/10/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                        Imagebase:0x7ff611370000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:7
                        Start time:21:19:03
                        Start date:28/10/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                        Imagebase:0x7ff611370000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:21:19:03
                        Start date:28/10/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:11
                        Start time:21:19:03
                        Start date:28/10/2024
                        Path:C:\Windows\System32\timeout.exe
                        Wow64 process (32bit):false
                        Commandline:timeout /t 5
                        Imagebase:0x7ff72d660000
                        File size:32'768 bytes
                        MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:12
                        Start time:21:19:03
                        Start date:28/10/2024
                        Path:C:\Windows\System32\WerFault.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\WerFault.exe -u -p 7140 -s 484
                        Imagebase:0x7ff62d4f0000
                        File size:570'736 bytes
                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:3.9%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:25.1%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:114
                          execution_graph 48641 7ff71979e120 48642 7ff71979e170 48641->48642 48642->48642 48663 7ff719798490 GetModuleHandleW 48642->48663 48644 7ff719798490 20 API calls 48646 7ff71979e18f 48644->48646 48645 7ff71979e201 GetCurrentProcess OpenProcessToken 48645->48646 48647 7ff71979e22c GetTokenInformation malloc 48645->48647 48646->48644 48646->48645 48648 7ff71979e32c CloseHandle 48646->48648 48654 7ff71978d3b0 7 API calls 48646->48654 48656 7ff71979e47b SleepEx 48646->48656 48657 7ff71979e3a0 GetModuleHandleA GetCurrentProcess GetModuleInformation 48646->48657 48660 7ff71979b690 25 API calls 48646->48660 48662 7ff71979b690 25 API calls 48646->48662 48678 7ff71979b690 48646->48678 48647->48646 48649 7ff71979e25e GetTokenInformation 48647->48649 48648->48646 48650 7ff71979e285 IsValidSid 48649->48650 48651 7ff71979e31a free 48649->48651 48650->48651 48653 7ff71979e296 GetLengthSid malloc 48650->48653 48651->48646 48653->48651 48655 7ff71979e2b2 InitializeAcl 48653->48655 48654->48646 48658 7ff71979e311 free 48655->48658 48659 7ff71979e2c7 AddAccessAllowedAce 48655->48659 48656->48646 48657->48646 48658->48651 48659->48658 48661 7ff71979e2e2 GetCurrentProcess SetSecurityInfo 48659->48661 48660->48646 48661->48658 48662->48656 48664 7ff719798703 48663->48664 48665 7ff7197984dc 48663->48665 48702 7ff7197f1400 48664->48702 48665->48664 48666 7ff7197984ff GetCurrentProcess QueryFullProcessImageNameW CreateFileW 48665->48666 48666->48664 48668 7ff719798571 CreateFileMappingW 48666->48668 48670 7ff719798595 MapViewOfFile 48668->48670 48671 7ff7197986fa CloseHandle 48668->48671 48670->48664 48672 7ff7197985b8 48670->48672 48671->48664 48673 7ff7197986f1 UnmapViewOfFile 48672->48673 48675 7ff7197985ef 48672->48675 48673->48671 48674 7ff7197986d7 UnmapViewOfFile CloseHandle 48674->48664 48675->48674 48676 7ff719798650 48675->48676 48677 7ff719798685 VirtualProtect VirtualProtect 48675->48677 48676->48674 48677->48675 48713 7ff71978f740 48678->48713 48680 7ff71979b6d0 48681 7ff71979b71a 48680->48681 48682 7ff71979b6e7 memcpy 48680->48682 48730 7ff71978d950 9 API calls 3 library calls 48681->48730 48685 7ff71979b73c system 48682->48685 48687 7ff71979b793 48685->48687 48688 7ff71979b7c8 48685->48688 48686 7ff71979b739 48686->48685 48689 7ff71979b7c3 48687->48689 48692 7ff71979b7bc _invalid_parameter_noinfo_noreturn 48687->48692 48690 7ff71979b81b 48688->48690 48694 7ff71979b816 48688->48694 48698 7ff71979b80f _invalid_parameter_noinfo_noreturn 48688->48698 48731 7ff7197f169c free 48689->48731 48691 7ff71979b855 48690->48691 48696 7ff71979b84d 48690->48696 48699 7ff71979b88d _invalid_parameter_noinfo_noreturn 48690->48699 48697 7ff7197f1400 8 API calls 48691->48697 48692->48689 48732 7ff7197f169c free 48694->48732 48733 7ff7197f169c free 48696->48733 48701 7ff71979b878 48697->48701 48698->48694 48701->48645 48703 7ff7197f1409 48702->48703 48704 7ff719798715 48703->48704 48705 7ff7197f1c54 IsProcessorFeaturePresent 48703->48705 48704->48646 48706 7ff7197f1c6c 48705->48706 48711 7ff7197f1e4c RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 48706->48711 48708 7ff7197f1c7f 48712 7ff7197f1c20 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48708->48712 48711->48708 48714 7ff71978f767 48713->48714 48716 7ff71978f83d memcpy memcpy 48714->48716 48718 7ff71978f828 48714->48718 48721 7ff71978f806 48714->48721 48722 7ff71978f889 48714->48722 48728 7ff71978f88e 48714->48728 48716->48680 48719 7ff71978f837 48718->48719 48720 7ff71978f82d 48718->48720 48719->48716 48735 7ff7197f1420 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task std::_Facet_Register 48720->48735 48734 7ff7197f1420 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task std::_Facet_Register 48721->48734 48736 7ff719781a30 __std_exception_copy Concurrency::cancel_current_task 48722->48736 48726 7ff71978f80e 48727 7ff71978f813 48726->48727 48729 7ff71978f821 _invalid_parameter_noinfo_noreturn 48726->48729 48727->48719 48737 7ff719781ad0 ?_Xlength_error@std@@YAXPEBD 48728->48737 48729->48718 48730->48686 48734->48726 48735->48727 48736->48728 48738 7ff71978a7c0 48802 7ff71979c980 CreateThread 48738->48802 48803 7ff71979dd30 48802->48803 48804 7ff71979c9ec 48802->48804 48808 7ff71979dd7b MessageBoxA exit 48803->48808 48804->48803 48805 7ff71979c9f7 UuidCreate UuidToStringA 48804->48805 48806 7ff71979ca92 48805->48806 48807 7ff71979ca53 48805->48807 49063 7ff71978d3b0 48806->49063 49272 7ff71978ef20 48807->49272 48810 7ff71979caea 49081 7ff719795a00 48810->49081 48813 7ff71979ca77 RpcStringFreeA 48813->48806 48818 7ff71979cb2a 49112 7ff71978db60 48818->49112 48820 7ff71979cb55 48821 7ff71979cba1 48820->48821 49294 7ff71978c750 _invalid_parameter_noinfo_noreturn 48820->49294 49122 7ff71978f660 48821->49122 48825 7ff719795a00 2 API calls 48826 7ff71979cbd8 48825->48826 48827 7ff71978bee0 2 API calls 48826->48827 48828 7ff71979cbe1 48827->48828 48829 7ff71978bee0 2 API calls 48828->48829 48830 7ff71979cbec 48829->48830 49126 7ff7197993b0 GetModuleFileNameA 48830->49126 48834 7ff71979cbfe 49180 7ff7197a2150 48834->49180 48837 7ff71978d020 7 API calls 48838 7ff71979cce2 48837->48838 48839 7ff71978d020 7 API calls 48838->48839 48840 7ff71979cd1f 48839->48840 49188 7ff719794e60 48840->49188 48843 7ff71978bee0 2 API calls 48844 7ff71979cd45 48843->48844 48845 7ff71978bee0 2 API calls 48844->48845 48846 7ff71979cd52 48845->48846 48847 7ff71978f660 10 API calls 48846->48847 48848 7ff71979cd64 48847->48848 49207 7ff71978f8a0 48848->49207 48852 7ff71979cd9f 49223 7ff71978faa0 48852->49223 48855 7ff71978c520 10 API calls 48856 7ff71979cdfb 48855->48856 48857 7ff71978f8a0 20 API calls 48856->48857 48858 7ff71979ce33 48857->48858 49233 7ff71978f6d0 48858->49233 48863 7ff71978f660 10 API calls 48864 7ff71979ce6f 48863->48864 48865 7ff71978bee0 2 API calls 48864->48865 48866 7ff71979ce7c 48865->48866 48867 7ff71978bee0 2 API calls 48866->48867 48868 7ff71979ce89 48867->48868 48869 7ff71978bee0 2 API calls 48868->48869 48870 7ff71979ce96 48869->48870 48871 7ff71978bee0 2 API calls 48870->48871 48872 7ff71979cea0 48871->48872 48873 7ff71978bee0 2 API calls 48872->48873 48874 7ff71979cead 48873->48874 48875 7ff71978bee0 2 API calls 48874->48875 48876 7ff71979ceb7 48875->48876 48877 7ff71978bee0 2 API calls 48876->48877 48878 7ff71979cec4 48877->48878 48879 7ff71978bee0 2 API calls 48878->48879 48880 7ff71979cece 48879->48880 48881 7ff71978bee0 2 API calls 48880->48881 48882 7ff71979ced8 48881->48882 49247 7ff7197a3600 48882->49247 48886 7ff71979cefe 48887 7ff71978bf80 22 API calls 48886->48887 48888 7ff71979cf11 48887->48888 48890 7ff71978d020 7 API calls 48888->48890 48891 7ff71979cfc9 48888->48891 48889 7ff71979cff8 48892 7ff71979d062 48889->48892 48898 7ff71979d045 MessageBoxA exit 48889->48898 48894 7ff71979cf80 48890->48894 48891->48889 49295 7ff71978c750 _invalid_parameter_noinfo_noreturn 48891->49295 49296 7ff719792470 204 API calls 48892->49296 48894->48891 48897 7ff71979cfc0 memcmp 48894->48897 48896 7ff71979d085 48899 7ff71978d020 7 API calls 48896->48899 48897->48891 48898->48892 48900 7ff71979d0cf 48899->48900 48901 7ff71979d0ec 48900->48901 49297 7ff719790f20 11 API calls std::_Facet_Register 48900->49297 48903 7ff71979d114 48901->48903 49298 7ff719795e80 25 API calls std::_Facet_Register 48901->49298 49299 7ff71978f600 8 API calls 48903->49299 48906 7ff71979d126 48907 7ff71978bee0 2 API calls 48906->48907 48908 7ff71979d130 memset 48907->48908 49300 7ff719795010 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 48908->49300 48910 7ff71979d155 49301 7ff719795230 6 API calls 48910->49301 48912 7ff71979d17f 49302 7ff7197a6c80 16 API calls 48912->49302 48915 7ff71979d1d2 48916 7ff71979d242 48915->48916 48918 7ff71979d1e0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD ?setw@std@@YA?AU?$_Smanip@_J@1@_J 48915->48918 49303 7ff7197a1bd0 15 API calls 48916->49303 48919 7ff71979d22f ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H 48918->48919 48919->48916 48919->48918 48920 7ff71979d269 48921 7ff71979d2c5 48920->48921 48922 7ff71979d2c0 48920->48922 48925 7ff71979d2b9 _invalid_parameter_noinfo_noreturn 48920->48925 48923 7ff71979d2e8 48921->48923 48927 7ff71978f740 7 API calls 48921->48927 49304 7ff7197f169c free 48922->49304 49305 7ff719794b50 8 API calls 48923->49305 48925->48922 48929 7ff71979d2e0 48927->48929 48928 7ff71979d2f9 49306 7ff71979e070 23 API calls 48928->49306 48930 7ff71979b690 25 API calls 48929->48930 48930->48923 48932 7ff71979d304 48933 7ff71978d020 7 API calls 48932->48933 48934 7ff71979d34f 48933->48934 48935 7ff71979d367 48934->48935 49307 7ff719790f20 11 API calls std::_Facet_Register 48934->49307 48939 7ff71979d38f 48935->48939 49308 7ff719795e80 25 API calls std::_Facet_Register 48935->49308 48938 7ff71979d3e0 49309 7ff7197f169c free 48938->49309 48939->48938 48941 7ff71979d3d9 _invalid_parameter_noinfo_noreturn 48939->48941 48943 7ff71979d3e5 48939->48943 48941->48938 48944 7ff71978d020 7 API calls 48943->48944 48961 7ff71979d69d 48943->48961 48945 7ff71979d43f 48944->48945 48946 7ff71979d457 48945->48946 49310 7ff719790f20 11 API calls std::_Facet_Register 48945->49310 48948 7ff71979d47f 48946->48948 49311 7ff719795e80 25 API calls std::_Facet_Register 48946->49311 48951 7ff71978bee0 2 API calls 48948->48951 48950 7ff71978d020 7 API calls 48950->48961 48952 7ff71979d4a0 48951->48952 48954 7ff71979d4af 48952->48954 48955 7ff71979d4a4 Sleep 48952->48955 48957 7ff71978d020 7 API calls 48954->48957 48955->48954 48958 7ff71979d4ff 48957->48958 48959 7ff71979d517 48958->48959 49312 7ff719790f20 11 API calls std::_Facet_Register 48958->49312 48970 7ff71979d53f 48959->48970 49313 7ff719795e80 25 API calls std::_Facet_Register 48959->49313 48961->48950 48963 7ff71979d846 _invalid_parameter_noinfo_noreturn 48961->48963 48964 7ff71979d87a 48961->48964 48966 7ff71979daaf 48961->48966 48968 7ff71979daa7 48961->48968 48972 7ff71979d6da _invalid_parameter_noinfo_noreturn 48961->48972 49320 7ff7197f1420 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task std::_Facet_Register 48961->49320 49321 7ff719790f20 11 API calls std::_Facet_Register 48961->49321 49322 7ff719795e80 25 API calls std::_Facet_Register 48961->49322 49323 7ff7197f169c free 48961->49323 48963->48961 49324 7ff71978ae60 7 API calls 48964->49324 49329 7ff719795510 10 API calls _Receive_impl 48966->49329 49328 7ff7197f169c free 48968->49328 48969 7ff71979d8a7 49325 7ff719795e30 25 API calls 48969->49325 48976 7ff71978ef20 8 API calls 48970->48976 48972->48961 48980 7ff71979d571 48976->48980 48977 7ff71979d8b8 49326 7ff71978f600 8 API calls 48977->49326 48983 7ff71979d5b0 48980->48983 48986 7ff71979d5ab 48980->48986 48990 7ff71979d5a4 _invalid_parameter_noinfo_noreturn 48980->48990 48997 7ff71978d020 7 API calls 48983->48997 48985 7ff71979d8c7 48989 7ff71978bee0 2 API calls 48985->48989 49314 7ff7197f169c free 48986->49314 48994 7ff71979d8d1 48989->48994 48990->48986 49327 7ff71978c8f0 memcmp 48994->49327 49004 7ff71979d5ff 48997->49004 49012 7ff71979d617 49004->49012 49315 7ff719790f20 11 API calls std::_Facet_Register 49004->49315 49006 7ff71979d8e4 49007 7ff71979d8ec 49006->49007 49025 7ff71979da58 49006->49025 49019 7ff71979da42 MessageBoxA 49007->49019 49018 7ff71979d63f 49012->49018 49316 7ff719795e80 25 API calls std::_Facet_Register 49012->49316 49317 7ff719794b50 8 API calls 49018->49317 49024 7ff71979da9e exit 49019->49024 49024->48968 49027 7ff71979da80 ShellExecuteA 49025->49027 49027->49024 49028 7ff71979d653 49318 7ff71979def0 23 API calls 49028->49318 49064 7ff71978d4a0 49063->49064 49065 7ff71978d3d6 49063->49065 49332 7ff719781ad0 ?_Xlength_error@std@@YAXPEBD 49064->49332 49066 7ff71978d3dc memcpy 49065->49066 49072 7ff71978d3fb 49065->49072 49066->48810 49068 7ff71978d40c 49330 7ff7197f1420 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task std::_Facet_Register 49068->49330 49069 7ff71978d4a5 49333 7ff719781a30 __std_exception_copy Concurrency::cancel_current_task 49069->49333 49070 7ff71978d44d 49071 7ff71978d474 memcpy 49070->49071 49071->48810 49072->49068 49072->49069 49072->49070 49073 7ff71978d46c 49072->49073 49331 7ff7197f1420 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task std::_Facet_Register 49073->49331 49076 7ff71978d4ab 49078 7ff71978d422 49079 7ff71978d465 _invalid_parameter_noinfo_noreturn 49078->49079 49080 7ff71978d427 49078->49080 49079->49073 49080->49071 49082 7ff719795a15 49081->49082 49083 7ff719795a4b 49081->49083 49082->49083 49084 7ff719795a43 49082->49084 49085 7ff719795a85 _invalid_parameter_noinfo_noreturn 49082->49085 49087 7ff71978bee0 49083->49087 49334 7ff7197f169c free 49084->49334 49088 7ff71978bf1f 49087->49088 49089 7ff71978bef3 49087->49089 49093 7ff71978d020 49088->49093 49090 7ff71978bf17 49089->49090 49091 7ff71978bf38 _invalid_parameter_noinfo_noreturn 49089->49091 49335 7ff7197f169c free 49090->49335 49094 7ff71978d062 49093->49094 49095 7ff71978d049 49093->49095 49096 7ff71978d13f 49094->49096 49097 7ff71978d078 49094->49097 49095->48818 49338 7ff719781ad0 ?_Xlength_error@std@@YAXPEBD 49096->49338 49098 7ff71978d07e memcpy 49097->49098 49105 7ff71978d0a4 49097->49105 49098->48818 49100 7ff71978d0b0 49336 7ff7197f1420 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task std::_Facet_Register 49100->49336 49101 7ff71978d144 49339 7ff719781a30 __std_exception_copy Concurrency::cancel_current_task 49101->49339 49102 7ff71978d114 memcpy 49102->48818 49105->49100 49105->49101 49105->49102 49106 7ff71978d10c 49105->49106 49337 7ff7197f1420 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task std::_Facet_Register 49106->49337 49108 7ff71978d0c6 49110 7ff71978d0cb 49108->49110 49111 7ff71978d105 _invalid_parameter_noinfo_noreturn 49108->49111 49109 7ff71978d14a 49110->49102 49111->49106 49113 7ff71978db86 49112->49113 49114 7ff71978dc5b 49112->49114 49116 7ff71978dc32 49113->49116 49120 7ff71978db99 memcpy memcpy memcpy 49113->49120 49341 7ff71978c730 ?_Xout_of_range@std@@YAXPEBD 49114->49341 49340 7ff71978e0b0 12 API calls 3 library calls 49116->49340 49119 7ff71978dc4a 49119->48820 49120->48820 49123 7ff71978f680 49122->49123 49124 7ff71978c520 10 API calls 49123->49124 49125 7ff71978f68e 49124->49125 49125->48825 49127 7ff719799456 49126->49127 49127->49127 49128 7ff7197997f5 49127->49128 49129 7ff7197994a1 49127->49129 49130 7ff719799481 memcpy 49127->49130 49349 7ff719781ad0 ?_Xlength_error@std@@YAXPEBD 49128->49349 49342 7ff71978e9c0 4 API calls 2 library calls 49129->49342 49132 7ff7197994f9 49130->49132 49135 7ff71978db60 16 API calls 49132->49135 49137 7ff719799512 49135->49137 49136 7ff7197994d1 memcpy 49136->49132 49138 7ff71978d020 7 API calls 49137->49138 49139 7ff71979956a 49138->49139 49140 7ff71978db60 16 API calls 49139->49140 49141 7ff71979958b 49140->49141 49142 7ff7197995fb _popen 49141->49142 49143 7ff7197995f5 49141->49143 49146 7ff7197995ee _invalid_parameter_noinfo_noreturn 49141->49146 49144 7ff7197997b8 49142->49144 49145 7ff719799657 fgets 49142->49145 49343 7ff7197f169c free 49143->49343 49347 7ff719795f70 7 API calls 49144->49347 49149 7ff7197996ad _pclose 49145->49149 49153 7ff71979966e 49145->49153 49146->49143 49150 7ff7197996f7 49149->49150 49155 7ff7197996c2 49149->49155 49156 7ff719799749 49150->49156 49160 7ff719799744 49150->49160 49164 7ff71979973d _invalid_parameter_noinfo_noreturn 49150->49164 49152 7ff7197997d6 49348 7ff719781af0 9 API calls 49152->49348 49166 7ff71978ef20 8 API calls 49153->49166 49154 7ff7197996f2 49344 7ff7197f169c free 49154->49344 49155->49154 49158 7ff7197996eb _invalid_parameter_noinfo_noreturn 49155->49158 49162 7ff71979978a 49156->49162 49167 7ff719799785 49156->49167 49171 7ff71979977e _invalid_parameter_noinfo_noreturn 49156->49171 49158->49154 49345 7ff7197f169c free 49160->49345 49161 7ff7197997e4 _CxxThrowException 49161->49128 49163 7ff7197f1400 8 API calls 49162->49163 49169 7ff71979979c 49163->49169 49164->49160 49170 7ff719799696 fgets 49166->49170 49346 7ff7197f169c free 49167->49346 49172 7ff7197a3620 49169->49172 49170->49149 49170->49153 49171->49167 49173 7ff7197a362d calloc 49172->49173 49179 7ff7197a3690 49172->49179 49175 7ff7197a3682 49173->49175 49177 7ff7197a36bc 49175->49177 49350 7ff7197bb8f0 49175->49350 49176 7ff7197a36b1 49176->48834 49177->48834 49179->49177 49381 7ff7197b4970 calloc 49179->49381 49181 7ff71979cc35 49180->49181 49182 7ff7197a217a 49180->49182 49181->48837 49183 7ff7197a217c 49182->49183 49184 7ff7197a2199 malloc 49182->49184 49183->49184 49184->49181 49187 7ff7197a21b5 49184->49187 49185 7ff7197a224b 49185->49181 49187->49181 49187->49185 49439 7ff7197a7100 realloc free 49187->49439 49189 7ff719794ea3 49188->49189 49190 7ff719794efa 49189->49190 49193 7ff719794ead memcpy 49189->49193 49191 7ff719794f02 memcpy 49190->49191 49192 7ff719794f55 49190->49192 49194 7ff719794f3b 49191->49194 49195 7ff719794f3e memcpy 49191->49195 49196 7ff719794fff 49192->49196 49197 7ff719794f6e 49192->49197 49200 7ff719794fed 49193->49200 49194->49195 49195->49200 49441 7ff719781ad0 ?_Xlength_error@std@@YAXPEBD 49196->49441 49440 7ff71978e9c0 4 API calls 2 library calls 49197->49440 49200->48843 49203 7ff719794fa8 memcpy 49205 7ff719794fd5 49203->49205 49206 7ff719794fd8 memcpy 49203->49206 49205->49206 49206->49200 49208 7ff71978f8be 49207->49208 49209 7ff71978d020 7 API calls 49208->49209 49210 7ff71978f8ea 49209->49210 49211 7ff71978db60 16 API calls 49210->49211 49212 7ff71978f908 49211->49212 49213 7ff71978f973 49212->49213 49214 7ff71978f96e 49212->49214 49215 7ff71978f967 _invalid_parameter_noinfo_noreturn 49212->49215 49217 7ff71978c520 49213->49217 49442 7ff7197f169c free 49214->49442 49215->49214 49218 7ff71978c582 49217->49218 49219 7ff71978c543 memcpy 49217->49219 49443 7ff71978d950 9 API calls 3 library calls 49218->49443 49219->48852 49222 7ff71978c598 49222->48852 49224 7ff71978fabe 49223->49224 49225 7ff71978d020 7 API calls 49224->49225 49226 7ff71978faea 49225->49226 49227 7ff71978db60 16 API calls 49226->49227 49229 7ff71978fb08 49227->49229 49228 7ff71978fb73 49228->48855 49229->49228 49230 7ff71978fb6e 49229->49230 49231 7ff71978fb67 _invalid_parameter_noinfo_noreturn 49229->49231 49444 7ff7197f169c free 49230->49444 49231->49230 49234 7ff71978f6f0 49233->49234 49234->49234 49235 7ff71978c520 10 API calls 49234->49235 49236 7ff71978f704 49235->49236 49237 7ff71978fb80 49236->49237 49238 7ff71978fb9e 49237->49238 49239 7ff71978d020 7 API calls 49238->49239 49240 7ff71978fbca 49239->49240 49241 7ff71978db60 16 API calls 49240->49241 49243 7ff71978fbe8 49241->49243 49242 7ff71978fc53 49242->48863 49243->49242 49244 7ff71978fc4e 49243->49244 49246 7ff71978fc47 _invalid_parameter_noinfo_noreturn 49243->49246 49445 7ff7197f169c free 49244->49445 49246->49244 49248 7ff7197a3605 49247->49248 49249 7ff71979cee0 49247->49249 49446 7ff7197b4030 49248->49446 49251 7ff71978bf80 49249->49251 49252 7ff71978bfae 49251->49252 49253 7ff71978c089 49252->49253 49259 7ff71978bfc4 49252->49259 49485 7ff719781ad0 ?_Xlength_error@std@@YAXPEBD 49253->49485 49254 7ff71978bfca 49254->48886 49256 7ff71978c08e 49486 7ff719781a30 __std_exception_copy Concurrency::cancel_current_task 49256->49486 49257 7ff71978bffa 49483 7ff7197f1420 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task std::_Facet_Register 49257->49483 49258 7ff71978c05e memcpy 49258->48886 49259->49254 49259->49256 49259->49257 49259->49258 49260 7ff71978c059 49259->49260 49484 7ff7197f1420 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task std::_Facet_Register 49260->49484 49264 7ff71978c094 49487 7ff719782eb0 15 API calls 49264->49487 49265 7ff71978c010 49267 7ff71978c052 _invalid_parameter_noinfo_noreturn 49265->49267 49268 7ff71978c018 49265->49268 49267->49260 49268->49258 49273 7ff71978ef3d memcpy 49272->49273 49279 7ff71978ef67 49272->49279 49273->48813 49275 7ff71978f06c 49491 7ff719781ad0 ?_Xlength_error@std@@YAXPEBD 49275->49491 49277 7ff71978efce 49488 7ff7197f1420 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task std::_Facet_Register 49277->49488 49278 7ff71978f071 49492 7ff719781a30 __std_exception_copy Concurrency::cancel_current_task 49278->49492 49279->49275 49279->49277 49281 7ff71978efb3 49279->49281 49284 7ff71978efc1 49279->49284 49285 7ff71978eff9 49279->49285 49283 7ff71978f001 memcpy 49281->49283 49289 7ff71978f04f 49283->49289 49290 7ff71978f022 49283->49290 49284->49277 49284->49278 49489 7ff7197f1420 __std_exception_copy malloc _CxxThrowException Concurrency::cancel_current_task std::_Facet_Register 49285->49489 49286 7ff71978f065 _invalid_parameter_noinfo_noreturn 49286->49275 49287 7ff71978f077 49289->48813 49290->49286 49292 7ff71978f047 49290->49292 49291 7ff71978efe6 49291->49283 49291->49286 49490 7ff7197f169c free 49292->49490 49296->48896 49297->48901 49298->48903 49299->48906 49300->48910 49301->48912 49302->48915 49303->48920 49305->48928 49306->48932 49307->48935 49308->48939 49310->48946 49311->48948 49312->48959 49313->48970 49315->49012 49316->49018 49317->49028 49320->48961 49321->48961 49322->48961 49324->48969 49325->48977 49326->48985 49327->49006 49330->49078 49331->49080 49333->49076 49336->49108 49337->49110 49339->49109 49340->49119 49342->49136 49347->49152 49348->49161 49351 7ff7197bb956 49350->49351 49352 7ff7197bb90e WSAStartup 49350->49352 49400 7ff7197e43f0 49351->49400 49353 7ff7197bb922 49352->49353 49354 7ff7197bb939 49352->49354 49353->49351 49356 7ff7197bb933 WSACleanup 49353->49356 49357 7ff7197f1400 8 API calls 49354->49357 49356->49354 49359 7ff7197bb94e 49357->49359 49359->49179 49360 7ff7197bbc1f 49362 7ff7197f1400 8 API calls 49360->49362 49361 7ff7197bb963 GetModuleHandleA 49363 7ff7197bb992 49361->49363 49364 7ff7197bb99e GetProcAddress strpbrk 49361->49364 49368 7ff7197bbc2f 49362->49368 49365 7ff7197bbb23 7 API calls 49363->49365 49366 7ff7197bb9d5 49364->49366 49367 7ff7197bb9fb 49364->49367 49365->49360 49369 7ff7197bb9ed LoadLibraryA 49366->49369 49373 7ff7197bb9dd 49366->49373 49370 7ff7197bba00 GetProcAddress 49367->49370 49371 7ff7197bba2a GetSystemDirectoryA 49367->49371 49368->49179 49369->49373 49370->49371 49372 7ff7197bba15 LoadLibraryExA 49370->49372 49371->49373 49374 7ff7197bba47 malloc 49371->49374 49372->49373 49373->49365 49375 7ff7197bbafe GetProcAddress 49373->49375 49376 7ff7197bbad9 free 49374->49376 49377 7ff7197bba5c GetSystemDirectoryA 49374->49377 49375->49365 49376->49373 49377->49376 49378 7ff7197bba6c 49377->49378 49379 7ff7197bbad0 LoadLibraryA 49378->49379 49380 7ff7197bbac6 49378->49380 49379->49380 49380->49376 49382 7ff7197b49a5 49381->49382 49383 7ff7197b4996 49381->49383 49434 7ff7197ade90 calloc 49382->49434 49383->49176 49385 7ff7197b49c8 49386 7ff7197b49ce free 49385->49386 49387 7ff7197b49dc malloc 49385->49387 49399 7ff7197b4caa 49386->49399 49388 7ff7197b49f7 malloc 49387->49388 49389 7ff7197b4cc8 49387->49389 49388->49389 49390 7ff7197b4a12 __acrt_iob_func __acrt_iob_func __acrt_iob_func 49388->49390 49391 7ff7197b4cd4 free free 49389->49391 49435 7ff7197aee40 memset 49390->49435 49438 7ff7197b46d0 free free free 49391->49438 49394 7ff7197b4b32 49436 7ff7197b2910 free realloc GetEnvironmentVariableA realloc free 49394->49436 49397 7ff7197b4bf6 49437 7ff7197b87b0 free free free free free 49397->49437 49399->49176 49401 7ff7197e43fe 49400->49401 49407 7ff7197bb95b 49400->49407 49408 7ff7197bb770 49401->49408 49405 7ff7197e442a 49406 7ff7197e4436 GetProcAddressForCaller 49405->49406 49405->49407 49406->49407 49407->49360 49407->49361 49409 7ff7197bb79d 49408->49409 49410 7ff7197bb84f VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 49409->49410 49411 7ff7197bb7b5 49409->49411 49412 7ff7197bb892 VerSetConditionMask 49410->49412 49413 7ff7197bb8a4 VerifyVersionInfoA 49410->49413 49414 7ff7197f1400 8 API calls 49411->49414 49412->49413 49413->49411 49415 7ff7197bb8db 49414->49415 49416 7ff7197bb5d0 GetModuleHandleA 49415->49416 49417 7ff7197bb5f2 49416->49417 49418 7ff7197bb5fa GetProcAddress strpbrk 49416->49418 49417->49405 49419 7ff7197bb627 49418->49419 49420 7ff7197bb65e 49418->49420 49423 7ff7197bb62f 49419->49423 49424 7ff7197bb648 LoadLibraryA 49419->49424 49421 7ff7197bb696 GetSystemDirectoryA 49420->49421 49422 7ff7197bb663 GetProcAddress 49420->49422 49426 7ff7197bb6b0 malloc 49421->49426 49427 7ff7197bb758 49421->49427 49422->49421 49425 7ff7197bb678 LoadLibraryExA 49422->49425 49423->49405 49424->49405 49425->49405 49429 7ff7197bb74a free 49426->49429 49430 7ff7197bb6dd GetSystemDirectoryA 49426->49430 49427->49405 49429->49427 49430->49429 49431 7ff7197bb6ed 49430->49431 49432 7ff7197bb741 LoadLibraryA 49431->49432 49433 7ff7197bb736 49431->49433 49432->49433 49433->49429 49434->49385 49435->49394 49436->49397 49437->49399 49439->49187 49440->49203 49443->49222 49447 7ff7197b403f 49446->49447 49448 7ff7197b423b 49446->49448 49447->49448 49479 7ff7197a8af0 8 API calls 49447->49479 49448->49249 49450 7ff7197b405d 49451 7ff7197b4071 49450->49451 49480 7ff7197a9a00 287 API calls 49450->49480 49453 7ff7197b4082 49451->49453 49481 7ff7197a96f0 287 API calls 49451->49481 49455 7ff7197b40a6 free 49453->49455 49456 7ff7197b40b3 49453->49456 49455->49456 49482 7ff7197b4670 287 API calls 49456->49482 49479->49450 49480->49451 49481->49453 49483->49265 49484->49258 49486->49264 49488->49291 49489->49291 49492->49287 49493 7ff7197a37a2 49494 7ff7197a37a8 49493->49494 49496 7ff7197a37d3 49493->49496 49516 7ff7197a96f0 287 API calls 49494->49516 49498 7ff7197a3828 49496->49498 49503 7ff7197a99d0 49496->49503 49506 7ff7197a98c0 49496->49506 49497 7ff7197a37b0 49517 7ff7197a9a00 287 API calls 49498->49517 49501 7ff7197a3848 49518 7ff7197a8e90 49503->49518 49507 7ff7197bfa30 2 API calls 49506->49507 49508 7ff7197a98e7 49507->49508 49509 7ff7197a9908 49508->49509 49512 7ff7197a9943 49508->49512 49571 7ff7197aa2f0 49508->49571 49509->49496 49513 7ff7197a999c 49512->49513 49584 7ff7197c1500 8 API calls 49512->49584 49585 7ff7197a9430 8 API calls 49512->49585 49513->49509 49586 7ff7197a9390 10 API calls 49513->49586 49516->49497 49517->49501 49519 7ff7197a9309 49518->49519 49526 7ff7197a8ef1 49518->49526 49520 7ff7197a8f06 49521 7ff7197f1400 8 API calls 49520->49521 49523 7ff7197a901b 49521->49523 49523->49496 49524 7ff7197a8faa 49525 7ff7197a8fe4 malloc 49524->49525 49532 7ff7197a9031 49524->49532 49527 7ff7197a8ff8 49525->49527 49528 7ff7197a902c 49525->49528 49526->49519 49526->49520 49542 7ff7197ab490 49526->49542 49527->49520 49528->49532 49529 7ff7197a9295 49531 7ff7197a92a4 free 49529->49531 49533 7ff7197a92ad 49529->49533 49531->49533 49532->49529 49549 7ff7197c7ec0 49532->49549 49533->49519 49536 7ff7197ab490 10 API calls 49533->49536 49534 7ff7197a91bb 49534->49529 49534->49534 49535 7ff7197a9268 49534->49535 49537 7ff7197a9270 recv 49535->49537 49538 7ff7197a92ec 49536->49538 49537->49537 49539 7ff7197a9290 49537->49539 49538->49519 49540 7ff7197a92fd 49538->49540 49539->49529 49566 7ff7197c85a0 WSASetLastError Sleep 49540->49566 49543 7ff7197ab557 49542->49543 49544 7ff7197ab4ae 49542->49544 49543->49524 49567 7ff7197bfa30 49544->49567 49546 7ff7197ab4bd 49570 7ff7197c13f0 8 API calls 49546->49570 49548 7ff7197ab4dd 49548->49524 49550 7ff7197c7f12 49549->49550 49551 7ff7197c7ef6 49549->49551 49552 7ff7197c817e 49550->49552 49553 7ff7197c7f21 WSASetLastError 49550->49553 49554 7ff7197c824a Sleep 49550->49554 49551->49550 49562 7ff7197c7f38 49551->49562 49555 7ff7197f1400 8 API calls 49552->49555 49553->49552 49554->49552 49556 7ff7197c81b2 49555->49556 49556->49534 49557 7ff7197c8100 select 49564 7ff7197c80d8 49557->49564 49558 7ff7197c80d4 49560 7ff7197c80e1 WSASetLastError 49558->49560 49561 7ff7197c80f6 Sleep 49558->49561 49558->49564 49560->49564 49561->49564 49562->49557 49562->49558 49563 7ff7197c81ff __WSAFDIsSet 49563->49564 49565 7ff7197c8217 __WSAFDIsSet 49563->49565 49564->49552 49564->49563 49564->49565 49565->49564 49566->49519 49568 7ff7197bfa42 QueryPerformanceCounter 49567->49568 49569 7ff7197bfa7d GetTickCount 49567->49569 49568->49546 49569->49546 49570->49548 49574 7ff7197ab3f2 49571->49574 49583 7ff7197aa32e 49571->49583 49572 7ff7197ab3e3 49646 7ff7197b8980 16 API calls 49572->49646 49574->49508 49577 7ff7197b8980 16 API calls 49578 7ff7197aa3ee 49577->49578 49578->49577 49578->49583 49583->49572 49583->49574 49583->49578 49587 7ff7197ba200 49583->49587 49593 7ff7197b8980 16 API calls 49583->49593 49594 7ff7197a9dd0 49583->49594 49622 7ff7197b44f0 49583->49622 49644 7ff7197a8af0 8 API calls 49583->49644 49645 7ff7197c7460 19 API calls 49583->49645 49584->49512 49585->49512 49586->49509 49588 7ff7197ba24a 49587->49588 49589 7ff7197bfa30 2 API calls 49588->49589 49590 7ff7197ba26a 49588->49590 49589->49590 49591 7ff7197f1400 8 API calls 49590->49591 49592 7ff7197ba2fe 49591->49592 49592->49583 49593->49583 49595 7ff7197a9e0c 49594->49595 49602 7ff7197a9ee2 49594->49602 49647 7ff7197ae010 49595->49647 49597 7ff7197a9e17 free free 49599 7ff7197a9e47 49597->49599 49598 7ff7197f1400 8 API calls 49600 7ff7197a9f17 49598->49600 49604 7ff7197a9e85 49599->49604 49668 7ff7197c6f40 19 API calls 49599->49668 49600->49583 49602->49598 49603 7ff7197a9f4c 49662 7ff7197c07a0 49603->49662 49604->49602 49604->49603 49669 7ff7197c1160 free free free free 49604->49669 49608 7ff7197a9f7b 49609 7ff7197a9f80 free 49608->49609 49609->49609 49610 7ff7197a9f9e 49609->49610 49611 7ff7197aa0cb 49610->49611 49613 7ff7197aa007 49610->49613 49612 7ff7197b44f0 83 API calls 49611->49612 49614 7ff7197aa0fd 49612->49614 49670 7ff7197b1800 85 API calls 49613->49670 49673 7ff7197b4670 287 API calls 49614->49673 49617 7ff7197aa087 49618 7ff7197aa0b5 49617->49618 49619 7ff7197aa08b 49617->49619 49672 7ff7197b4670 287 API calls 49618->49672 49671 7ff7197b4670 287 API calls 49619->49671 49623 7ff7197b462c 49622->49623 49625 7ff7197b4512 49622->49625 49623->49583 49624 7ff7197b453f 49627 7ff7197c07a0 9 API calls 49624->49627 49625->49623 49625->49624 49681 7ff7197c1160 free free free free 49625->49681 49628 7ff7197b4552 49627->49628 49678 7ff7197e2c80 49628->49678 49644->49583 49645->49583 49646->49574 49648 7ff7197ae025 49647->49648 49649 7ff7197ae030 49647->49649 49648->49649 49675 7ff7197cb020 WaitForSingleObjectEx CloseHandle 49648->49675 49651 7ff7197ae1d4 free 49649->49651 49652 7ff7197ae148 EnterCriticalSection LeaveCriticalSection 49649->49652 49651->49597 49653 7ff7197ae181 CloseHandle 49652->49653 49654 7ff7197ae18b 49652->49654 49658 7ff7197ae1ac 49653->49658 49655 7ff7197ae199 49654->49655 49674 7ff7197cb020 WaitForSingleObjectEx CloseHandle 49654->49674 49676 7ff7197ae1f0 7 API calls 49655->49676 49657 7ff7197ae1c1 closesocket 49657->49651 49658->49657 49677 7ff7197a8bd0 free 49658->49677 49660 7ff7197ae1a2 free 49660->49658 49663 7ff7197c07c1 49662->49663 49667 7ff7197c081a 49662->49667 49665 7ff7197c07e3 _time64 49663->49665 49663->49667 49664 7ff7197f1400 8 API calls 49666 7ff7197a9f5b free 49664->49666 49665->49667 49666->49608 49666->49610 49667->49664 49668->49604 49669->49603 49670->49617 49674->49655 49675->49649 49676->49660 49677->49657 49682 7ff7197e6200 8 API calls 49678->49682 49680 7ff7197e2c95 49681->49624 49682->49680 49683 7ff7197c0e60 49684 7ff7197c0eae 49683->49684 49715 7ff7197c11d0 49684->49715 49687 7ff7197f1400 8 API calls 49689 7ff7197c1062 49687->49689 49688 7ff7197c0f66 49690 7ff7197c0f6a 49688->49690 49691 7ff7197c0f8b 49688->49691 49753 7ff7197cab30 15 API calls 49690->49753 49692 7ff7197c9b80 13 API calls 49691->49692 49696 7ff7197c0f9d 49692->49696 49693 7ff7197c0ecb 49714 7ff7197c1035 49693->49714 49725 7ff7197c9b80 49693->49725 49695 7ff7197c0f7f 49695->49691 49697 7ff7197c107a 49695->49697 49698 7ff7197c0fc2 49696->49698 49699 7ff7197c0fa1 49696->49699 49700 7ff7197c1084 49697->49700 49709 7ff7197c0ff3 49698->49709 49698->49714 49755 7ff7197e4920 523 API calls 49698->49755 49754 7ff7197cab30 15 API calls 49699->49754 49757 7ff7197c03e0 20 API calls 49700->49757 49703 7ff7197c0fb6 49703->49697 49703->49698 49704 7ff7197c10a6 49705 7ff7197c102e 49704->49705 49758 7ff7197ca900 free free free 49704->49758 49705->49714 49708 7ff7197c1010 49710 7ff7197c1030 49708->49710 49711 7ff7197c1029 49708->49711 49708->49714 49709->49697 49709->49708 49739 7ff7197adec0 49710->49739 49756 7ff7197e4b20 309 API calls 49711->49756 49714->49687 49716 7ff7197c1210 49715->49716 49717 7ff7197c1236 tolower 49716->49717 49718 7ff7197c124b 49716->49718 49717->49717 49717->49718 49719 7ff7197c12cc 49718->49719 49720 7ff7197c12a8 tolower 49718->49720 49724 7ff7197c1325 49718->49724 49721 7ff7197c1306 _time64 49719->49721 49719->49724 49720->49719 49721->49724 49722 7ff7197f1400 8 API calls 49723 7ff7197c136c 49722->49723 49723->49693 49724->49722 49726 7ff7197c9b8c 49725->49726 49730 7ff7197c9bb6 49725->49730 49727 7ff7197c9b91 _errno 49726->49727 49736 7ff7197c9ba7 49726->49736 49727->49688 49728 7ff7197c9c77 49728->49688 49729 7ff7197c9c10 strchr 49729->49730 49730->49728 49730->49729 49731 7ff7197c9d20 strchr 49733 7ff7197c9d40 strchr 49731->49733 49731->49736 49732 7ff7197f1400 8 API calls 49734 7ff7197c9e86 49732->49734 49733->49736 49734->49688 49735 7ff7197c9e35 49738 7ff7197c9dcd 49735->49738 49759 7ff7197c9bd0 strchr 49735->49759 49736->49731 49736->49735 49736->49738 49738->49732 49740 7ff7197adef6 EnterCriticalSection LeaveCriticalSection 49739->49740 49741 7ff7197adeee 49739->49741 49742 7ff7197adf16 49740->49742 49743 7ff7197adf6e 49740->49743 49741->49714 49760 7ff7197caf00 49742->49760 49744 7ff7197bfa30 2 API calls 49743->49744 49744->49741 49747 7ff7197adf56 49767 7ff7197ae130 49747->49767 49748 7ff7197adf39 49779 7ff7197ae640 16 API calls 49748->49779 49751 7ff7197adf41 49752 7ff7197ae130 16 API calls 49751->49752 49752->49741 49753->49695 49754->49703 49755->49709 49756->49705 49757->49704 49758->49705 49759->49738 49761 7ff7197adf2c 49760->49761 49762 7ff7197caf29 49760->49762 49761->49747 49761->49748 49762->49761 49763 7ff7197caf3f 49762->49763 49780 7ff7197c03e0 20 API calls 49763->49780 49765 7ff7197caf67 49765->49761 49781 7ff7197ca900 free free free 49765->49781 49768 7ff7197ae1d4 free 49767->49768 49769 7ff7197ae148 EnterCriticalSection LeaveCriticalSection 49767->49769 49768->49741 49770 7ff7197ae181 CloseHandle 49769->49770 49771 7ff7197ae18b 49769->49771 49772 7ff7197ae1ac 49770->49772 49773 7ff7197ae199 49771->49773 49782 7ff7197cb020 WaitForSingleObjectEx CloseHandle 49771->49782 49775 7ff7197ae1c1 closesocket 49772->49775 49784 7ff7197a8bd0 free 49772->49784 49783 7ff7197ae1f0 7 API calls 49773->49783 49775->49768 49777 7ff7197ae1a2 free 49777->49772 49779->49751 49780->49765 49781->49761 49782->49773 49783->49777 49784->49775 49785 7ff7197cc285 49786 7ff7197cc289 49785->49786 49801 7ff7197cc357 49786->49801 49810 7ff7197cc310 strtol 49786->49810 49816 7ff7197cc332 strchr 49786->49816 49836 7ff7197cc3b7 49786->49836 49891 7ff7197cb6b0 62 API calls 49786->49891 49787 7ff7197cc815 calloc 49790 7ff7197cc83c 49787->49790 49791 7ff7197cc8b8 49787->49791 49788 7ff7197cc376 strchr 49789 7ff7197cc38f strncmp 49788->49789 49809 7ff7197cc4db 49788->49809 49792 7ff7197cc3d0 strncmp 49789->49792 49797 7ff7197cc3ac 49789->49797 49897 7ff7197b8980 16 API calls 49790->49897 49804 7ff7197cc914 CertFreeCertificateContext 49791->49804 49805 7ff7197cc91a 49791->49805 49796 7ff7197cc3f2 strncmp 49792->49796 49792->49797 49794 7ff7197cc89b 49899 7ff7197b8980 16 API calls 49794->49899 49795 7ff7197cc5ee fopen 49795->49794 49802 7ff7197cc607 fseek 49795->49802 49796->49797 49806 7ff7197cc414 strncmp 49796->49806 49798 7ff7197cc4a9 strchr 49797->49798 49807 7ff7197cc4c3 _strdup 49798->49807 49798->49809 49799 7ff7197cc84b 49800 7ff7197cc859 CertFreeCertificateContext 49799->49800 49885 7ff7197ccad6 49799->49885 49800->49885 49801->49787 49801->49788 49811 7ff7197cc631 ftell 49802->49811 49812 7ff7197cc63d 49802->49812 49804->49805 49813 7ff7197cc983 49805->49813 49814 7ff7197cc91e 49805->49814 49806->49797 49815 7ff7197cc433 strncmp 49806->49815 49808 7ff7197cc4e3 49807->49808 49807->49809 49808->49809 49831 7ff7197cc504 CertOpenStore 49808->49831 49809->49794 49809->49795 49810->49786 49810->49816 49811->49812 49817 7ff7197cc64e fseek 49812->49817 49818 7ff7197cc869 fclose 49812->49818 49826 7ff7197c9b80 13 API calls 49813->49826 49900 7ff7197a22e0 GetLastError _errno 49814->49900 49815->49798 49821 7ff7197cc44a strncmp 49815->49821 49816->49786 49816->49801 49817->49818 49825 7ff7197cc66b malloc 49817->49825 49898 7ff7197b8980 16 API calls 49818->49898 49819 7ff7197f1400 8 API calls 49827 7ff7197ccc8c 49819->49827 49821->49797 49822 7ff7197cc469 strncmp 49821->49822 49822->49797 49829 7ff7197cc488 strncmp 49822->49829 49825->49818 49832 7ff7197cc684 fread 49825->49832 49833 7ff7197cc99c 49826->49833 49829->49797 49829->49809 49830 7ff7197cc888 free 49830->49885 49837 7ff7197cc557 free CryptStringToBinaryA 49831->49837 49838 7ff7197cc527 GetLastError 49831->49838 49832->49818 49839 7ff7197cc6a2 fclose 49832->49839 49844 7ff7197c9b80 13 API calls 49833->49844 49860 7ff7197cc9af 49833->49860 49835 7ff7197cc944 free 49835->49885 49887 7ff7197cc3c6 49835->49887 49892 7ff7197b8980 16 API calls 49836->49892 49845 7ff7197cc7e1 CertCloseStore 49837->49845 49846 7ff7197cc5a2 CertFindCertificateInStore 49837->49846 49893 7ff7197b8980 16 API calls 49838->49893 49842 7ff7197cc6cf malloc 49839->49842 49843 7ff7197cc6bf 49839->49843 49848 7ff7197cc713 PFXImportCertStore free free 49842->49848 49849 7ff7197cc6e9 MultiByteToWideChar 49842->49849 49843->49842 49844->49860 49845->49885 49850 7ff7197cc5d4 49846->49850 49851 7ff7197cc7fa CertCloseStore 49846->49851 49847 7ff7197cc546 free 49847->49885 49854 7ff7197cc744 GetLastError 49848->49854 49855 7ff7197cc79a CertFindCertificateInStore 49848->49855 49849->49848 49850->49845 49851->49787 49852 7ff7197cca6d calloc 49856 7ff7197ccae0 49852->49856 49857 7ff7197ccac7 49852->49857 49858 7ff7197cc781 49854->49858 49859 7ff7197cc759 49854->49859 49861 7ff7197cc7f6 49855->49861 49862 7ff7197cc7c2 GetLastError 49855->49862 49867 7ff7197ccbec 49856->49867 49868 7ff7197ccb49 free 49856->49868 49856->49885 49914 7ff7197b8980 16 API calls 49857->49914 49895 7ff7197b8980 16 API calls 49858->49895 49894 7ff7197b8980 16 API calls 49859->49894 49860->49852 49861->49851 49896 7ff7197b8980 16 API calls 49862->49896 49888 7ff7197b9240 49867->49888 49870 7ff7197ccbc6 49868->49870 49871 7ff7197ccb7a 49868->49871 49875 7ff7197a22e0 17 API calls 49870->49875 49872 7ff7197ccba0 49871->49872 49873 7ff7197ccb82 49871->49873 49877 7ff7197a22e0 17 API calls 49872->49877 49876 7ff7197a22e0 17 API calls 49873->49876 49878 7ff7197ccbd0 49875->49878 49879 7ff7197ccb89 49876->49879 49880 7ff7197ccbaa 49877->49880 49917 7ff7197b8980 16 API calls 49878->49917 49915 7ff7197b8980 16 API calls 49879->49915 49916 7ff7197b8980 16 API calls 49880->49916 49883 7ff7197ccc69 49918 7ff7197b8980 16 API calls 49883->49918 49885->49819 49887->49885 49919 7ff7197b8ee0 49888->49919 49891->49786 49892->49887 49893->49847 49894->49887 49895->49887 49896->49845 49897->49799 49898->49830 49899->49887 49902 7ff7197a2325 49900->49902 49911 7ff7197a231e 49900->49911 49901 7ff7197f1400 8 API calls 49903 7ff7197a28c3 49901->49903 49904 7ff7197a2387 FormatMessageA strchr 49902->49904 49907 7ff7197a2813 49902->49907 49913 7ff7197b8980 16 API calls 49903->49913 49905 7ff7197a23ee 49904->49905 49905->49907 49908 7ff7197a2877 strncpy 49905->49908 49906 7ff7197a288a _errno 49909 7ff7197a2895 _errno 49906->49909 49910 7ff7197a289e GetLastError 49906->49910 49907->49906 49908->49906 49909->49910 49910->49911 49912 7ff7197a28a8 SetLastError 49910->49912 49911->49901 49912->49911 49913->49835 49914->49885 49915->49887 49916->49887 49917->49887 49918->49885 49920 7ff7197b8f4f 49919->49920 49921 7ff7197b8fe7 send 49919->49921 49920->49921 49937 7ff7197c8260 49920->49937 49922 7ff7197b9005 WSAGetLastError 49921->49922 49923 7ff7197b9014 49921->49923 49922->49923 49924 7ff7197b9020 49922->49924 49927 7ff7197f1400 8 API calls 49923->49927 49961 7ff7197a2ad0 14 API calls 49924->49961 49930 7ff7197b9067 49927->49930 49928 7ff7197b9032 49962 7ff7197b8980 16 API calls 49928->49962 49930->49883 49930->49885 49932 7ff7197b9044 49932->49923 49933 7ff7197b8f8c 49934 7ff7197b8fc0 recv 49933->49934 49935 7ff7197b8f94 malloc 49933->49935 49934->49921 49936 7ff7197b8fdd 49934->49936 49935->49934 49935->49936 49936->49921 49938 7ff7197c82a7 49937->49938 49942 7ff7197c82db 49937->49942 49939 7ff7197c82b1 49938->49939 49938->49942 49940 7ff7197c82cb Sleep 49939->49940 49941 7ff7197c82b8 WSASetLastError 49939->49941 49949 7ff7197c82d4 49939->49949 49940->49949 49941->49949 49944 7ff7197c8425 49942->49944 49946 7ff7197c8453 select 49942->49946 49943 7ff7197f1400 8 API calls 49948 7ff7197b8f83 49943->49948 49947 7ff7197c842a 49944->49947 49950 7ff7197c8433 WSASetLastError 49944->49950 49951 7ff7197c8446 Sleep 49944->49951 49946->49947 49947->49949 49952 7ff7197c851c 49947->49952 49953 7ff7197c84f2 __WSAFDIsSet __WSAFDIsSet 49947->49953 49948->49921 49948->49933 49949->49943 49950->49947 49951->49947 49954 7ff7197c8524 __WSAFDIsSet 49952->49954 49955 7ff7197c854b 49952->49955 49953->49952 49956 7ff7197c8537 49954->49956 49957 7ff7197c853a __WSAFDIsSet 49954->49957 49955->49949 49958 7ff7197c8553 __WSAFDIsSet 49955->49958 49956->49957 49957->49955 49959 7ff7197c8566 49958->49959 49960 7ff7197c8569 __WSAFDIsSet 49958->49960 49959->49960 49960->49949 49961->49928 49962->49932 49963 7ff7197aa640 49964 7ff7197aa651 49963->49964 49986 7ff7197c06a0 49964->49986 49966 7ff7197aa685 49968 7ff7197aa6c4 49966->49968 49990 7ff7197c10f0 49966->49990 50025 7ff7197ab5e0 49968->50025 49975 7ff7197ab3f2 49976 7ff7197ab3e3 50051 7ff7197b8980 16 API calls 49976->50051 49978 7ff7197b44f0 83 API calls 49983 7ff7197aa34b 49978->49983 49980 7ff7197ba200 10 API calls 49980->49983 49981 7ff7197b8980 16 API calls 49982 7ff7197aa3ee 49981->49982 49982->49981 49982->49983 49983->49975 49983->49976 49983->49978 49983->49980 49983->49982 49985 7ff7197a9dd0 287 API calls 49983->49985 50047 7ff7197b8980 16 API calls 49983->50047 50049 7ff7197a8af0 8 API calls 49983->50049 50050 7ff7197c7460 19 API calls 49983->50050 49985->49983 49987 7ff7197c06ca 49986->49987 49988 7ff7197c11d0 11 API calls 49987->49988 49989 7ff7197c06e9 49988->49989 49989->49966 49991 7ff7197c1100 49990->49991 49992 7ff7197e4b6f 49991->49992 49998 7ff7197e4b98 49991->49998 50052 7ff7197b8980 16 API calls 49992->50052 49994 7ff7197e4b85 50005 7ff7197e5003 49994->50005 49995 7ff7197f1400 8 API calls 49997 7ff7197e5035 49995->49997 49997->49968 49999 7ff7197b4030 287 API calls 49998->49999 50000 7ff7197e4bfc memset 49998->50000 49998->50005 50053 7ff7197a9a00 287 API calls 49998->50053 49999->49998 50003 7ff7197e4c30 50000->50003 50002 7ff7197e4c48 free 50002->50003 50007 7ff7197e4cad 50003->50007 50054 7ff7197e5160 malloc realloc free memcpy 50003->50054 50004 7ff7197e4fdf 50004->50005 50006 7ff7197e4ff0 free 50004->50006 50005->49995 50006->50005 50006->50006 50007->50004 50008 7ff7197e4e70 50007->50008 50009 7ff7197e505d 50007->50009 50010 7ff7197e4e80 calloc 50008->50010 50018 7ff7197e4f2e htons 50008->50018 50019 7ff7197e4f5b 50008->50019 50009->50005 50011 7ff7197e5072 free 50009->50011 50012 7ff7197e5055 50010->50012 50013 7ff7197e4eb8 _strdup 50010->50013 50011->50005 50011->50011 50057 7ff7197ca900 free free free 50012->50057 50015 7ff7197e4ed0 calloc 50013->50015 50016 7ff7197e504c free 50013->50016 50015->50008 50017 7ff7197e5042 free 50015->50017 50016->50012 50017->50016 50018->50008 50019->50009 50020 7ff7197e4f64 50019->50020 50055 7ff7197c03e0 20 API calls 50020->50055 50022 7ff7197e4f96 50023 7ff7197e4fbd 50022->50023 50056 7ff7197ca900 free free free 50022->50056 50023->50004 50036 7ff7197ab646 50025->50036 50026 7ff7197ab9c8 memcpy memcpy 50027 7ff7197ab8b0 50026->50027 50028 7ff7197f1400 8 API calls 50027->50028 50029 7ff7197aa6d2 50028->50029 50029->49983 50041 7ff7197c0dc0 50029->50041 50030 7ff7197ab78e calloc 50030->50027 50035 7ff7197ab7a8 50030->50035 50031 7ff7197ab9c4 50031->50026 50033 7ff7197bfd80 malloc memcpy 50033->50035 50034 7ff7197ab8a7 free 50034->50027 50035->50027 50035->50033 50035->50034 50035->50036 50038 7ff7197ab89f 50035->50038 50058 7ff7197c00c0 50035->50058 50036->50030 50036->50035 50037 7ff7197ab8ba 50036->50037 50037->50026 50037->50031 50064 7ff7197c0050 free 50037->50064 50063 7ff7197c0050 free 50038->50063 50042 7ff7197c0dd9 50041->50042 50065 7ff7197b4f50 50042->50065 50044 7ff7197c0df0 50045 7ff7197aa5dc 50044->50045 50046 7ff7197b44f0 83 API calls 50044->50046 50045->49983 50048 7ff7197bd800 free 50045->50048 50046->50045 50047->49983 50048->49983 50049->49983 50050->49983 50051->49975 50052->49994 50053->49998 50054->50002 50055->50022 50056->50023 50057->50009 50059 7ff7197c0176 50058->50059 50060 7ff7197c00d7 50058->50060 50059->50035 50060->50059 50061 7ff7197c00f7 malloc 50060->50061 50062 7ff7197c0126 50061->50062 50062->50035 50063->50034 50064->50037 50087 7ff7197c7310 50065->50087 50068 7ff7197b4f85 50068->50044 50069 7ff7197b4fd9 50071 7ff7197bfa30 2 API calls 50069->50071 50076 7ff7197b4fe5 50069->50076 50070 7ff7197b4fae free 50099 7ff7197a7230 _strdup free 50070->50099 50073 7ff7197b500f 50071->50073 50074 7ff7197b5051 50073->50074 50075 7ff7197b5023 50073->50075 50078 7ff7197c7310 2 API calls 50074->50078 50090 7ff7197b9790 50075->50090 50076->50044 50079 7ff7197b505e 50078->50079 50082 7ff7197b5081 50079->50082 50083 7ff7197c7310 2 API calls 50079->50083 50080 7ff7197b5041 50080->50044 50081 7ff7197bfa30 2 API calls 50084 7ff7197b5114 50081->50084 50100 7ff7197ba310 50082->50100 50083->50082 50084->50044 50086 7ff7197b5039 50086->50080 50086->50081 50088 7ff7197bfa30 2 API calls 50087->50088 50089 7ff7197b4f75 50088->50089 50089->50068 50089->50069 50089->50070 50091 7ff7197bfa30 2 API calls 50090->50091 50092 7ff7197b97b3 50091->50092 50093 7ff7197b982b 50092->50093 50098 7ff7197b9844 50092->50098 50185 7ff7197b8980 16 API calls 50093->50185 50095 7ff7197b983a 50096 7ff7197b994d 50095->50096 50096->50086 50098->50096 50130 7ff7197bacd0 50098->50130 50099->50069 50101 7ff7197ba543 50100->50101 50102 7ff7197ba347 50100->50102 50103 7ff7197f1400 8 API calls 50101->50103 50102->50101 50104 7ff7197ba361 getpeername 50102->50104 50105 7ff7197ba62a 50103->50105 50106 7ff7197ba386 WSAGetLastError 50104->50106 50107 7ff7197ba3bd getsockname 50104->50107 50105->50086 50219 7ff7197a2ad0 14 API calls 50106->50219 50109 7ff7197ba410 WSAGetLastError 50107->50109 50110 7ff7197ba447 50107->50110 50221 7ff7197a2ad0 14 API calls 50109->50221 50223 7ff7197b9540 14 API calls 50110->50223 50112 7ff7197ba3a3 50220 7ff7197b8980 16 API calls 50112->50220 50114 7ff7197ba42d 50222 7ff7197b8980 16 API calls 50114->50222 50115 7ff7197ba469 50118 7ff7197ba4ad 50115->50118 50119 7ff7197ba46d _errno _errno 50115->50119 50226 7ff7197b9540 14 API calls 50118->50226 50224 7ff7197a2ad0 14 API calls 50119->50224 50120 7ff7197ba3b8 50120->50101 50123 7ff7197ba493 50225 7ff7197b8980 16 API calls 50123->50225 50124 7ff7197ba4ff 50124->50101 50126 7ff7197ba503 _errno _errno 50124->50126 50227 7ff7197a2ad0 14 API calls 50126->50227 50128 7ff7197ba529 50228 7ff7197b8980 16 API calls 50128->50228 50131 7ff7197bad3f memcpy 50130->50131 50133 7ff7197bada8 socket 50131->50133 50135 7ff7197bad7b 50131->50135 50133->50135 50134 7ff7197f1400 8 API calls 50137 7ff7197bb27b 50134->50137 50138 7ff7197bade7 50135->50138 50180 7ff7197bb104 50135->50180 50202 7ff7197c6f10 ioctlsocket 50135->50202 50137->50098 50139 7ff7197bb20a _errno _errno _errno 50138->50139 50186 7ff7197e3130 50138->50186 50214 7ff7197a2ad0 14 API calls 50139->50214 50142 7ff7197bae34 50142->50139 50144 7ff7197bae3d htons 50142->50144 50143 7ff7197bb23b 50215 7ff7197b8980 16 API calls 50143->50215 50148 7ff7197bae5e 50144->50148 50146 7ff7197bb250 50147 7ff7197b95e0 2 API calls 50146->50147 50175 7ff7197bb0e5 50147->50175 50149 7ff7197bae7f setsockopt 50148->50149 50158 7ff7197baec7 50148->50158 50150 7ff7197baead WSAGetLastError 50149->50150 50149->50158 50203 7ff7197a2ad0 14 API calls 50150->50203 50151 7ff7197bb770 14 API calls 50155 7ff7197baf11 50151->50155 50152 7ff7197baf32 getsockopt 50156 7ff7197baf63 setsockopt 50152->50156 50157 7ff7197baf59 50152->50157 50153 7ff7197baf15 50159 7ff7197baf9a setsockopt 50153->50159 50161 7ff7197bafc7 50153->50161 50155->50152 50155->50153 50156->50153 50157->50153 50157->50156 50158->50151 50158->50155 50159->50161 50165 7ff7197bafde 50159->50165 50160 7ff7197bb0b8 50204 7ff7197ba640 585 API calls 50160->50204 50172 7ff7197bb0a7 50161->50172 50176 7ff7197bb0f9 50161->50176 50162 7ff7197bb10e 50201 7ff7197c6f10 ioctlsocket 50162->50201 50164 7ff7197bb11b 50167 7ff7197bfa30 2 API calls 50164->50167 50168 7ff7197bb00c WSAIoctl 50165->50168 50173 7ff7197bb125 50167->50173 50168->50161 50170 7ff7197bb054 WSAGetLastError 50168->50170 50169 7ff7197bb0d4 50169->50162 50171 7ff7197bb0da 50169->50171 50170->50161 50205 7ff7197b95e0 50171->50205 50172->50160 50172->50162 50178 7ff7197bb16f connect 50173->50178 50179 7ff7197bb198 WSAGetLastError 50173->50179 50173->50180 50175->50180 50177 7ff7197b95e0 2 API calls 50176->50177 50177->50180 50178->50179 50178->50180 50179->50180 50181 7ff7197bb1a5 50179->50181 50180->50134 50181->50180 50213 7ff7197a2ad0 14 API calls 50181->50213 50183 7ff7197bb1c1 50184 7ff7197b95e0 2 API calls 50183->50184 50184->50180 50185->50095 50187 7ff7197e313f 50186->50187 50190 7ff7197e3169 50186->50190 50188 7ff7197e3144 _errno 50187->50188 50192 7ff7197e3157 50187->50192 50188->50142 50189 7ff7197e3224 _errno 50191 7ff7197e31f7 50189->50191 50190->50189 50190->50191 50193 7ff7197f1400 8 API calls 50191->50193 50198 7ff7197e3450 50192->50198 50216 7ff7197e3180 9 API calls 50192->50216 50194 7ff7197e323f 50193->50194 50194->50142 50196 7ff7197e34e3 _errno 50197 7ff7197e3479 50196->50197 50199 7ff7197f1400 8 API calls 50197->50199 50198->50196 50198->50197 50200 7ff7197e34b7 50199->50200 50200->50142 50201->50164 50202->50138 50203->50158 50204->50169 50206 7ff7197b9620 closesocket 50205->50206 50209 7ff7197b95f5 50205->50209 50206->50175 50208 7ff7197b9636 50218 7ff7197a8bd0 free 50208->50218 50209->50208 50211 7ff7197b9611 50209->50211 50217 7ff7197a8bd0 free 50211->50217 50212 7ff7197b963e 50212->50175 50213->50183 50214->50143 50215->50146 50216->50198 50217->50206 50218->50212 50219->50112 50220->50120 50221->50114 50222->50120 50223->50115 50224->50123 50225->50120 50226->50124 50227->50128 50228->50120 50229 7ff7197ae260 50230 7ff7197ae29f 50229->50230 50247 7ff7197ca950 getaddrinfo 50230->50247 50233 7ff7197ae2dd EnterCriticalSection 50237 7ff7197ae308 50233->50237 50238 7ff7197ae2ec LeaveCriticalSection 50233->50238 50234 7ff7197ae2bb WSAGetLastError 50235 7ff7197ae2c5 WSAGetLastError 50234->50235 50236 7ff7197ae2da 50234->50236 50235->50233 50236->50233 50240 7ff7197ae312 send 50237->50240 50241 7ff7197ae336 LeaveCriticalSection 50237->50241 50265 7ff7197ae1f0 7 API calls 50238->50265 50240->50241 50243 7ff7197ae32d WSAGetLastError 50240->50243 50244 7ff7197ae346 50241->50244 50242 7ff7197ae2fd free 50242->50244 50243->50241 50245 7ff7197f1400 8 API calls 50244->50245 50246 7ff7197ae355 50245->50246 50249 7ff7197ca983 50247->50249 50259 7ff7197ae2b5 50247->50259 50248 7ff7197caaf4 WSASetLastError 50248->50259 50249->50248 50250 7ff7197caa6e 50249->50250 50251 7ff7197ca9d9 malloc 50249->50251 50252 7ff7197caab1 freeaddrinfo 50250->50252 50253 7ff7197caab7 50250->50253 50254 7ff7197ca9f0 malloc 50251->50254 50255 7ff7197caa9c 50251->50255 50252->50253 50256 7ff7197caaef 50253->50256 50257 7ff7197caabc 50253->50257 50260 7ff7197caa8b free 50254->50260 50261 7ff7197caa27 memcpy 50254->50261 50255->50250 50256->50248 50256->50259 50258 7ff7197caac1 free free free 50257->50258 50257->50259 50258->50258 50258->50259 50259->50233 50259->50234 50260->50250 50262 7ff7197caa3f _strdup 50261->50262 50263 7ff7197caa4e 50261->50263 50262->50263 50264 7ff7197caa70 free free 50262->50264 50263->50249 50264->50250 50265->50242 50266 7ff7197cb0e0 50267 7ff7197cb0f5 50266->50267 50268 7ff7197b3490 50266->50268 50271 7ff7197cb130 50268->50271 50276 7ff7197cb17c 50271->50276 50272 7ff7197cb2f4 50275 7ff7197cb34f free 50272->50275 50281 7ff7197cb372 50272->50281 50273 7ff7197cb400 50277 7ff7197cb24c 50273->50277 50278 7ff7197cb409 free 50273->50278 50274 7ff7197cb3c7 free 50274->50273 50275->50281 50276->50272 50279 7ff7197cb224 50276->50279 50280 7ff7197cb247 50276->50280 50284 7ff7197f1400 8 API calls 50277->50284 50278->50277 50282 7ff7197a22e0 17 API calls 50279->50282 50280->50272 50280->50277 50289 7ff7197b9240 45 API calls 50280->50289 50287 7ff7197cb39c free 50281->50287 50288 7ff7197cb3a5 50281->50288 50283 7ff7197cb235 50282->50283 50290 7ff7197b8980 16 API calls 50283->50290 50286 7ff7197b34ac 50284->50286 50287->50288 50288->50273 50288->50274 50289->50272 50290->50280 50291 7ff7197cb460 50292 7ff7197e43f0 26 API calls 50291->50292 50293 7ff7197cb469 50292->50293 50294 7ff7197d3882 50295 7ff7197d38e3 50294->50295 50299 7ff7197d38b3 50294->50299 50351 7ff7197d4f10 33 API calls 50295->50351 50297 7ff7197d38e8 50297->50299 50309 7ff7197d39fc 50297->50309 50298 7ff7197d38d3 50299->50298 50314 7ff7197d60b0 27 API calls 50299->50314 50301 7ff7197d3973 50302 7ff7197d3a53 50301->50302 50315 7ff7197ec9f0 30 API calls 50301->50315 50353 7ff7197d4cb0 free free free free 50302->50353 50305 7ff7197d398e 50305->50302 50306 7ff7197d39bd 50305->50306 50307 7ff7197d3a10 50306->50307 50306->50309 50316 7ff7197d4160 50306->50316 50307->50309 50352 7ff7197bec20 QueryPerformanceCounter GetTickCount 50307->50352 50310 7ff7197d39e1 50310->50307 50312 7ff7197d39e7 50310->50312 50312->50309 50313 7ff7197b95e0 2 API calls 50312->50313 50313->50309 50314->50301 50315->50305 50317 7ff7197d41f0 50316->50317 50318 7ff7197d4189 50316->50318 50394 7ff7197bd950 50317->50394 50320 7ff7197d41b0 50318->50320 50321 7ff7197d419a 50318->50321 50354 7ff7197b9990 50320->50354 50392 7ff7197bd850 388 API calls 50321->50392 50325 7ff7197d41fd 50331 7ff7197d4261 50325->50331 50337 7ff7197d42da 50325->50337 50410 7ff7197ec9f0 30 API calls 50325->50410 50326 7ff7197d41a5 50326->50310 50327 7ff7197d41c1 50327->50337 50393 7ff7197d4de0 27 API calls 50327->50393 50329 7ff7197d4292 50332 7ff7197d42ee 50329->50332 50333 7ff7197d429e 50329->50333 50330 7ff7197d438e 50418 7ff7197bec20 QueryPerformanceCounter GetTickCount 50330->50418 50331->50329 50331->50330 50331->50337 50345 7ff7197d42f7 50332->50345 50414 7ff7197eea80 _errno strtoll _errno 50332->50414 50411 7ff7197d4af0 42 API calls 50333->50411 50337->50310 50338 7ff7197d41e5 50338->50310 50340 7ff7197d42a8 50340->50337 50412 7ff7197d4640 21 API calls 50340->50412 50342 7ff7197d434e 50342->50337 50417 7ff7197ec9f0 30 API calls 50342->50417 50345->50342 50416 7ff7197d4e80 34 API calls 50345->50416 50346 7ff7197d4313 50346->50342 50346->50345 50348 7ff7197d4339 50346->50348 50347 7ff7197d42c3 50347->50337 50413 7ff7197d4a30 27 API calls 50347->50413 50415 7ff7197d4e80 34 API calls 50348->50415 50351->50297 50352->50309 50353->50309 50355 7ff7197b99e8 50354->50355 50369 7ff7197b99df 50354->50369 50356 7ff7197bfa30 2 API calls 50355->50356 50359 7ff7197b9a02 50356->50359 50357 7ff7197f1400 8 API calls 50358 7ff7197b9f15 50357->50358 50358->50317 50358->50327 50360 7ff7197b9a92 50359->50360 50361 7ff7197b9a79 50359->50361 50363 7ff7197b9a9c 50360->50363 50373 7ff7197b9ac9 50360->50373 50438 7ff7197b8980 16 API calls 50361->50438 50365 7ff7197bab60 600 API calls 50363->50365 50364 7ff7197b9a88 50364->50369 50366 7ff7197b9aaa 50365->50366 50366->50369 50370 7ff7197bac70 46 API calls 50366->50370 50367 7ff7197c8260 19 API calls 50367->50373 50368 7ff7197b9da5 50368->50369 50440 7ff7197bb290 605 API calls 50368->50440 50369->50357 50370->50369 50371 7ff7197b9d14 SleepEx getsockopt 50371->50373 50374 7ff7197b9d5c WSAGetLastError 50371->50374 50373->50367 50373->50368 50373->50371 50375 7ff7197b9cb6 SleepEx getsockopt 50373->50375 50376 7ff7197b9bc7 WSASetLastError 50373->50376 50379 7ff7197b9de3 50373->50379 50390 7ff7197bb290 605 API calls 50373->50390 50439 7ff7197a2ad0 14 API calls 50373->50439 50374->50373 50375->50373 50377 7ff7197b9cfe WSAGetLastError 50375->50377 50376->50373 50377->50373 50378 7ff7197b9dd7 50441 7ff7197a2ad0 14 API calls 50378->50441 50383 7ff7197b95e0 2 API calls 50379->50383 50385 7ff7197b9e3b 50379->50385 50380 7ff7197b9dbe 50380->50369 50380->50378 50383->50385 50384 7ff7197b9eb7 50442 7ff7197b8980 16 API calls 50384->50442 50419 7ff7197bab60 50385->50419 50386 7ff7197b9e59 50386->50369 50432 7ff7197bac70 50386->50432 50389 7ff7197b9ed5 50389->50369 50390->50373 50392->50326 50393->50338 50395 7ff7197bd984 50394->50395 50396 7ff7197bd99f 50394->50396 50395->50396 50446 7ff7197b2c30 50395->50446 50397 7ff7197bd9e1 memset 50396->50397 50401 7ff7197bd9a5 50396->50401 50402 7ff7197bda13 50397->50402 50399 7ff7197f1400 8 API calls 50400 7ff7197bdb45 50399->50400 50400->50325 50401->50399 50403 7ff7197bdae6 50402->50403 50404 7ff7197bda6e calloc 50402->50404 50459 7ff7197bcd00 387 API calls 50403->50459 50406 7ff7197bda86 50404->50406 50407 7ff7197bda9c 50404->50407 50406->50401 50407->50403 50408 7ff7197bdaf6 50408->50401 50409 7ff7197bdb1b free 50408->50409 50409->50401 50410->50331 50411->50340 50412->50347 50413->50337 50414->50346 50415->50342 50416->50342 50417->50337 50418->50337 50420 7ff7197bac65 50419->50420 50424 7ff7197bab77 50419->50424 50420->50386 50421 7ff7197bac47 50445 7ff7197c86c0 572 API calls 50421->50445 50423 7ff7197bac1a 50444 7ff7197c8d10 599 API calls 50423->50444 50424->50421 50424->50423 50427 7ff7197babfc 50424->50427 50426 7ff7197bac60 50426->50386 50427->50423 50429 7ff7197bac01 50427->50429 50428 7ff7197bac42 50428->50386 50443 7ff7197b8980 16 API calls 50429->50443 50431 7ff7197bac10 50431->50386 50433 7ff7197bac90 50432->50433 50434 7ff7197bac9d 50432->50434 50435 7ff7197c7310 2 API calls 50433->50435 50436 7ff7197ba310 44 API calls 50434->50436 50435->50434 50437 7ff7197bacad 50436->50437 50437->50369 50438->50364 50439->50373 50440->50380 50441->50384 50442->50389 50443->50431 50444->50428 50445->50426 50447 7ff7197b2c5e 50446->50447 50448 7ff7197b2c57 50446->50448 50450 7ff7197b2c84 50447->50450 50451 7ff7197b2c8d 50447->50451 50455 7ff7197b2cc7 50447->50455 50496 7ff7197b3610 memset 50448->50496 50497 7ff7197b8980 16 API calls 50450->50497 50460 7ff7197cbd00 50451->50460 50478 7ff7197cb070 50451->50478 50453 7ff7197b2cd7 50453->50455 50454 7ff7197b2cb2 50454->50455 50456 7ff7197c7310 2 API calls 50454->50456 50455->50396 50456->50455 50459->50408 50461 7ff7197cbd54 50460->50461 50477 7ff7197cbd49 50460->50477 50462 7ff7197ba200 10 API calls 50461->50462 50473 7ff7197cbd7b 50461->50473 50465 7ff7197cbd67 50462->50465 50463 7ff7197cbe72 50463->50477 50614 7ff7197cd460 62 API calls 50463->50614 50464 7ff7197ba200 10 API calls 50464->50473 50467 7ff7197cbe5c 50465->50467 50498 7ff7197cbef0 50465->50498 50613 7ff7197b8980 16 API calls 50467->50613 50470 7ff7197cbe55 50470->50477 50471 7ff7197c8260 19 API calls 50471->50473 50473->50463 50473->50464 50473->50467 50473->50471 50474 7ff7197cbe3d WSAGetLastError 50473->50474 50476 7ff7197cbe2c 50473->50476 50473->50477 50547 7ff7197cccd0 50473->50547 50612 7ff7197b8980 16 API calls 50474->50612 50476->50467 50476->50477 50477->50454 50479 7ff7197cbd00 50478->50479 50480 7ff7197ba200 10 API calls 50479->50480 50483 7ff7197cbd49 50479->50483 50492 7ff7197cbd7b 50479->50492 50484 7ff7197cbd67 50480->50484 50481 7ff7197cbe72 50481->50483 50638 7ff7197cd460 62 API calls 50481->50638 50482 7ff7197ba200 10 API calls 50482->50492 50483->50454 50486 7ff7197cbe5c 50484->50486 50488 7ff7197cbef0 69 API calls 50484->50488 50637 7ff7197b8980 16 API calls 50486->50637 50488->50492 50489 7ff7197cbe55 50489->50483 50490 7ff7197c8260 19 API calls 50490->50492 50491 7ff7197cccd0 243 API calls 50491->50492 50492->50481 50492->50482 50492->50483 50492->50486 50492->50490 50492->50491 50493 7ff7197cbe3d WSAGetLastError 50492->50493 50495 7ff7197cbe2c 50492->50495 50636 7ff7197b8980 16 API calls 50493->50636 50495->50483 50495->50486 50496->50447 50497->50453 50499 7ff7197cbf62 50498->50499 50500 7ff7197bb770 14 API calls 50499->50500 50501 7ff7197cbf9e 50500->50501 50502 7ff7197cbfba GetModuleHandleA GetProcAddress 50501->50502 50505 7ff7197cbff8 50501->50505 50503 7ff7197cbfdc 50502->50503 50502->50505 50504 7ff7197bb770 14 API calls 50503->50504 50506 7ff7197cbff0 50504->50506 50507 7ff7197bb770 14 API calls 50505->50507 50514 7ff7197cc055 50505->50514 50506->50505 50508 7ff7197cc051 50507->50508 50509 7ff7197cc062 50508->50509 50508->50514 50615 7ff7197b8980 16 API calls 50509->50615 50511 7ff7197cc987 50512 7ff7197c9b80 13 API calls 50511->50512 50515 7ff7197cc99c 50512->50515 50513 7ff7197ccad6 50516 7ff7197f1400 8 API calls 50513->50516 50514->50511 50517 7ff7197cc118 50514->50517 50520 7ff7197c9b80 13 API calls 50515->50520 50526 7ff7197cc9af 50515->50526 50518 7ff7197ccc8c 50516->50518 50616 7ff7197b8980 16 API calls 50517->50616 50518->50473 50520->50526 50522 7ff7197cc071 50522->50513 50523 7ff7197cca6d calloc 50524 7ff7197ccae0 50523->50524 50525 7ff7197ccac7 50523->50525 50524->50513 50528 7ff7197ccbec 50524->50528 50529 7ff7197ccb49 free 50524->50529 50617 7ff7197b8980 16 API calls 50525->50617 50526->50523 50530 7ff7197b9240 45 API calls 50528->50530 50531 7ff7197ccbc6 50529->50531 50532 7ff7197ccb7a 50529->50532 50535 7ff7197ccc0d 50530->50535 50536 7ff7197a22e0 17 API calls 50531->50536 50533 7ff7197ccba0 50532->50533 50534 7ff7197ccb82 50532->50534 50538 7ff7197a22e0 17 API calls 50533->50538 50537 7ff7197a22e0 17 API calls 50534->50537 50535->50513 50544 7ff7197ccc69 50535->50544 50539 7ff7197ccbd0 50536->50539 50540 7ff7197ccb89 50537->50540 50541 7ff7197ccbaa 50538->50541 50620 7ff7197b8980 16 API calls 50539->50620 50618 7ff7197b8980 16 API calls 50540->50618 50619 7ff7197b8980 16 API calls 50541->50619 50621 7ff7197b8980 16 API calls 50544->50621 50549 7ff7197ccd40 50547->50549 50548 7ff7197cd43f 50549->50548 50550 7ff7197ccde2 50549->50550 50551 7ff7197ccda2 malloc 50549->50551 50552 7ff7197cce33 50550->50552 50553 7ff7197ccde8 malloc 50550->50553 50551->50548 50551->50550 50554 7ff7197cce46 realloc 50552->50554 50555 7ff7197ccea0 50552->50555 50553->50548 50553->50552 50554->50555 50556 7ff7197cce62 50554->50556 50559 7ff7197ccee5 50555->50559 50622 7ff7197b8d00 recv 50555->50622 50625 7ff7197b8980 16 API calls 50556->50625 50560 7ff7197ccf2a malloc 50559->50560 50567 7ff7197cce71 50559->50567 50590 7ff7197cd13a 50559->50590 50560->50548 50561 7ff7197ccfc7 memcpy 50560->50561 50562 7ff7197ccfe7 free 50561->50562 50561->50567 50562->50567 50568 7ff7197cd059 50562->50568 50563 7ff7197f1400 8 API calls 50565 7ff7197cce8d 50563->50565 50565->50473 50567->50563 50569 7ff7197cd3cc 50568->50569 50571 7ff7197cd17d 50568->50571 50575 7ff7197cd078 50568->50575 50569->50567 50570 7ff7197a22e0 17 API calls 50569->50570 50572 7ff7197cd3ef 50570->50572 50573 7ff7197cd1c4 50571->50573 50574 7ff7197cd186 50571->50574 50635 7ff7197b8980 16 API calls 50572->50635 50578 7ff7197a22e0 17 API calls 50573->50578 50574->50569 50577 7ff7197cd193 50574->50577 50579 7ff7197b9240 45 API calls 50575->50579 50581 7ff7197cd0e4 50575->50581 50585 7ff7197cd1f2 50575->50585 50580 7ff7197a22e0 17 API calls 50577->50580 50582 7ff7197cd1db 50578->50582 50579->50575 50583 7ff7197cd1a8 50580->50583 50589 7ff7197cd110 memcpy 50581->50589 50593 7ff7197cd218 50581->50593 50628 7ff7197b8980 16 API calls 50582->50628 50627 7ff7197b8980 16 API calls 50583->50627 50629 7ff7197b8980 16 API calls 50585->50629 50588 7ff7197cd155 50588->50567 50589->50590 50589->50593 50626 7ff7197b8980 16 API calls 50590->50626 50591 7ff7197cd3a0 50591->50567 50592 7ff7197cd3bb 50591->50592 50634 7ff7197e7a40 86 API calls 50592->50634 50593->50567 50593->50591 50595 7ff7197cd373 50593->50595 50596 7ff7197cd2c9 50593->50596 50597 7ff7197a22e0 17 API calls 50595->50597 50598 7ff7197cd33b 50596->50598 50602 7ff7197cd2d7 memset 50596->50602 50599 7ff7197cd387 50597->50599 50600 7ff7197cd350 50598->50600 50601 7ff7197cd34a CertFreeCertificateContext 50598->50601 50633 7ff7197b8980 16 API calls 50599->50633 50600->50591 50604 7ff7197cd354 50600->50604 50601->50600 50605 7ff7197cd2fc 50602->50605 50632 7ff7197b8980 16 API calls 50604->50632 50605->50598 50608 7ff7197cd30c 50605->50608 50611 7ff7197cd326 50605->50611 50606 7ff7197cd399 50606->50598 50608->50611 50630 7ff7197b21a0 244 API calls 50608->50630 50611->50598 50631 7ff7197b8980 16 API calls 50611->50631 50612->50470 50613->50470 50614->50477 50615->50522 50616->50522 50617->50513 50618->50522 50619->50522 50620->50522 50621->50513 50623 7ff7197b8d42 50622->50623 50624 7ff7197b8d1b WSAGetLastError 50622->50624 50623->50559 50624->50559 50625->50567 50626->50588 50627->50588 50628->50588 50629->50588 50630->50611 50631->50598 50632->50588 50633->50606 50634->50588 50635->50588 50636->50489 50637->50489 50638->50483 50639 7ff7197a373b 50642 7ff7197a8c90 calloc 50639->50642 50641 7ff7197a3746 50643 7ff7197a8ccb 50642->50643 50644 7ff7197a8cbb 50642->50644 50670 7ff7197c0d70 50643->50670 50644->50641 50647 7ff7197a8de7 50708 7ff7197c0050 free 50647->50708 50648 7ff7197c00c0 malloc 50650 7ff7197a8d12 50648->50650 50650->50647 50673 7ff7197b1640 50650->50673 50651 7ff7197a8df3 50709 7ff7197c0050 free 50651->50709 50653 7ff7197a8dff 50710 7ff7197b11e0 free 50653->50710 50656 7ff7197a8d28 50656->50647 50658 7ff7197a8d30 50656->50658 50657 7ff7197a8e0b 50659 7ff7197a8e21 free 50657->50659 50682 7ff7197c0370 50658->50682 50660 7ff7197a8dcc 50659->50660 50660->50641 50662 7ff7197a8d68 50689 7ff7197c6ce0 socket 50662->50689 50666 7ff7197a8d99 50667 7ff7197a8db2 closesocket closesocket 50666->50667 50707 7ff7197c6f10 ioctlsocket 50666->50707 50667->50660 50669 7ff7197a8dae 50669->50660 50669->50667 50671 7ff7197c00c0 malloc 50670->50671 50672 7ff7197a8ce2 50671->50672 50672->50647 50672->50648 50674 7ff7197a3620 73 API calls 50673->50674 50675 7ff7197b1659 50674->50675 50676 7ff7197b1662 50675->50676 50677 7ff7197c00c0 malloc 50675->50677 50676->50656 50678 7ff7197b169b 50677->50678 50679 7ff7197b16bc 50678->50679 50680 7ff7197b4030 287 API calls 50678->50680 50679->50656 50681 7ff7197b16aa 50680->50681 50681->50656 50683 7ff7197c038f socket 50682->50683 50684 7ff7197c0379 50682->50684 50685 7ff7197c03a5 50683->50685 50686 7ff7197c03ac 50683->50686 50684->50662 50685->50662 50687 7ff7197b95e0 2 API calls 50686->50687 50688 7ff7197c03b6 50687->50688 50688->50662 50690 7ff7197c6d30 50689->50690 50691 7ff7197c6d35 htonl setsockopt 50689->50691 50694 7ff7197f1400 8 API calls 50690->50694 50692 7ff7197c6d94 bind 50691->50692 50693 7ff7197c6ebb closesocket closesocket closesocket 50691->50693 50692->50693 50695 7ff7197c6daf getsockname 50692->50695 50693->50690 50696 7ff7197a8d84 50694->50696 50695->50693 50697 7ff7197c6dcb listen 50695->50697 50696->50660 50706 7ff7197c6f10 ioctlsocket 50696->50706 50697->50693 50698 7ff7197c6de0 socket 50697->50698 50698->50693 50699 7ff7197c6dfb connect 50698->50699 50699->50693 50700 7ff7197c6e16 accept 50699->50700 50700->50693 50701 7ff7197c6e32 50700->50701 50701->50701 50702 7ff7197c6e5e send 50701->50702 50702->50693 50703 7ff7197c6e7a recv 50702->50703 50703->50693 50704 7ff7197c6e98 memcmp 50703->50704 50704->50693 50705 7ff7197c6eae closesocket 50704->50705 50705->50690 50706->50666 50707->50669 50708->50651 50709->50653 50710->50657 50711 7ff71979f71e 50719 7ff71979f72e 50711->50719 50712 7ff71979f82f 50713 7ff71979f88f 50712->50713 50714 7ff71979f88a 50712->50714 50716 7ff71979f883 _invalid_parameter_noinfo_noreturn 50712->50716 50715 7ff71979f8de 50713->50715 50718 7ff71979f8d9 50713->50718 50722 7ff71979f8d2 _invalid_parameter_noinfo_noreturn 50713->50722 50735 7ff7197f169c free 50714->50735 50720 7ff71979f929 50715->50720 50724 7ff71979f921 50715->50724 50728 7ff71979f9a3 _invalid_parameter_noinfo_noreturn 50715->50728 50716->50714 50736 7ff7197f169c free 50718->50736 50719->50712 50719->50719 50727 7ff71978d3b0 7 API calls 50719->50727 50721 7ff71979f96e 50720->50721 50726 7ff71979f966 50720->50726 50729 7ff71979f9aa _invalid_parameter_noinfo_noreturn 50720->50729 50731 7ff7197f1400 8 API calls 50721->50731 50722->50718 50737 7ff7197f169c free 50724->50737 50738 7ff7197f169c free 50726->50738 50732 7ff71979f826 50727->50732 50728->50729 50733 7ff71979f98c 50731->50733 50734 7ff71979b690 25 API calls 50732->50734 50734->50712 50739 7ff7197c3710 50740 7ff7197b2c30 244 API calls 50739->50740 50741 7ff7197c3727 50740->50741 50742 7ff7197adcd0 50743 7ff7197add14 50742->50743 50744 7ff7197add24 50742->50744 50745 7ff7197c0370 3 API calls 50743->50745 50746 7ff7197bfa30 2 API calls 50744->50746 50745->50744 50747 7ff7197add66 50746->50747 50753 7ff7197ae370 calloc 50747->50753 50750 7ff7197add85 50751 7ff7197add8e 50786 7ff7197b8980 16 API calls 50751->50786 50754 7ff7197ae3c1 malloc 50753->50754 50755 7ff7197ae4fe _errno 50753->50755 50757 7ff7197ae477 50754->50757 50758 7ff7197ae44c InitializeCriticalSectionEx 50754->50758 50756 7ff7197add81 50755->50756 50756->50750 50756->50751 50760 7ff7197ae4a0 free 50757->50760 50761 7ff7197ae490 DeleteCriticalSection free 50757->50761 50759 7ff7197c6ce0 24 API calls 50758->50759 50762 7ff7197ae46f 50759->50762 50763 7ff7197ae4b3 50760->50763 50764 7ff7197ae4b8 50760->50764 50761->50760 50762->50757 50767 7ff7197ae526 _strdup 50762->50767 50788 7ff7197ca900 free free free 50763->50788 50765 7ff7197ae4c2 closesocket 50764->50765 50766 7ff7197ae4c8 free 50764->50766 50765->50766 50766->50755 50767->50757 50769 7ff7197ae540 free _strdup 50767->50769 50770 7ff7197ae562 50769->50770 50771 7ff7197ae58e 50769->50771 50787 7ff7197cafd0 _beginthreadex 50770->50787 50773 7ff7197ae611 free 50771->50773 50774 7ff7197ae59a EnterCriticalSection LeaveCriticalSection 50771->50774 50773->50755 50776 7ff7197ae5d5 50774->50776 50777 7ff7197ae5c4 CloseHandle 50774->50777 50775 7ff7197ae576 50775->50756 50778 7ff7197ae57e _errno 50775->50778 50779 7ff7197ae5e2 50776->50779 50789 7ff7197cb020 WaitForSingleObjectEx CloseHandle 50776->50789 50783 7ff7197ae5f8 50777->50783 50778->50771 50790 7ff7197ae1f0 7 API calls 50779->50790 50782 7ff7197ae608 closesocket 50782->50773 50783->50782 50791 7ff7197a8bd0 free 50783->50791 50784 7ff7197ae5eb free 50784->50783 50786->50750 50787->50775 50788->50764 50789->50779 50790->50784 50791->50782 50792 7ff7197aa84b 50793 7ff7197aa85e 50792->50793 50794 7ff7197aa917 50793->50794 50795 7ff7197bd950 390 API calls 50793->50795 50797 7ff7197aa866 50793->50797 50796 7ff7197aa8a3 50794->50796 50794->50797 50800 7ff7197aa89d 50795->50800 50799 7ff7197a9dd0 287 API calls 50796->50799 50810 7ff7197aa34b 50797->50810 50832 7ff7197bd800 free 50797->50832 50799->50810 50800->50794 50800->50796 50800->50797 50814 7ff7197c3550 50800->50814 50802 7ff7197ab3f2 50803 7ff7197ab3e3 50835 7ff7197b8980 16 API calls 50803->50835 50805 7ff7197b44f0 83 API calls 50805->50810 50807 7ff7197ba200 10 API calls 50807->50810 50808 7ff7197aa3ee 50809 7ff7197b8980 16 API calls 50808->50809 50808->50810 50809->50808 50810->50802 50810->50803 50810->50805 50810->50807 50810->50808 50812 7ff7197a9dd0 287 API calls 50810->50812 50831 7ff7197b8980 16 API calls 50810->50831 50833 7ff7197a8af0 8 API calls 50810->50833 50834 7ff7197c7460 19 API calls 50810->50834 50812->50810 50815 7ff7197c357c 50814->50815 50816 7ff7197bd950 390 API calls 50815->50816 50819 7ff7197c3586 50816->50819 50817 7ff7197f1400 8 API calls 50818 7ff7197c36e2 50817->50818 50818->50794 50820 7ff7197c369c 50819->50820 50821 7ff7197c35d7 50819->50821 50823 7ff7197c36b6 50819->50823 50822 7ff7197b2c30 244 API calls 50820->50822 50820->50823 50824 7ff7197c3648 calloc 50821->50824 50822->50823 50823->50817 50825 7ff7197c3660 50824->50825 50826 7ff7197c3667 50824->50826 50825->50823 50836 7ff7197c3be0 12 API calls 50826->50836 50828 7ff7197c3676 50828->50823 50837 7ff7197c3990 8 API calls 50828->50837 50830 7ff7197c3698 50830->50820 50830->50823 50831->50810 50832->50810 50833->50810 50834->50810 50835->50802 50836->50828 50837->50830 50838 7ff7197aa50c 50839 7ff7197c7310 2 API calls 50838->50839 50841 7ff7197aa519 50839->50841 50856 7ff7197b4250 free free 50841->50856 50842 7ff7197aa561 50849 7ff7197aa34b 50842->50849 50885 7ff7197bd800 free 50842->50885 50845 7ff7197ab3f2 50846 7ff7197ab3e3 50888 7ff7197b8980 16 API calls 50846->50888 50848 7ff7197b44f0 83 API calls 50848->50849 50849->50845 50849->50846 50849->50848 50851 7ff7197ba200 10 API calls 50849->50851 50853 7ff7197aa3ee 50849->50853 50855 7ff7197a9dd0 287 API calls 50849->50855 50884 7ff7197b8980 16 API calls 50849->50884 50886 7ff7197a8af0 8 API calls 50849->50886 50887 7ff7197c7460 19 API calls 50849->50887 50851->50849 50852 7ff7197b8980 16 API calls 50852->50853 50853->50849 50853->50852 50855->50849 50857 7ff7197b4030 287 API calls 50856->50857 50858 7ff7197b42aa 50857->50858 50859 7ff7197b4030 287 API calls 50858->50859 50860 7ff7197b42b6 memset 50859->50860 50889 7ff7197b59e0 50860->50889 50862 7ff7197b42fd 50862->50842 50864 7ff7197b44f0 83 API calls 50864->50862 50865 7ff7197c7310 2 API calls 50866 7ff7197b431f 50865->50866 50866->50862 50867 7ff7197b4372 50866->50867 50868 7ff7197b434b free 50866->50868 50870 7ff7197bfa30 2 API calls 50867->50870 50872 7ff7197b437e 50867->50872 50964 7ff7197a7230 _strdup free 50868->50964 50871 7ff7197b43c0 50870->50871 50873 7ff7197b43d4 50871->50873 50874 7ff7197b43fd 50871->50874 50872->50862 50872->50864 50876 7ff7197b9790 605 API calls 50873->50876 50875 7ff7197c7310 2 API calls 50874->50875 50877 7ff7197b440a 50875->50877 50878 7ff7197b43ea 50876->50878 50880 7ff7197b442d 50877->50880 50881 7ff7197c7310 2 API calls 50877->50881 50878->50872 50883 7ff7197b4447 50878->50883 50879 7ff7197bfa30 2 API calls 50879->50862 50882 7ff7197ba310 44 API calls 50880->50882 50881->50880 50882->50883 50883->50879 50884->50849 50885->50849 50886->50849 50887->50849 50888->50845 50890 7ff7197b5a25 50889->50890 50963 7ff7197b5a49 50890->50963 50965 7ff7197b51e0 calloc 50890->50965 50892 7ff7197b5a5b 50892->50963 50980 7ff7197b7650 50892->50980 50893 7ff7197f1400 8 API calls 50894 7ff7197b42e5 50893->50894 50894->50862 50894->50865 50894->50872 50897 7ff7197b5a92 _strdup 50898 7ff7197b5aa4 50897->50898 50897->50963 50899 7ff7197b5ac2 50898->50899 50900 7ff7197b5ab0 _strdup 50898->50900 51030 7ff7197b63f0 50899->51030 50900->50899 50900->50963 50903 7ff7197b5ad7 50903->50963 51085 7ff7197b6c40 50903->51085 50904 7ff7197b5b87 50905 7ff7197b5be2 50904->50905 50906 7ff7197b5bcc _strdup 50904->50906 50904->50963 50907 7ff7197b5c05 50905->50907 50908 7ff7197b5bec _strdup 50905->50908 50906->50905 50906->50963 51099 7ff7197b70b0 50907->51099 50908->50907 50908->50963 50913 7ff7197b5c52 50915 7ff7197b5c74 50913->50915 50916 7ff7197b4780 35 API calls 50913->50916 50913->50963 50914 7ff7197b4780 35 API calls 50914->50913 50917 7ff7197b4780 35 API calls 50915->50917 50918 7ff7197b5c96 50915->50918 50915->50963 50916->50915 50917->50918 50919 7ff7197b5e2f 50918->50919 50922 7ff7197b5d94 50918->50922 50918->50963 51120 7ff7197b1f60 50919->51120 50921 7ff7197b5fca 50923 7ff7197b1f60 8 API calls 50921->50923 50921->50963 50924 7ff7197b5e1f 50922->50924 50925 7ff7197b5db4 50922->50925 50926 7ff7197b5fe1 50923->50926 50927 7ff7197b4850 2 API calls 50924->50927 51199 7ff7197b0ea0 12 API calls 50925->51199 50926->50963 51144 7ff7197b7b10 50926->51144 50927->50963 50929 7ff7197b5dca 50932 7ff7197b8580 4 API calls 50929->50932 50929->50963 50939 7ff7197b5ddc 50932->50939 50933 7ff7197b60d4 50958 7ff7197b616d 50933->50958 51203 7ff7197b1440 8 API calls 50933->51203 50935 7ff7197b5de2 50935->50963 50936 7ff7197b6039 50936->50933 50937 7ff7197b6041 50936->50937 51202 7ff7197b8230 34 API calls 50937->51202 50939->50935 51200 7ff7197bec20 QueryPerformanceCounter GetTickCount 50939->51200 50942 7ff7197b6051 free free 50946 7ff7197b6078 50942->50946 50944 7ff7197b6126 50949 7ff7197b616b 50944->50949 51204 7ff7197b11f0 QueryPerformanceCounter GetTickCount 50944->51204 51162 7ff7197b4850 50946->51162 50947 7ff7197b620c 51207 7ff7197b0ea0 12 API calls 50947->51207 50949->50947 51206 7ff7197b12c0 QueryPerformanceCounter GetTickCount 50949->51206 50952 7ff7197b628b 51166 7ff7197b8580 50952->51166 50953 7ff7197b614d 50956 7ff7197b44f0 83 API calls 50953->50956 50953->50958 50954 7ff7197b61f5 50957 7ff7197b6201 50954->50957 50954->50958 50956->50949 50961 7ff7197b44f0 83 API calls 50957->50961 51205 7ff7197b5670 44 API calls 50958->51205 50959 7ff7197b6293 50959->50963 51175 7ff7197b7fb0 50959->51175 50960 7ff7197b621b 50960->50946 50960->50963 50961->50947 50963->50893 50964->50867 50966 7ff7197b5210 calloc 50965->50966 50967 7ff7197b5205 50965->50967 50968 7ff7197b5481 free 50966->50968 50969 7ff7197b523a 50966->50969 50967->50892 50968->50892 50970 7ff7197bfa30 2 API calls 50969->50970 50971 7ff7197b52d1 50970->50971 50972 7ff7197bfa30 2 API calls 50971->50972 50973 7ff7197b52e5 50972->50973 50974 7ff7197b5447 _strdup 50973->50974 50975 7ff7197b54bd 50973->50975 50974->50975 50977 7ff7197b5459 50974->50977 50976 7ff7197bfa30 2 API calls 50975->50976 50978 7ff7197b54fd 50976->50978 50979 7ff7197b5467 free free 50977->50979 50978->50892 50979->50968 51208 7ff7197b8630 8 API calls 50980->51208 50983 7ff7197b7670 51211 7ff7197e05f0 23 API calls 50983->51211 50984 7ff7197b7677 51212 7ff7197e05b0 calloc 50984->51212 50987 7ff7197b7675 50988 7ff7197b767c 50987->50988 50993 7ff7197b76f2 50988->50993 51025 7ff7197b5a7c 50988->51025 51213 7ff7197e0220 tolower 50988->51213 50989 7ff7197b77b5 51216 7ff7197e0730 8 API calls 50989->51216 50992 7ff7197b76bf 50992->50993 50994 7ff7197b76d8 50992->50994 50995 7ff7197b76cb free 50992->50995 50993->50989 50993->51025 51215 7ff7197e0730 8 API calls 50993->51215 51214 7ff7197a7230 _strdup free 50994->51214 50995->50994 50996 7ff7197b781c 51217 7ff7197b8980 16 API calls 50996->51217 50999 7ff7197b77de 50999->50996 51004 7ff7197b7854 50999->51004 50999->51025 51001 7ff7197b779c 51001->50989 51003 7ff7197b77a8 free 51001->51003 51001->51025 51002 7ff7197b782e 51002->51025 51003->50989 51218 7ff7197e0730 8 API calls 51004->51218 51006 7ff7197b787b 51007 7ff7197b7885 _strdup 51006->51007 51008 7ff7197b78a2 51006->51008 51007->51008 51007->51025 51008->51025 51219 7ff7197e0730 8 API calls 51008->51219 51010 7ff7197b78c5 51011 7ff7197b78cf _strdup 51010->51011 51012 7ff7197b78e8 51010->51012 51011->51012 51011->51025 51012->51025 51220 7ff7197e0730 8 API calls 51012->51220 51014 7ff7197b7908 51015 7ff7197b7912 _strdup 51014->51015 51016 7ff7197b799d 51014->51016 51015->51016 51015->51025 51016->51025 51221 7ff7197e0730 8 API calls 51016->51221 51018 7ff7197b79b8 51018->51025 51222 7ff7197e0730 8 API calls 51018->51222 51020 7ff7197b79ed 51020->51025 51223 7ff7197e0730 8 API calls 51020->51223 51022 7ff7197b7a31 51023 7ff7197b7a51 strtoul 51022->51023 51024 7ff7197b7a35 51022->51024 51023->51024 51024->51025 51224 7ff7197e0730 8 API calls 51024->51224 51025->50897 51025->50898 51025->50963 51027 7ff7197b7acd _strdup 51027->51025 51028 7ff7197b7a90 51028->51027 51028->51028 51225 7ff7197b8700 13 API calls 51028->51225 51031 7ff7197b650d 51030->51031 51032 7ff7197b643d memset memset 51030->51032 51033 7ff7197b6540 51031->51033 51034 7ff7197b6519 _strdup 51031->51034 51035 7ff7197b6470 strncpy 51032->51035 51036 7ff7197b6488 51032->51036 51038 7ff7197b655f 51033->51038 51039 7ff7197b654c _strdup 51033->51039 51034->51033 51037 7ff7197b6527 51034->51037 51035->51036 51040 7ff7197b64af 51036->51040 51041 7ff7197b6494 strncpy 51036->51041 51234 7ff7197b8980 16 API calls 51037->51234 51066 7ff7197b659c 51038->51066 51235 7ff7197ce1c0 realloc GetEnvironmentVariableA realloc free 51038->51235 51039->51037 51039->51038 51232 7ff7197a2010 malloc strtoul free 51040->51232 51041->51040 51044 7ff7197b6536 51047 7ff7197b6a67 free free 51044->51047 51046 7ff7197b64cf 51049 7ff7197b64fc 51046->51049 51233 7ff7197a2010 malloc strtoul free 51046->51233 51052 7ff7197f1400 8 API calls 51047->51052 51048 7ff7197b6580 51048->51066 51236 7ff7197ce1c0 realloc GetEnvironmentVariableA realloc free 51048->51236 51049->51031 51049->51047 51051 7ff7197b6821 free 51055 7ff7197b6831 51051->51055 51056 7ff7197b685e 51051->51056 51054 7ff7197b6a8b 51052->51054 51054->50903 51055->51056 51061 7ff7197b6852 free 51055->51061 51057 7ff7197b6888 51056->51057 51062 7ff7197b6878 free 51056->51062 51063 7ff7197b688d 51057->51063 51241 7ff7197b7300 42 API calls 51057->51241 51058 7ff7197b6769 51237 7ff7197ce1c0 realloc GetEnvironmentVariableA realloc free 51058->51237 51059 7ff7197b6716 51059->51051 51059->51058 51064 7ff7197b6750 tolower 51059->51064 51060 7ff7197b68a4 free free free 51072 7ff7197b6897 51060->51072 51061->51056 51062->51057 51063->51072 51082 7ff7197b6941 51063->51082 51242 7ff7197b7300 42 API calls 51063->51242 51064->51058 51064->51064 51066->51059 51066->51060 51066->51066 51070 7ff7197b662e strchr 51066->51070 51084 7ff7197b6647 51066->51084 51068 7ff7197b67cc 51073 7ff7197b67ff 51068->51073 51239 7ff7197ce1c0 realloc GetEnvironmentVariableA realloc free 51068->51239 51069 7ff7197b68ef free 51069->51063 51069->51072 51070->51059 51070->51084 51072->51047 51073->51051 51074 7ff7197b6923 free 51074->51072 51074->51082 51076 7ff7197b67e8 51076->51073 51240 7ff7197ce1c0 realloc GetEnvironmentVariableA realloc free 51076->51240 51077 7ff7197b6790 51077->51068 51238 7ff7197ce1c0 realloc GetEnvironmentVariableA realloc free 51077->51238 51078 7ff7197b6670 strchr 51078->51084 51081 7ff7197b66a0 strchr 51081->51084 51082->51072 51083 7ff7197b69b7 free 51082->51083 51083->51072 51084->51059 51084->51060 51084->51078 51084->51081 51086 7ff7197b6c71 51085->51086 51087 7ff7197b6ca4 51085->51087 51086->51087 51090 7ff7197b6c90 51086->51090 51091 7ff7197b6c84 free 51086->51091 51088 7ff7197b6cdb 51087->51088 51089 7ff7197b6cb9 free _strdup 51087->51089 51092 7ff7197b6cef free _strdup 51088->51092 51093 7ff7197b6d11 51088->51093 51089->51088 51098 7ff7197b6dbe 51089->51098 51090->51087 51094 7ff7197b6c98 free 51090->51094 51091->51090 51092->51093 51092->51098 51095 7ff7197b6d25 free _strdup 51093->51095 51097 7ff7197b6d4f 51093->51097 51094->51087 51095->51097 51095->51098 51097->51098 51243 7ff7197e23a0 31 API calls 51097->51243 51098->50904 51107 7ff7197b70e0 51099->51107 51100 7ff7197b5c17 51100->50963 51108 7ff7197b4780 51100->51108 51102 7ff7197b71b8 strchr 51103 7ff7197b71cd strtol 51102->51103 51102->51107 51103->51107 51105 7ff7197b725a free 51105->51107 51106 7ff7197b7187 free 51106->51105 51106->51107 51107->51100 51107->51102 51107->51105 51107->51106 51244 7ff7197a7230 _strdup free 51107->51244 51245 7ff7197b6eb0 7 API calls 51107->51245 51109 7ff7197b47b5 51108->51109 51110 7ff7197b47cf 51108->51110 51109->51110 51246 7ff7197e22f0 18 API calls 51109->51246 51111 7ff7197f1400 8 API calls 51110->51111 51112 7ff7197b47e1 51111->51112 51112->50913 51112->50914 51112->50963 51114 7ff7197b4808 51114->51110 51115 7ff7197b481b GetLastError 51114->51115 51247 7ff7197a2c10 8 API calls 51115->51247 51117 7ff7197b4833 51248 7ff7197b8980 16 API calls 51117->51248 51119 7ff7197b4849 51119->51110 51121 7ff7197b1fc5 51120->51121 51122 7ff7197b1fa6 _strdup 51120->51122 51124 7ff7197b1ff1 51121->51124 51125 7ff7197b1fd2 _strdup 51121->51125 51122->51121 51123 7ff7197b1fb5 51122->51123 51123->50921 51127 7ff7197b201d 51124->51127 51128 7ff7197b1ffe _strdup 51124->51128 51125->51124 51126 7ff7197b1fe1 51125->51126 51126->50921 51130 7ff7197b2049 51127->51130 51131 7ff7197b202a _strdup 51127->51131 51128->51127 51129 7ff7197b200d 51128->51129 51129->50921 51133 7ff7197b2075 51130->51133 51134 7ff7197b2056 _strdup 51130->51134 51131->51130 51132 7ff7197b2039 51131->51132 51132->50921 51136 7ff7197b2082 _strdup 51133->51136 51138 7ff7197b20a1 51133->51138 51134->51133 51135 7ff7197b2065 51134->51135 51135->50921 51137 7ff7197b2091 51136->51137 51136->51138 51137->50921 51139 7ff7197b20cd 51138->51139 51140 7ff7197b20ae _strdup 51138->51140 51142 7ff7197b20da _strdup 51139->51142 51143 7ff7197b20e9 51139->51143 51140->51139 51141 7ff7197b20bd 51140->51141 51141->50921 51142->51143 51143->50921 51145 7ff7197bfa30 2 API calls 51144->51145 51153 7ff7197b7b23 51145->51153 51146 7ff7197b5ff7 51146->50933 51201 7ff7197b36c0 8 API calls 51146->51201 51148 7ff7197c07a0 9 API calls 51148->51153 51149 7ff7197e2c80 8 API calls 51149->51153 51152 7ff7197b95e0 closesocket free 51152->51153 51153->51146 51153->51148 51153->51149 51153->51152 51154 7ff7197b7c96 30 API calls 51153->51154 51249 7ff7197c1160 free free free free 51153->51249 51250 7ff7197e2890 51153->51250 51253 7ff7197adcc0 51153->51253 51266 7ff7197b5960 free free 51154->51266 51156 7ff7197b7ef6 51157 7ff7197b7f04 free 51156->51157 51267 7ff7197b2110 8 API calls 51157->51267 51159 7ff7197b7f24 51268 7ff7197b2110 8 API calls 51159->51268 51161 7ff7197b7f30 free free free 51161->51153 51163 7ff7197b485e 51162->51163 51164 7ff7197bfa30 2 API calls 51163->51164 51165 7ff7197b48c8 51164->51165 51165->50952 51167 7ff7197b859c 51166->51167 51168 7ff7197b85a5 51167->51168 51169 7ff7197b85d2 51167->51169 51170 7ff7197b85be free 51167->51170 51168->50959 51171 7ff7197b85e5 _strdup 51169->51171 51172 7ff7197b85d7 51169->51172 51170->51169 51174 7ff7197b85e3 51171->51174 51273 7ff7197a7230 _strdup free 51172->51273 51174->50959 51176 7ff7197ba200 10 API calls 51175->51176 51177 7ff7197b7fd5 51176->51177 51178 7ff7197b7ff7 calloc 51177->51178 51179 7ff7197b809c 51177->51179 51184 7ff7197b7fe0 51177->51184 51181 7ff7197b8017 51178->51181 51188 7ff7197b800f 51178->51188 51180 7ff7197b815d _strdup 51179->51180 51183 7ff7197b80a8 _strdup 51179->51183 51182 7ff7197b818a 51180->51182 51192 7ff7197b81a0 51180->51192 51274 7ff7197cae10 6 API calls 51181->51274 51182->50963 51183->51182 51195 7ff7197b80f5 51183->51195 51184->50963 51187 7ff7197b8030 51187->51188 51189 7ff7197b8083 free 51187->51189 51190 7ff7197b8053 51187->51190 51188->51184 51189->51184 51275 7ff7197b8980 16 API calls 51190->51275 51192->51184 51194 7ff7197b81d9 51192->51194 51193 7ff7197b8065 free 51193->51184 51277 7ff7197b8980 16 API calls 51194->51277 51195->51184 51197 7ff7197b812e 51195->51197 51276 7ff7197b8980 16 API calls 51197->51276 51199->50929 51200->50924 51201->50936 51202->50942 51203->50944 51204->50953 51205->50963 51206->50954 51207->50960 51226 7ff7197e05c0 51208->51226 51211->50987 51213->50992 51214->50993 51215->51001 51216->50999 51217->51002 51218->51006 51219->51010 51220->51014 51221->51018 51222->51020 51223->51022 51224->51028 51225->51027 51227 7ff7197e05c5 51226->51227 51228 7ff7197b7664 51226->51228 51231 7ff7197e15a0 12 API calls 51227->51231 51228->50983 51228->50984 51232->51046 51233->51049 51234->51044 51235->51048 51236->51066 51237->51077 51238->51068 51239->51076 51240->51073 51241->51069 51242->51074 51243->51098 51244->51107 51245->51107 51246->51114 51247->51117 51248->51119 51249->51153 51269 7ff7197e67b0 7 API calls 51250->51269 51252 7ff7197e28ae 51254 7ff7197ae130 51253->51254 51255 7ff7197ae1d4 free 51254->51255 51256 7ff7197ae148 EnterCriticalSection LeaveCriticalSection 51254->51256 51255->51153 51257 7ff7197ae181 CloseHandle 51256->51257 51258 7ff7197ae18b 51256->51258 51259 7ff7197ae1ac 51257->51259 51260 7ff7197ae199 51258->51260 51270 7ff7197cb020 WaitForSingleObjectEx CloseHandle 51258->51270 51262 7ff7197ae1c1 closesocket 51259->51262 51272 7ff7197a8bd0 free 51259->51272 51271 7ff7197ae1f0 7 API calls 51260->51271 51262->51255 51264 7ff7197ae1a2 free 51264->51259 51266->51156 51267->51159 51268->51161 51269->51252 51270->51260 51271->51264 51272->51262 51273->51174 51274->51187 51275->51193 51276->51188 51277->51188
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$_strdupstrncmpstrtol
                          • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                          • API String ID: 707411602-3372543188
                          • Opcode ID: 6f20a3098ada05b8637e2bb69d452da5419154e3d137eabee69a00ebfac4dd4a
                          • Instruction ID: 5d4dc9d72544466667028001d91a1623223729452344b0ff2747fe729d323efa
                          • Opcode Fuzzy Hash: 6f20a3098ada05b8637e2bb69d452da5419154e3d137eabee69a00ebfac4dd4a
                          • Instruction Fuzzy Hash: 06429121A18E4386EB14AF15A8546B9A7B0FF49BF8F844435CA1E57794EF3CE50EC320
                          APIs
                          • CreateThread.KERNELBASE ref: 00007FF71979C9DB
                          • UuidCreate.RPCRT4 ref: 00007FF71979CA2E
                          • UuidToStringA.RPCRT4 ref: 00007FF71979CA49
                          • RpcStringFreeA.RPCRT4 ref: 00007FF71979CA7E
                            • Part of subcall function 00007FF71978FB80: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71978FC47
                            • Part of subcall function 00007FF71978BEE0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FF71979CB03), ref: 00007FF71978BF38
                            • Part of subcall function 00007FF71978BF80: memcpy.VCRUNTIME140(?,?,?,00007FF71978165A), ref: 00007FF71978C073
                          • memcmp.VCRUNTIME140 ref: 00007FF71979CFC0
                          • MessageBoxA.USER32 ref: 00007FF71979D053
                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979D05B
                          • memset.VCRUNTIME140 ref: 00007FF71979D13F
                          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF71979D1F1
                          • ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD@Z.MSVCP140 ref: 00007FF71979D206
                          • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF71979D216
                          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF71979D234
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979D2B9
                            • Part of subcall function 00007FF71978F740: memcpy.VCRUNTIME140(?,?,?,00000000,?,?,?,00007FF71979B6D0), ref: 00007FF71978F84E
                            • Part of subcall function 00007FF71978F740: memcpy.VCRUNTIME140(?,?,?,00000000,?,?,?,00007FF71979B6D0), ref: 00007FF71978F85D
                            • Part of subcall function 00007FF71979B690: memcpy.VCRUNTIME140 ref: 00007FF71979B70F
                            • Part of subcall function 00007FF71979B690: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979B782
                            • Part of subcall function 00007FF71979B690: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979B7BC
                            • Part of subcall function 00007FF71979B690: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979B80F
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979D3D9
                          • Sleep.KERNEL32 ref: 00007FF71979D4A9
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979D5A4
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979D691
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979D6DA
                            • Part of subcall function 00007FF7197F1420: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,7FFFFFFFFFFFFFFF,00007FF71978DA00), ref: 00007FF7197F143A
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979D846
                          • MessageBoxA.USER32 ref: 00007FF71979DA50
                          • ShellExecuteA.SHELL32 ref: 00007FF71979DA98
                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979DAA0
                          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71979DAF5
                          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71979DB02
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979DB41
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979DBB0
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979DC0D
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979DC52
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979DCAF
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979DCF4
                          • MessageBoxA.USER32 ref: 00007FF71979DD89
                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979DD91
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$D@std@@@std@@U?$char_traits@$memcpy$Messageexit$??6?$basic_ostream@CreateStringUuidV01@$??1?$basic_ios@??1?$basic_iostream@?fill@?$basic_ios@?setw@std@@ExecuteFreeJ@1@_ShellSleepSmanip@_ThreadU?$_V21@@Vios_base@1@mallocmemcmpmemsetsystem
                          • String ID: -$Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message:
                          • API String ID: 3289044329-3430715778
                          • Opcode ID: 8a36e4602b210adab6503ee844bd3db43c68f51e7f90be6cee31234b0ffa8d61
                          • Instruction ID: d851d03063d7d1e2c04b9a65ad03b641077b392d4bb80ebaffdc3c97e5612fc0
                          • Opcode Fuzzy Hash: 8a36e4602b210adab6503ee844bd3db43c68f51e7f90be6cee31234b0ffa8d61
                          • Instruction Fuzzy Hash: 65C2B662A18AC285EB20EF34D8453EDA770FF497ACF905231DA9D16A99DF78D14EC310

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 546 7ff7197bb8f0-7ff7197bb90c 547 7ff7197bb956-7ff7197bb95d call 7ff7197e43f0 546->547 548 7ff7197bb90e-7ff7197bb920 WSAStartup 546->548 557 7ff7197bbc1f-7ff7197bbc36 call 7ff7197f1400 547->557 558 7ff7197bb963-7ff7197bb990 GetModuleHandleA 547->558 549 7ff7197bb922-7ff7197bb929 548->549 550 7ff7197bb939-7ff7197bb955 call 7ff7197f1400 548->550 552 7ff7197bb933 WSACleanup 549->552 553 7ff7197bb92b-7ff7197bb931 549->553 552->550 553->547 553->552 560 7ff7197bb992-7ff7197bb999 558->560 561 7ff7197bb99e-7ff7197bb9d3 GetProcAddress strpbrk 558->561 562 7ff7197bbb23-7ff7197bbc17 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 560->562 563 7ff7197bb9d5-7ff7197bb9db 561->563 564 7ff7197bb9fb-7ff7197bb9fe 561->564 562->557 566 7ff7197bb9ed-7ff7197bb9f6 LoadLibraryA 563->566 567 7ff7197bb9dd-7ff7197bb9e8 563->567 568 7ff7197bba00-7ff7197bba13 GetProcAddress 564->568 569 7ff7197bba2a-7ff7197bba41 GetSystemDirectoryA 564->569 570 7ff7197bbaea-7ff7197bbafc 566->570 567->570 568->569 571 7ff7197bba15-7ff7197bba25 LoadLibraryExA 568->571 572 7ff7197bbae2 569->572 573 7ff7197bba47-7ff7197bba5a malloc 569->573 570->562 575 7ff7197bbafe-7ff7197bbb1c GetProcAddress 570->575 571->570 572->570 576 7ff7197bbad9-7ff7197bbadc free 573->576 577 7ff7197bba5c-7ff7197bba6a GetSystemDirectoryA 573->577 575->562 576->572 577->576 578 7ff7197bba6c-7ff7197bba76 577->578 579 7ff7197bba80-7ff7197bba89 578->579 579->579 580 7ff7197bba8b-7ff7197bba90 579->580 581 7ff7197bba94-7ff7197bba9b 580->581 581->581 582 7ff7197bba9d-7ff7197bbaa6 581->582 583 7ff7197bbab0-7ff7197bbabc 582->583 583->583 584 7ff7197bbabe-7ff7197bbac4 583->584 585 7ff7197bbad0 LoadLibraryA 584->585 586 7ff7197bbac6-7ff7197bbace 584->586 587 7ff7197bbad6 585->587 586->587 587->576
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                          • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                          • API String ID: 2612373469-2794540096
                          • Opcode ID: 3f701482bbca59d8f205688d17fec966a25a37f7fb5c4f435630c7a60f984e48
                          • Instruction ID: 6877648c4a4ea3b00819dae33190c55e98856cb545fe44f2bf520b106b12e88f
                          • Opcode Fuzzy Hash: 3f701482bbca59d8f205688d17fec966a25a37f7fb5c4f435630c7a60f984e48
                          • Instruction Fuzzy Hash: 50916221E09F8286EB60AF11E4543B9A3B1FF9DBE8F844135D95E16754EF2CE14E8720

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 589 7ff7197bacd0-7ff7197bad3d 590 7ff7197bad42-7ff7197bad52 589->590 591 7ff7197bad3f 589->591 592 7ff7197bad61-7ff7197bad79 memcpy 590->592 593 7ff7197bad54-7ff7197bad5c 590->593 591->590 594 7ff7197bada8-7ff7197badbb socket 592->594 595 7ff7197bad7b-7ff7197bada6 call 7ff7197a9360 * 2 592->595 593->592 597 7ff7197badbe-7ff7197badca 594->597 595->597 599 7ff7197badd0-7ff7197badd8 597->599 600 7ff7197bb25f 597->600 602 7ff7197badda-7ff7197bade2 call 7ff7197c6f10 599->602 603 7ff7197bade7-7ff7197badf0 599->603 601 7ff7197bb264-7ff7197bb28d call 7ff7197f1400 600->601 602->603 607 7ff7197badf2-7ff7197badfd 603->607 608 7ff7197bae00-7ff7197bae09 603->608 607->608 611 7ff7197bae1c-7ff7197bae20 608->611 612 7ff7197bae0b-7ff7197bae0e 608->612 613 7ff7197bae25-7ff7197bae37 call 7ff7197e3130 611->613 615 7ff7197bae14-7ff7197bae1a 612->615 616 7ff7197bb20a-7ff7197bb25d _errno * 3 call 7ff7197a2ad0 call 7ff7197b8980 call 7ff7197b95e0 612->616 613->616 621 7ff7197bae3d-7ff7197bae65 htons call 7ff7197b8b00 613->621 615->613 616->601 627 7ff7197bae67-7ff7197bae6a 621->627 628 7ff7197bae6c-7ff7197bae71 621->628 627->628 630 7ff7197baede 627->630 628->630 631 7ff7197bae73-7ff7197bae7d 628->631 632 7ff7197baee1-7ff7197baefd 630->632 631->632 633 7ff7197bae7f-7ff7197baeab setsockopt 631->633 634 7ff7197baeff-7ff7197baf13 call 7ff7197bb770 632->634 635 7ff7197baf2d-7ff7197baf30 632->635 636 7ff7197baed9-7ff7197baedc 633->636 637 7ff7197baead-7ff7197baed4 WSAGetLastError call 7ff7197a2ad0 call 7ff7197b8b00 633->637 648 7ff7197baf21-7ff7197baf2b 634->648 649 7ff7197baf15-7ff7197baf1f 634->649 639 7ff7197baf32-7ff7197baf57 getsockopt 635->639 640 7ff7197baf84-7ff7197baf87 635->640 636->632 637->636 643 7ff7197baf63-7ff7197baf7e setsockopt 639->643 644 7ff7197baf59-7ff7197baf61 639->644 645 7ff7197bb06f-7ff7197bb076 640->645 646 7ff7197baf8d-7ff7197baf94 640->646 643->640 644->640 644->643 650 7ff7197bb0aa-7ff7197bb0b1 645->650 651 7ff7197bb078-7ff7197bb0a5 call 7ff7197a9360 * 2 645->651 646->645 652 7ff7197baf9a-7ff7197bafc5 setsockopt 646->652 648->639 649->640 654 7ff7197bb0b3-7ff7197bb0b6 650->654 655 7ff7197bb0b8-7ff7197bb0d8 call 7ff7197e30a0 call 7ff7197ba640 650->655 680 7ff7197bb0f5-7ff7197bb0f7 651->680 681 7ff7197bb0a7 651->681 657 7ff7197bafc7-7ff7197bafd9 call 7ff7197b8b00 652->657 658 7ff7197bafde-7ff7197bb052 call 7ff7197a7030 * 2 WSAIoctl 652->658 654->655 660 7ff7197bb10e-7ff7197bb138 call 7ff7197c6f10 call 7ff7197bfa30 654->660 655->660 678 7ff7197bb0da-7ff7197bb0e8 call 7ff7197b95e0 655->678 657->645 658->645 677 7ff7197bb054-7ff7197bb06a WSAGetLastError call 7ff7197b8b00 658->677 682 7ff7197bb14f-7ff7197bb152 660->682 683 7ff7197bb13a-7ff7197bb14a call 7ff7197a88c0 660->683 677->645 678->600 692 7ff7197bb0ee-7ff7197bb0f0 678->692 680->650 690 7ff7197bb0f9-7ff7197bb109 call 7ff7197b95e0 680->690 681->650 687 7ff7197bb1ff-7ff7197bb208 682->687 688 7ff7197bb158-7ff7197bb160 682->688 683->682 687->601 688->687 691 7ff7197bb166-7ff7197bb16d 688->691 690->601 694 7ff7197bb16f-7ff7197bb184 connect 691->694 695 7ff7197bb198-7ff7197bb1a3 WSAGetLastError 691->695 692->601 694->695 697 7ff7197bb186-7ff7197bb188 694->697 698 7ff7197bb1f2-7ff7197bb1f4 695->698 699 7ff7197bb1a5-7ff7197bb1ae 695->699 700 7ff7197bb1fb-7ff7197bb1fd 697->700 701 7ff7197bb18a-7ff7197bb193 697->701 698->700 699->698 702 7ff7197bb1b0-7ff7197bb1f0 call 7ff7197a2ad0 call 7ff7197b8b00 call 7ff7197b95e0 699->702 700->601 701->601 702->601
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                          • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                          • API String ID: 3453287622-3868455274
                          • Opcode ID: 8a3f797c695f041bff7e698bd8e2315470290d5b3e5acea5cb0d8eff9f9976b9
                          • Instruction ID: 4a0b04640fd506f3577eb339a9554b8509ad4f2fe8c10fbdb06b204bc85781ba
                          • Opcode Fuzzy Hash: 8a3f797c695f041bff7e698bd8e2315470290d5b3e5acea5cb0d8eff9f9976b9
                          • Instruction Fuzzy Hash: C7F19271A08A4286E724BF2594442BDA3B1FF59BECF804035EA5E47A94DF3CE64EC710

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 709 7ff71979e120-7ff71979e165 710 7ff71979e170-7ff71979e17e 709->710 710->710 711 7ff71979e180-7ff71979e18f call 7ff719798490 710->711 714 7ff71979e190-7ff71979e1a8 711->714 715 7ff71979e1b0-7ff71979e1be 714->715 715->715 716 7ff71979e1c0-7ff71979e1d1 call 7ff719798490 715->716 719 7ff71979e201-7ff71979e226 GetCurrentProcess OpenProcessToken 716->719 720 7ff71979e1d3-7ff71979e1fc call 7ff71978d3b0 call 7ff71979b690 716->720 722 7ff71979e323-7ff71979e32a 719->722 723 7ff71979e22c-7ff71979e258 GetTokenInformation malloc 719->723 720->719 724 7ff71979e332-7ff71979e335 722->724 725 7ff71979e32c CloseHandle 722->725 723->722 727 7ff71979e25e-7ff71979e27f GetTokenInformation 723->727 730 7ff71979e365-7ff71979e36f 724->730 731 7ff71979e337-7ff71979e360 call 7ff71978d3b0 call 7ff71979b690 724->731 725->724 728 7ff71979e285-7ff71979e290 IsValidSid 727->728 729 7ff71979e31a-7ff71979e31d free 727->729 728->729 733 7ff71979e296-7ff71979e2b0 GetLengthSid malloc 728->733 729->722 735 7ff71979e375-7ff71979e38b 730->735 736 7ff71979e448-7ff71979e44b 730->736 731->730 733->729 738 7ff71979e2b2-7ff71979e2c5 InitializeAcl 733->738 737 7ff71979e390-7ff71979e39e 735->737 740 7ff71979e47b-7ff71979e486 SleepEx 736->740 741 7ff71979e44d-7ff71979e476 call 7ff71978d3b0 call 7ff71979b690 736->741 737->737 742 7ff71979e3a0-7ff71979e3df GetModuleHandleA GetCurrentProcess GetModuleInformation 737->742 743 7ff71979e311-7ff71979e314 free 738->743 744 7ff71979e2c7-7ff71979e2e0 AddAccessAllowedAce 738->744 740->714 741->740 747 7ff71979e3e1-7ff71979e3ea 742->747 748 7ff71979e43a 742->748 743->729 744->743 749 7ff71979e2e2-7ff71979e30d GetCurrentProcess SetSecurityInfo 744->749 752 7ff71979e3f0-7ff71979e400 747->752 753 7ff71979e43d-7ff71979e441 748->753 749->743 752->753 754 7ff71979e402-7ff71979e410 752->754 753->736 755 7ff71979e414-7ff71979e417 754->755 756 7ff71979e422-7ff71979e42e 755->756 757 7ff71979e419-7ff71979e420 755->757 756->753 759 7ff71979e430 756->759 757->756 758 7ff71979e432-7ff71979e438 757->758 758->748 758->752 759->755
                          APIs
                          Strings
                          • LockMemAccess() failed, don't tamper with the program., xrefs: 00007FF71979E348
                          • check_section_integrity() failed, don't tamper with the program., xrefs: 00007FF71979E1E4
                          • Pattern checksum failed, don't tamper with the program., xrefs: 00007FF71979E45E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Process$CurrentInformationToken$HandleModulefreemalloc$AccessAllowedCloseInfoInitializeLengthOpenSecuritySleepValid
                          • String ID: LockMemAccess() failed, don't tamper with the program.$Pattern checksum failed, don't tamper with the program.$check_section_integrity() failed, don't tamper with the program.
                          • API String ID: 2765164163-3085296333
                          • Opcode ID: e4ed526a3015a8a9b4e3bf66b9dba17f105dce27b85476a70544fa81bcd938e3
                          • Instruction ID: 9125ee5ab417995441ba19a66d49bf05a90c3c6988e1247c6b84b68e6fdd37f2
                          • Opcode Fuzzy Hash: e4ed526a3015a8a9b4e3bf66b9dba17f105dce27b85476a70544fa81bcd938e3
                          • Instruction Fuzzy Hash: 65A15132A18A8286E710EF31D4546BD67B0EF49BACF844535DA4D17A55EF38E54EC320

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 760 7ff71978a7c0-7ff71978a7f6 call 7ff71979c980 762 7ff71978a7fb-7ff71978a815 call 7ff719797970 call 7ff719798740 760->762 767 7ff71978a836-7ff71978a952 Sleep GetConsoleWindow ShowWindow GetCurrentProcess GetModuleHandleW GetProcAddress WriteProcessMemory call 7ff719787670 call 7ff7197869c0 CreateThread call 7ff719785ae0 call 7ff71978cf00 call 7ff719782f90 call 7ff719782f70 call 7ff71978cf90 call 7ff719782f90 call 7ff719782f70 call 7ff71978cf00 call 7ff719782f90 call 7ff719782f70 call 7ff71978cf00 call 7ff719782f90 call 7ff719782f70 GetConsoleWindow 762->767 768 7ff71978a817-7ff71978a831 call 7ff71978bf40 call 7ff719796cc0 762->768 802 7ff71978a954-7ff71978a975 MoveWindow 767->802 803 7ff71978a97b-7ff71978a9ac GetConsoleWindow ShowWindow call 7ff71978ae00 767->803 768->767 802->803 806 7ff71978a9b0-7ff71978a9c6 803->806 807 7ff71978aa26-7ff71978aa29 806->807 808 7ff71978a9c8-7ff71978a9cf 806->808 807->806 808->807 809 7ff71978a9d1-7ff71978a9d8 808->809 810 7ff71978a9e0-7ff71978a9fc 809->810 811 7ff71978aa21-7ff71978aa24 810->811 812 7ff71978a9fe 810->812 811->807 811->810 813 7ff71978aa00-7ff71978aa16 812->813 813->813 814 7ff71978aa18-7ff71978aa1f 813->814 814->811 815 7ff71978aa2b-7ff71978aa4e 814->815 816 7ff71978aa54-7ff71978aa5a 815->816 817 7ff71978aafb-7ff71978ab1c call 7ff71978a390 call 7ff71978ae10 815->817 818 7ff71978aacf 816->818 819 7ff71978aa5c-7ff71978aacd 816->819 826 7ff71978ab33-7ff71978ab5a call 7ff71978ca30 call 7ff71978bf40 call 7ff71978bea0 817->826 827 7ff71978ab1e-7ff71978ab30 817->827 821 7ff71978aad2-7ff71978aaf9 818->821 819->817 821->817 821->821 834 7ff71978aba6-7ff71978abc0 call 7ff71978a460 call 7ff71978ae30 826->834 835 7ff71978ab5c-7ff71978ab5f 826->835 827->826 844 7ff71978abc2-7ff71978abc5 834->844 845 7ff71978abc7-7ff71978abeb call 7ff71978ca30 call 7ff71978a390 call 7ff71978ae40 834->845 836 7ff71978ab66-7ff71978aba4 call 7ff71978bec0 call 7ff71978cc00 call 7ff71978c940 call 7ff71978c950 call 7ff71978bea0 835->836 836->834 844->845 859 7ff71978abf1-7ff71978abf6 845->859 860 7ff71978ac95-7ff71978acbc call 7ff71978ca30 call 7ff71978a390 call 7ff71978ae50 845->860 861 7ff71978abf8-7ff71978ac67 859->861 862 7ff71978ac69-7ff71978ac6c 859->862 870 7ff71978acc2-7ff71978acc7 860->870 871 7ff71978ad65-7ff71978ad92 call 7ff71978ca30 call 7ff71978a2c0 call 7ff71978bf40 call 7ff71978bea0 860->871 861->860 864 7ff71978ac70-7ff71978ac93 862->864 864->860 864->864 872 7ff71978acc9-7ff71978ad38 870->872 873 7ff71978ad3a-7ff71978ad3d 870->873 883 7ff71978ade0-7ff71978adff system call 7ff71978a530 exit 871->883 884 7ff71978ad94-7ff71978ad9e 871->884 872->871 875 7ff71978ad40-7ff71978ad63 873->875 875->871 875->875 885 7ff71978ada0-7ff71978adde call 7ff71978bec0 call 7ff71978cc00 call 7ff71978c940 call 7ff71978c950 call 7ff71978bea0 884->885 885->883
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Window$ConsoleCreate$ProcessShowStringThreadUuid_invalid_parameter_noinfo_noreturn$AddressCurrentFreeHandleMemoryModuleMoveProcSleepWriteexitsystem
                          • String ID: Completed$Connecting$DbgUiRemoteBreakin$cls$mw1 chair$ntdll.dll
                          • API String ID: 1758327050-1968594271
                          • Opcode ID: 63000a24059d4661d4f02abe9c0f3ad03801b56eab4f0bdcd05e0f1d886e6546
                          • Instruction ID: 2e681605f808910f8fa615c6d3d25817ff242d746a0da7bb3b257fd3b2c41287
                          • Opcode Fuzzy Hash: 63000a24059d4661d4f02abe9c0f3ad03801b56eab4f0bdcd05e0f1d886e6546
                          • Instruction Fuzzy Hash: 4802A521E08E5245FB05BF24D8461B9E771AF45BDCFC48232D95D67A95EF2CA10EC360

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1386 7ff7197a22e0-7ff7197a231c GetLastError _errno 1387 7ff7197a2325-7ff7197a232e 1386->1387 1388 7ff7197a231e-7ff7197a2320 1386->1388 1390 7ff7197a2334 1387->1390 1391 7ff7197a274e-7ff7197a2754 1387->1391 1389 7ff7197a28b3-7ff7197a28d0 call 7ff7197f1400 1388->1389 1394 7ff7197a2742-7ff7197a2749 1390->1394 1395 7ff7197a233a-7ff7197a2343 1390->1395 1392 7ff7197a2756 1391->1392 1393 7ff7197a2778-7ff7197a2781 1391->1393 1397 7ff7197a2758-7ff7197a275a 1392->1397 1398 7ff7197a276c-7ff7197a2773 1392->1398 1399 7ff7197a2800-7ff7197a280d 1393->1399 1400 7ff7197a2783-7ff7197a279b 1393->1400 1403 7ff7197a2365-7ff7197a23e8 call 7ff7197a7300 FormatMessageA strchr 1394->1403 1395->1399 1401 7ff7197a2349-7ff7197a2359 1395->1401 1397->1399 1404 7ff7197a2760-7ff7197a2767 1397->1404 1398->1403 1399->1403 1405 7ff7197a2813-7ff7197a282b call 7ff7197a7300 1399->1405 1400->1399 1401->1403 1410 7ff7197a2830-7ff7197a2852 1403->1410 1411 7ff7197a23ee-7ff7197a23f9 1403->1411 1404->1403 1412 7ff7197a288a-7ff7197a2893 _errno 1405->1412 1415 7ff7197a2854-7ff7197a2875 call 7ff7197a7300 1410->1415 1416 7ff7197a2877-7ff7197a2885 strncpy 1410->1416 1413 7ff7197a23ff-7ff7197a2403 1411->1413 1414 7ff7197a282d 1411->1414 1417 7ff7197a2895-7ff7197a289b _errno 1412->1417 1418 7ff7197a289e-7ff7197a28a6 GetLastError 1412->1418 1413->1414 1419 7ff7197a2409-7ff7197a240d 1413->1419 1414->1410 1415->1412 1416->1412 1417->1418 1421 7ff7197a28b0 1418->1421 1422 7ff7197a28a8-7ff7197a28aa SetLastError 1418->1422 1419->1410 1421->1389 1422->1421
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno
                          • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                          • API String ID: 3939687465-1752685260
                          • Opcode ID: 5231f01785016486938217524027c857c84e06ee1205152c8c71cf0d4cb1e3c7
                          • Instruction ID: 73b1ff01a0a11e3a63f7ba6c73bb0ac635f90e856e8be2060d75091f6fe44966
                          • Opcode Fuzzy Hash: 5231f01785016486938217524027c857c84e06ee1205152c8c71cf0d4cb1e3c7
                          • Instruction Fuzzy Hash: E9516261A0DE9286E725AF21A4443B9A7B4BF4CFE8FC44035DA5D42A95DF3CE50E8720

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1424 7ff7197993b0-7ff719799453 GetModuleFileNameA 1425 7ff719799456-7ff71979945d 1424->1425 1425->1425 1426 7ff71979945f-7ff71979946c 1425->1426 1427 7ff719799472-7ff71979947f 1426->1427 1428 7ff7197997f5-7ff7197997fa call 7ff719781ad0 1426->1428 1429 7ff7197994a1-7ff7197994ab 1427->1429 1430 7ff719799481-7ff71979949f memcpy 1427->1430 1433 7ff7197994bc-7ff7197994f5 call 7ff71978e9c0 memcpy 1429->1433 1434 7ff7197994ad-7ff7197994b8 1429->1434 1432 7ff7197994f9-7ff719799536 call 7ff71978db60 1430->1432 1440 7ff719799554-7ff7197995c4 call 7ff71978d020 call 7ff71978db60 1432->1440 1441 7ff719799538-7ff71979953b 1432->1441 1433->1432 1434->1433 1448 7ff7197995c6-7ff7197995d7 1440->1448 1449 7ff7197995fb-7ff719799651 _popen 1440->1449 1442 7ff719799540-7ff71979954e 1441->1442 1442->1442 1444 7ff719799550 1442->1444 1444->1440 1450 7ff7197995f5-7ff7197995fa call 7ff7197f169c 1448->1450 1451 7ff7197995d9-7ff7197995ec 1448->1451 1452 7ff7197997b8-7ff7197997f4 call 7ff719795f70 call 7ff719781af0 _CxxThrowException 1449->1452 1453 7ff719799657-7ff71979966c fgets 1449->1453 1450->1449 1451->1450 1454 7ff7197995ee-7ff7197995f4 _invalid_parameter_noinfo_noreturn 1451->1454 1452->1428 1457 7ff71979966e 1453->1457 1458 7ff7197996ad-7ff7197996c0 _pclose 1453->1458 1454->1450 1463 7ff719799670-7ff719799677 1457->1463 1459 7ff7197996c2-7ff7197996d4 1458->1459 1460 7ff7197996f7-7ff719799712 1458->1460 1464 7ff7197996f2 call 7ff7197f169c 1459->1464 1465 7ff7197996d6-7ff7197996e9 1459->1465 1466 7ff719799714-7ff719799726 1460->1466 1467 7ff71979974a-7ff719799753 1460->1467 1469 7ff719799680-7ff719799688 1463->1469 1464->1460 1465->1464 1470 7ff7197996eb-7ff7197996f1 _invalid_parameter_noinfo_noreturn 1465->1470 1472 7ff719799744-7ff719799749 call 7ff7197f169c 1466->1472 1473 7ff719799728-7ff71979973b 1466->1473 1476 7ff719799755-7ff719799767 1467->1476 1477 7ff71979978a-7ff7197997b7 call 7ff7197f1400 1467->1477 1469->1469 1475 7ff71979968a-7ff7197996ab call 7ff71978ef20 fgets 1469->1475 1470->1464 1472->1467 1473->1472 1479 7ff71979973d-7ff719799743 _invalid_parameter_noinfo_noreturn 1473->1479 1475->1458 1475->1463 1482 7ff719799785 call 7ff7197f169c 1476->1482 1483 7ff719799769-7ff71979977c 1476->1483 1479->1472 1482->1477 1483->1482 1488 7ff71979977e-7ff719799784 _invalid_parameter_noinfo_noreturn 1483->1488 1488->1482
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$fgetsmemcpy$FileModuleName_pclose_popen
                          • String ID: >$certutil -hashfile "$mw1 chair
                          • API String ID: 367312288-3995347440
                          • Opcode ID: 0e85f4cf80bfc5290cf4ef4c267bc54f7baeee8498c6f4c0096c59e5fa8c300c
                          • Instruction ID: 84013b5c59aecedcfb7e334446b390ff2f18e857db64e24ef8a99909d72e8df1
                          • Opcode Fuzzy Hash: 0e85f4cf80bfc5290cf4ef4c267bc54f7baeee8498c6f4c0096c59e5fa8c300c
                          • Instruction Fuzzy Hash: D4C1A562A18F8285FB10DF64E4443ADA770FF897F8F905235DA5D12AA9EF78D189C310

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1489 7ff719798490-7ff7197984d6 GetModuleHandleW 1490 7ff719798703 1489->1490 1491 7ff7197984dc-7ff7197984e6 1489->1491 1493 7ff719798705-7ff719798735 call 7ff7197f1400 1490->1493 1491->1490 1492 7ff7197984ec-7ff7197984f9 1491->1492 1492->1490 1494 7ff7197984ff-7ff71979856b GetCurrentProcess QueryFullProcessImageNameW CreateFileW 1492->1494 1494->1490 1496 7ff719798571-7ff71979858f CreateFileMappingW 1494->1496 1498 7ff719798595-7ff7197985b2 MapViewOfFile 1496->1498 1499 7ff7197986fa-7ff7197986fd CloseHandle 1496->1499 1498->1490 1500 7ff7197985b8-7ff7197985bc 1498->1500 1499->1490 1501 7ff7197985c2-7ff7197985cf 1500->1501 1502 7ff7197986f1-7ff7197986f4 UnmapViewOfFile 1500->1502 1501->1502 1503 7ff7197985d5-7ff7197985db 1501->1503 1502->1499 1503->1502 1504 7ff7197985e1-7ff7197985e9 1503->1504 1504->1502 1505 7ff7197985ef-7ff719798606 1504->1505 1506 7ff7197986d7-7ff7197986ef UnmapViewOfFile CloseHandle 1505->1506 1507 7ff71979860c 1505->1507 1506->1493 1508 7ff719798610-7ff719798619 1507->1508 1509 7ff719798620-7ff71979862a 1508->1509 1510 7ff719798633-7ff719798635 1509->1510 1511 7ff71979862c-7ff719798631 1509->1511 1512 7ff719798640-7ff71979864e 1510->1512 1513 7ff719798637-7ff71979863e 1510->1513 1511->1509 1511->1510 1512->1508 1514 7ff719798650 1512->1514 1513->1512 1515 7ff719798655-7ff71979865a 1513->1515 1514->1506 1515->1506 1516 7ff71979865c 1515->1516 1517 7ff719798660-7ff71979867c 1516->1517 1518 7ff7197986cf-7ff7197986d5 1517->1518 1519 7ff71979867e-7ff719798683 1517->1519 1518->1506 1518->1517 1520 7ff719798685-7ff7197986c9 VirtualProtect * 2 1519->1520 1521 7ff7197986cc 1519->1521 1520->1521 1521->1518
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: File$HandleView$CloseCreateProcessProtectUnmapVirtual$CurrentFullImageMappingModuleNameQuery
                          • String ID: @$mw1 chair
                          • API String ID: 1254450295-2589584795
                          • Opcode ID: 53e0c052093bd5f18d42bb84d1a69512dce1efec8af0a75c5a9f0870c0494dfc
                          • Instruction ID: c10bbf1ad8750a0c3f89b2c57f0c0179a881e371972dc03f50f02f65201920b8
                          • Opcode Fuzzy Hash: 53e0c052093bd5f18d42bb84d1a69512dce1efec8af0a75c5a9f0870c0494dfc
                          • Instruction Fuzzy Hash: B571A032A08A42C7EB509F25E4146AAB7B1FF88BA8F844135DA5907795DF3CE44EC721

                          Control-flow Graph

                          APIs
                          • GetModuleHandleA.KERNEL32(00000000,?,00000000,00007FF7197E442A,?,?,?,?,00007FF7197BB95B), ref: 00007FF7197BB5E4
                          • GetProcAddress.KERNEL32(?,?,?,?,00007FF7197BB95B), ref: 00007FF7197BB609
                          • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00007FF7197BB95B), ref: 00007FF7197BB61C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProcstrpbrk
                          • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                          • API String ID: 27745253-3327535076
                          • Opcode ID: c7683f32c6e1a657e47d9add1c44c74177711802a15aa0ccccaeae6cd2880b9b
                          • Instruction ID: 045b680bb6e4a4459bd998a075eb545443461ebf9038f03f6df67189dfbb84e4
                          • Opcode Fuzzy Hash: c7683f32c6e1a657e47d9add1c44c74177711802a15aa0ccccaeae6cd2880b9b
                          • Instruction Fuzzy Hash: 76417616B09E4286EB15AF16A544139A7B1EF99FF5F884130CE1E07790EE3CD59F8720

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1550 7ff7197c6ce0-7ff7197c6d2e socket 1551 7ff7197c6d30 1550->1551 1552 7ff7197c6d35-7ff7197c6d8e htonl setsockopt 1550->1552 1553 7ff7197c6ee4-7ff7197c6f02 call 7ff7197f1400 1551->1553 1554 7ff7197c6d94-7ff7197c6da9 bind 1552->1554 1555 7ff7197c6ebb-7ff7197c6ed7 closesocket * 3 1552->1555 1554->1555 1558 7ff7197c6daf-7ff7197c6dc5 getsockname 1554->1558 1556 7ff7197c6edc 1555->1556 1556->1553 1558->1555 1560 7ff7197c6dcb-7ff7197c6dda listen 1558->1560 1560->1555 1561 7ff7197c6de0-7ff7197c6df5 socket 1560->1561 1561->1555 1562 7ff7197c6dfb-7ff7197c6e10 connect 1561->1562 1562->1555 1563 7ff7197c6e16-7ff7197c6e2c accept 1562->1563 1563->1555 1564 7ff7197c6e32-7ff7197c6e4e call 7ff7197a7300 1563->1564 1567 7ff7197c6e55-7ff7197c6e5c 1564->1567 1567->1567 1568 7ff7197c6e5e-7ff7197c6e78 send 1567->1568 1568->1555 1569 7ff7197c6e7a-7ff7197c6e96 recv 1568->1569 1569->1555 1570 7ff7197c6e98-7ff7197c6eac memcmp 1569->1570 1570->1555 1571 7ff7197c6eae-7ff7197c6eb9 closesocket 1570->1571 1571->1556
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                          • String ID:
                          • API String ID: 3699910901-0
                          • Opcode ID: 356b554b0468fa619ed2cb9eb10850772ad47a966e683e3ab1c1b6ecb39aa9ae
                          • Instruction ID: 06648a73bbf9eefa791b7c09cdc674c36655ea0cc5662c2a76152d2904a6b1b6
                          • Opcode Fuzzy Hash: 356b554b0468fa619ed2cb9eb10850772ad47a966e683e3ab1c1b6ecb39aa9ae
                          • Instruction Fuzzy Hash: C6514D31618E4282D660AF25E494569B371FF89BF8F905331EA7A43AE4DF3CE44E8710

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1572 7ff7197b9990-7ff7197b99dd 1573 7ff7197b99df-7ff7197b99e3 1572->1573 1574 7ff7197b99e8-7ff7197b9a23 call 7ff7197bfa30 1572->1574 1575 7ff7197b9f06-7ff7197b9f24 call 7ff7197f1400 1573->1575 1580 7ff7197b9a25 1574->1580 1581 7ff7197b9a28-7ff7197b9a2b 1574->1581 1580->1581 1582 7ff7197b9a48 1581->1582 1583 7ff7197b9a2d-7ff7197b9a30 1581->1583 1584 7ff7197b9a4b-7ff7197b9a77 call 7ff7197bfac0 1582->1584 1585 7ff7197b9a32-7ff7197b9a35 1583->1585 1586 7ff7197b9a43-7ff7197b9a46 1583->1586 1590 7ff7197b9a92-7ff7197b9a9a 1584->1590 1591 7ff7197b9a79-7ff7197b9a8d call 7ff7197b8980 1584->1591 1585->1584 1588 7ff7197b9a37-7ff7197b9a41 1585->1588 1586->1584 1588->1584 1593 7ff7197b9ac9-7ff7197b9ae7 1590->1593 1594 7ff7197b9a9c-7ff7197b9aae call 7ff7197bab60 1590->1594 1600 7ff7197b9ef6-7ff7197b9efe 1591->1600 1595 7ff7197b9af0-7ff7197b9b05 1593->1595 1604 7ff7197b9ac2-7ff7197b9ac4 1594->1604 1605 7ff7197b9ab0-7ff7197b9ab2 1594->1605 1598 7ff7197b9d8a 1595->1598 1599 7ff7197b9b0b-7ff7197b9b1f call 7ff7197c8260 1595->1599 1603 7ff7197b9d8e-7ff7197b9d9f 1598->1603 1609 7ff7197b9ca0-7ff7197b9ca3 1599->1609 1610 7ff7197b9b25-7ff7197b9b50 call 7ff7197bfac0 1599->1610 1600->1575 1603->1595 1607 7ff7197b9da5-7ff7197b9da7 1603->1607 1604->1600 1605->1604 1608 7ff7197b9ab4-7ff7197b9abd call 7ff7197bac70 1605->1608 1611 7ff7197b9dad-7ff7197b9dc4 call 7ff7197bb290 1607->1611 1612 7ff7197b9eec 1607->1612 1608->1604 1615 7ff7197b9ca5-7ff7197b9cac 1609->1615 1616 7ff7197b9d14-7ff7197b9d5a SleepEx getsockopt 1609->1616 1626 7ff7197b9b52-7ff7197b9b64 call 7ff7197b8b00 1610->1626 1627 7ff7197b9b69-7ff7197b9b6c 1610->1627 1628 7ff7197b9dca-7ff7197b9dd1 1611->1628 1629 7ff7197b9e77-7ff7197b9e79 1611->1629 1614 7ff7197b9eee 1612->1614 1614->1600 1615->1616 1619 7ff7197b9cae-7ff7197b9cb0 1615->1619 1622 7ff7197b9d66 1616->1622 1623 7ff7197b9d5c-7ff7197b9d64 WSAGetLastError 1616->1623 1624 7ff7197b9bbf-7ff7197b9bc1 1619->1624 1625 7ff7197b9cb6-7ff7197b9cfc SleepEx getsockopt 1619->1625 1630 7ff7197b9d6a-7ff7197b9d6c 1622->1630 1623->1630 1624->1598 1631 7ff7197b9bc7-7ff7197b9bdc WSASetLastError 1624->1631 1632 7ff7197b9cfe-7ff7197b9d06 WSAGetLastError 1625->1632 1633 7ff7197b9d0b-7ff7197b9d0f 1625->1633 1626->1627 1637 7ff7197b9b6e-7ff7197b9b75 1627->1637 1638 7ff7197b9bbb 1627->1638 1635 7ff7197b9dd7-7ff7197b9dde 1628->1635 1636 7ff7197b9e7b-7ff7197b9e82 1628->1636 1629->1614 1639 7ff7197b9de3-7ff7197b9e31 1630->1639 1640 7ff7197b9d6e-7ff7197b9d74 1630->1640 1631->1598 1642 7ff7197b9be2-7ff7197b9c4c call 7ff7197c0e20 call 7ff7197a2ad0 call 7ff7197b8b00 1631->1642 1632->1624 1633->1624 1646 7ff7197b9ea6-7ff7197b9ee9 call 7ff7197a2ad0 call 7ff7197b8980 1635->1646 1643 7ff7197b9e84-7ff7197b9e8b 1636->1643 1644 7ff7197b9e8d-7ff7197b9e94 1636->1644 1637->1638 1647 7ff7197b9b77-7ff7197b9ba3 call 7ff7197bfac0 1637->1647 1638->1624 1648 7ff7197b9e46-7ff7197b9e5b call 7ff7197bab60 1639->1648 1649 7ff7197b9e33-7ff7197b9e3b call 7ff7197b95e0 1639->1649 1640->1639 1641 7ff7197b9d76-7ff7197b9d85 call 7ff7197b8b00 1640->1641 1641->1598 1675 7ff7197b9c6e-7ff7197b9c84 call 7ff7197bb290 1642->1675 1676 7ff7197b9c4e-7ff7197b9c55 1642->1676 1643->1646 1653 7ff7197b9e9f 1644->1653 1654 7ff7197b9e96-7ff7197b9e9d 1644->1654 1646->1612 1647->1638 1664 7ff7197b9ba5-7ff7197b9bb6 call 7ff7197bb290 1647->1664 1648->1614 1665 7ff7197b9e61-7ff7197b9e63 1648->1665 1649->1648 1653->1646 1654->1646 1664->1638 1665->1614 1670 7ff7197b9e69-7ff7197b9e72 call 7ff7197bac70 1665->1670 1670->1629 1681 7ff7197b9c86-7ff7197b9c91 1675->1681 1682 7ff7197b9c97-7ff7197b9c9b 1675->1682 1676->1675 1678 7ff7197b9c57-7ff7197b9c5e 1676->1678 1680 7ff7197b9c60-7ff7197b9c63 1678->1680 1680->1675 1683 7ff7197b9c65-7ff7197b9c6c 1680->1683 1681->1598 1681->1682 1682->1603 1683->1675 1683->1680
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                          • API String ID: 0-3307081561
                          • Opcode ID: e12939264609ffec3524bf024e473388a7055e7f836579bc36d1507cbdd6c775
                          • Instruction ID: e6da4f19b63d30421c6e39da70f0757189326a3904a6b7db1688fff7cb55b66f
                          • Opcode Fuzzy Hash: e12939264609ffec3524bf024e473388a7055e7f836579bc36d1507cbdd6c775
                          • Instruction Fuzzy Hash: 0EE1B231608A8282EB54AF2594442B9A7B1FF59BECF840235DA6E477C5DF38E64EC310

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 898 7ff7197cccd0-7ff7197ccd3e 899 7ff7197ccd60 898->899 900 7ff7197ccd40-7ff7197ccd55 898->900 902 7ff7197ccd67-7ff7197ccd81 899->902 900->899 901 7ff7197ccd57-7ff7197ccd5e 900->901 901->902 903 7ff7197cd44b 902->903 904 7ff7197ccd87-7ff7197ccd8c 902->904 904->903 905 7ff7197ccd92-7ff7197ccda0 904->905 906 7ff7197ccde2-7ff7197ccde6 905->906 907 7ff7197ccda2-7ff7197ccddc malloc 905->907 909 7ff7197cce33-7ff7197cce44 906->909 910 7ff7197ccde8-7ff7197cce2d malloc 906->910 907->906 908 7ff7197cd43f 907->908 908->903 911 7ff7197cce46-7ff7197cce60 realloc 909->911 912 7ff7197cceb8-7ff7197cceba 909->912 910->908 910->909 913 7ff7197ccea0-7ff7197cceb6 911->913 914 7ff7197cce62-7ff7197cce6c call 7ff7197b8980 911->914 915 7ff7197ccebc-7ff7197ccee0 call 7ff7197b8d00 912->915 916 7ff7197ccf1a-7ff7197ccfc1 call 7ff7197a7070 malloc 912->916 913->912 922 7ff7197cce71 914->922 920 7ff7197ccee5-7ff7197ccee8 915->920 916->908 925 7ff7197ccfc7-7ff7197ccfe1 memcpy 916->925 923 7ff7197cd15f-7ff7197cd166 920->923 924 7ff7197cceee-7ff7197ccef0 920->924 926 7ff7197cce76-7ff7197cce9f call 7ff7197f1400 922->926 929 7ff7197cd16c-7ff7197cd178 923->929 930 7ff7197cd438-7ff7197cd43a 923->930 927 7ff7197cd146-7ff7197cd15a call 7ff7197b8980 924->927 928 7ff7197ccef6-7ff7197ccefe 924->928 925->922 931 7ff7197ccfe7-7ff7197cd053 free 925->931 927->926 928->927 934 7ff7197ccf04-7ff7197ccf16 928->934 929->926 930->926 938 7ff7197cd423-7ff7197cd42a 931->938 939 7ff7197cd059-7ff7197cd060 931->939 934->916 940 7ff7197cd42e 938->940 941 7ff7197cd066-7ff7197cd06d 939->941 942 7ff7197cd3cc-7ff7197cd3d8 939->942 940->930 945 7ff7197cd06f-7ff7197cd072 941->945 946 7ff7197cd078-7ff7197cd07f 941->946 943 7ff7197cd40b-7ff7197cd41e 942->943 944 7ff7197cd3da-7ff7197cd3ea call 7ff7197a22e0 942->944 943->926 952 7ff7197cd3ef-7ff7197cd406 call 7ff7197b8980 944->952 945->946 948 7ff7197cd17d-7ff7197cd184 945->948 949 7ff7197cd080-7ff7197cd084 946->949 953 7ff7197cd1c4-7ff7197cd1ed call 7ff7197a22e0 call 7ff7197b8980 948->953 954 7ff7197cd186-7ff7197cd18d 948->954 950 7ff7197cd0c3-7ff7197cd0ca 949->950 951 7ff7197cd086-7ff7197cd08a 949->951 957 7ff7197cd0cc 950->957 958 7ff7197cd0d9-7ff7197cd0e2 950->958 951->950 955 7ff7197cd08c-7ff7197cd0b2 call 7ff7197b9240 951->955 952->926 953->922 954->944 959 7ff7197cd193-7ff7197cd1bf call 7ff7197a22e0 call 7ff7197b8980 954->959 971 7ff7197cd1f2-7ff7197cd213 call 7ff7197b8980 955->971 972 7ff7197cd0b8-7ff7197cd0bd 955->972 957->958 958->949 964 7ff7197cd0e4-7ff7197cd0e8 958->964 959->926 968 7ff7197cd0ee-7ff7197cd0f3 964->968 969 7ff7197cd218-7ff7197cd21f 964->969 968->969 975 7ff7197cd0f9-7ff7197cd10a 968->975 973 7ff7197cd227-7ff7197cd22e 969->973 971->926 972->950 972->971 973->940 978 7ff7197cd234-7ff7197cd237 973->978 975->973 980 7ff7197cd110-7ff7197cd134 memcpy 975->980 982 7ff7197cd243-7ff7197cd24b 978->982 983 7ff7197cd239 978->983 980->978 984 7ff7197cd13a-7ff7197cd13f 980->984 985 7ff7197cd273 982->985 986 7ff7197cd24d-7ff7197cd267 982->986 983->982 984->927 988 7ff7197cd27b-7ff7197cd27e 985->988 986->985 987 7ff7197cd269-7ff7197cd271 986->987 987->988 989 7ff7197cd284-7ff7197cd2b5 988->989 990 7ff7197cd3a0-7ff7197cd3a8 988->990 995 7ff7197cd373-7ff7197cd39e call 7ff7197a22e0 call 7ff7197b8980 989->995 996 7ff7197cd2bb-7ff7197cd2c3 989->996 990->930 991 7ff7197cd3ae-7ff7197cd3b9 990->991 991->930 992 7ff7197cd3bb-7ff7197cd3c7 call 7ff7197e7a40 991->992 992->926 1000 7ff7197cd345-7ff7197cd348 995->1000 996->995 997 7ff7197cd2c9-7ff7197cd2cc 996->997 997->1000 1001 7ff7197cd2ce-7ff7197cd2d5 997->1001 1003 7ff7197cd350-7ff7197cd352 1000->1003 1004 7ff7197cd34a CertFreeCertificateContext 1000->1004 1005 7ff7197cd340 1001->1005 1006 7ff7197cd2d7-7ff7197cd2fe memset call 7ff7197ea420 1001->1006 1003->990 1008 7ff7197cd354-7ff7197cd365 call 7ff7197b8980 1003->1008 1004->1003 1005->1000 1014 7ff7197cd300-7ff7197cd30a 1006->1014 1015 7ff7197cd33b 1006->1015 1008->926 1016 7ff7197cd30c-7ff7197cd316 1014->1016 1017 7ff7197cd36a-7ff7197cd371 1014->1017 1015->1005 1016->1017 1019 7ff7197cd318-7ff7197cd32a call 7ff7197b21a0 1016->1019 1018 7ff7197cd333-7ff7197cd336 call 7ff7197b8980 1017->1018 1018->1015 1019->1015 1023 7ff7197cd32c 1019->1023 1023->1018
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                          • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                          • API String ID: 860210379-3059304359
                          • Opcode ID: 2fce1b501544009a3a3c044fa151e52764b513539095c800b7457093632eb82e
                          • Instruction ID: ca6f7abb009a0c3ca596379ec3278216807054df3ff372297622c5fb2b72aab2
                          • Opcode Fuzzy Hash: 2fce1b501544009a3a3c044fa151e52764b513539095c800b7457093632eb82e
                          • Instruction Fuzzy Hash: 9B127E72A18E4285EB609F19D8443AAB7B4FF48BE8F940136CA5E57790DF38E54EC710

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1024 7ff7197cbef0-7ff7197cbf60 1025 7ff7197cbf7f 1024->1025 1026 7ff7197cbf62-7ff7197cbf74 1024->1026 1027 7ff7197cbf86-7ff7197cbfa0 call 7ff7197bb770 1025->1027 1026->1025 1028 7ff7197cbf76-7ff7197cbf7d 1026->1028 1031 7ff7197cbfb1-7ff7197cbfb8 1027->1031 1032 7ff7197cbfa2-7ff7197cbfac call 7ff7197b8b00 1027->1032 1028->1027 1034 7ff7197cbff8 1031->1034 1035 7ff7197cbfba-7ff7197cbfda GetModuleHandleA GetProcAddress 1031->1035 1032->1031 1037 7ff7197cbffa-7ff7197cc00b 1034->1037 1035->1034 1036 7ff7197cbfdc-7ff7197cbff2 call 7ff7197bb770 1035->1036 1036->1034 1046 7ff7197cbff4-7ff7197cbff6 1036->1046 1039 7ff7197cc030 1037->1039 1040 7ff7197cc00d-7ff7197cc025 1037->1040 1041 7ff7197cc037-7ff7197cc03a 1039->1041 1040->1039 1043 7ff7197cc027-7ff7197cc02e 1040->1043 1044 7ff7197cc07b-7ff7197cc082 1041->1044 1045 7ff7197cc03c-7ff7197cc053 call 7ff7197bb770 1041->1045 1043->1041 1048 7ff7197cc086-7ff7197cc097 1044->1048 1052 7ff7197cc055-7ff7197cc060 1045->1052 1053 7ff7197cc062-7ff7197cc076 call 7ff7197b8980 1045->1053 1046->1037 1050 7ff7197cc0bc 1048->1050 1051 7ff7197cc099-7ff7197cc0b1 1048->1051 1055 7ff7197cc0c3-7ff7197cc0c5 1050->1055 1051->1050 1054 7ff7197cc0b3-7ff7197cc0ba 1051->1054 1052->1048 1065 7ff7197ccc7d-7ff7197ccca6 call 7ff7197f1400 1053->1065 1054->1055 1057 7ff7197cc0c7-7ff7197cc0e3 call 7ff7197b3420 call 7ff7197b2e40 1055->1057 1058 7ff7197cc108-7ff7197cc112 1055->1058 1084 7ff7197cc0e5-7ff7197cc0fd 1057->1084 1085 7ff7197cc100-7ff7197cc103 call 7ff7197b3450 1057->1085 1061 7ff7197cc987-7ff7197cc99e call 7ff7197c9b80 1058->1061 1062 7ff7197cc118-7ff7197cc143 1058->1062 1077 7ff7197cc9b3-7ff7197cc9bd call 7ff7197b8b00 1061->1077 1078 7ff7197cc9a0-7ff7197cc9b1 call 7ff7197c9b80 1061->1078 1066 7ff7197cc145-7ff7197cc15c 1062->1066 1067 7ff7197cc17b 1062->1067 1071 7ff7197cc165-7ff7197cc16c 1066->1071 1072 7ff7197cc15e-7ff7197cc163 1066->1072 1073 7ff7197cc180-7ff7197cc18a 1067->1073 1080 7ff7197cc175-7ff7197cc179 1071->1080 1081 7ff7197cc16e-7ff7197cc173 1071->1081 1072->1073 1074 7ff7197cc192-7ff7197cc19d 1073->1074 1075 7ff7197cc18c-7ff7197cc18f 1073->1075 1082 7ff7197cc1a3-7ff7197cc1b8 1074->1082 1083 7ff7197cc96f-7ff7197cc97e call 7ff7197b8980 1074->1083 1075->1074 1091 7ff7197cc9c2-7ff7197cc9cd 1077->1091 1078->1077 1078->1091 1080->1073 1081->1073 1082->1083 1097 7ff7197ccc78 1083->1097 1084->1085 1085->1058 1092 7ff7197cc9d3-7ff7197cca54 call 7ff7197b8b00 call 7ff7197a7040 1091->1092 1093 7ff7197cca56-7ff7197cca68 1091->1093 1096 7ff7197cca6d-7ff7197ccac5 calloc 1092->1096 1093->1096 1099 7ff7197ccae0-7ff7197ccae3 1096->1099 1100 7ff7197ccac7-7ff7197ccad1 call 7ff7197b8980 1096->1100 1097->1065 1103 7ff7197ccae5-7ff7197ccb43 1099->1103 1104 7ff7197ccad6-7ff7197ccadb 1099->1104 1100->1104 1107 7ff7197ccbec-7ff7197ccc08 call 7ff7197b9240 1103->1107 1108 7ff7197ccb49-7ff7197ccb78 free 1103->1108 1104->1065 1114 7ff7197ccc0d-7ff7197ccc2a 1107->1114 1110 7ff7197ccbc6-7ff7197ccbe7 call 7ff7197a22e0 call 7ff7197b8980 1108->1110 1111 7ff7197ccb7a-7ff7197ccb80 1108->1111 1110->1065 1112 7ff7197ccba0-7ff7197ccbc1 call 7ff7197a22e0 call 7ff7197b8980 1111->1112 1113 7ff7197ccb82-7ff7197ccb9b call 7ff7197a22e0 call 7ff7197b8980 1111->1113 1112->1065 1113->1097 1124 7ff7197ccc2c-7ff7197ccc2f 1114->1124 1125 7ff7197ccc69-7ff7197ccc73 call 7ff7197b8980 1114->1125 1124->1125 1129 7ff7197ccc31-7ff7197ccc67 1124->1129 1125->1097 1129->1065
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                          • API String ID: 1646373207-2477831187
                          • Opcode ID: 97ffa9d630631196a168c5272390d36c7de08dde74dd016803c132e704823476
                          • Instruction ID: ffc56bbf0ac06be96ae53d21dd729718f17b6a10e3d388c1fd52f62344d212ee
                          • Opcode Fuzzy Hash: 97ffa9d630631196a168c5272390d36c7de08dde74dd016803c132e704823476
                          • Instruction Fuzzy Hash: F9029D72A18F828AEB10AF25D8402AAB7B4FF487E8F844136DA5D57790DF38D54EC710

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1132 7ff7197ae370-7ff7197ae3bb calloc 1133 7ff7197ae3c1-7ff7197ae44a malloc 1132->1133 1134 7ff7197ae4fe-7ff7197ae507 _errno 1132->1134 1136 7ff7197ae487-7ff7197ae48e 1133->1136 1137 7ff7197ae44c-7ff7197ae471 InitializeCriticalSectionEx call 7ff7197c6ce0 1133->1137 1135 7ff7197ae509-7ff7197ae525 1134->1135 1139 7ff7197ae4a0-7ff7197ae4b1 free 1136->1139 1140 7ff7197ae490-7ff7197ae49a DeleteCriticalSection free 1136->1140 1146 7ff7197ae526-7ff7197ae53a _strdup 1137->1146 1147 7ff7197ae477-7ff7197ae47f 1137->1147 1142 7ff7197ae4b3 call 7ff7197ca900 1139->1142 1143 7ff7197ae4b8-7ff7197ae4c0 1139->1143 1140->1139 1142->1143 1144 7ff7197ae4c2 closesocket 1143->1144 1145 7ff7197ae4c8-7ff7197ae4f8 free 1143->1145 1144->1145 1145->1134 1146->1136 1149 7ff7197ae540-7ff7197ae560 free _strdup 1146->1149 1147->1136 1150 7ff7197ae562-7ff7197ae571 call 7ff7197cafd0 1149->1150 1151 7ff7197ae58e-7ff7197ae598 1149->1151 1155 7ff7197ae576-7ff7197ae57c 1150->1155 1153 7ff7197ae611-7ff7197ae62c free 1151->1153 1154 7ff7197ae59a-7ff7197ae5c2 EnterCriticalSection LeaveCriticalSection 1151->1154 1153->1134 1156 7ff7197ae5d5-7ff7197ae5d8 1154->1156 1157 7ff7197ae5c4-7ff7197ae5cc CloseHandle 1154->1157 1158 7ff7197ae5ce-7ff7197ae5d0 1155->1158 1159 7ff7197ae57e-7ff7197ae58b _errno 1155->1159 1161 7ff7197ae5e2-7ff7197ae5f2 call 7ff7197ae1f0 free 1156->1161 1162 7ff7197ae5da-7ff7197ae5dd call 7ff7197cb020 1156->1162 1160 7ff7197ae5f8-7ff7197ae5fb 1157->1160 1158->1135 1159->1151 1165 7ff7197ae608-7ff7197ae60b closesocket 1160->1165 1166 7ff7197ae5fd-7ff7197ae603 call 7ff7197a8bd0 1160->1166 1161->1160 1162->1161 1165->1153 1166->1165
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                          • String ID:
                          • API String ID: 259767416-0
                          • Opcode ID: 77bd467bb61fb7d67d35f4c9857e0d9a9b32fd1a570912d8ff1346b077024d0b
                          • Instruction ID: b03533b923ade291a619cdd8b20b1d6da05063c5a3e3d42ef9701f1d4c5e5167
                          • Opcode Fuzzy Hash: 77bd467bb61fb7d67d35f4c9857e0d9a9b32fd1a570912d8ff1346b077024d0b
                          • Instruction Fuzzy Hash: 05812F26E05F8186E624EF11E854279B370FF98BA8F455235DB9E03661EF78F4DA8310
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                          • API String ID: 0-760484938
                          • Opcode ID: e2e17bcd5ea5e81b917f5bee54899a1cb80f56c66da1e4ac8e5891d29c3c3314
                          • Instruction ID: 71029a866502da7a8ac387eef999298084549e5db86fb1f031d40e366152cc87
                          • Opcode Fuzzy Hash: e2e17bcd5ea5e81b917f5bee54899a1cb80f56c66da1e4ac8e5891d29c3c3314
                          • Instruction Fuzzy Hash: FC429322A09F8295EB58AF2195503B9A3B0FF59BE8F480135CF5E47745DF38E56E8320

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast$_errnogetpeernamegetsockname
                          • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                          • API String ID: 2911674258-670633250
                          • Opcode ID: 23bd2806dbeffc762be87214f42f8eaca9b8138416de4aff16d44993728ebbe6
                          • Instruction ID: 52887b32d8312f764561d922960b83c4ee96d63bcff4c27f42671df59ef260f6
                          • Opcode Fuzzy Hash: 23bd2806dbeffc762be87214f42f8eaca9b8138416de4aff16d44993728ebbe6
                          • Instruction Fuzzy Hash: 5F918E72A19AC186D710EF25D4442E9B3B0FB9DB9CF845235DE4D47615EF38E28AC720

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1719 7ff7197ca950-7ff7197ca97d getaddrinfo 1720 7ff7197ca983-7ff7197ca995 1719->1720 1721 7ff7197cab14-7ff7197cab21 1719->1721 1722 7ff7197caaf4-7ff7197caafd WSASetLastError 1720->1722 1723 7ff7197ca99b 1720->1723 1724 7ff7197cab03-7ff7197cab10 1722->1724 1725 7ff7197ca9a0-7ff7197ca9a6 1723->1725 1724->1721 1726 7ff7197ca9ad-7ff7197ca9b0 1725->1726 1727 7ff7197ca9a8-7ff7197ca9ab 1725->1727 1729 7ff7197ca9b6 1726->1729 1730 7ff7197caa61-7ff7197caa68 1726->1730 1728 7ff7197ca9b9-7ff7197ca9bd 1727->1728 1728->1730 1732 7ff7197ca9c3-7ff7197ca9ca 1728->1732 1729->1728 1730->1725 1731 7ff7197caa6e 1730->1731 1733 7ff7197caaa2-7ff7197caaaf 1731->1733 1732->1730 1734 7ff7197ca9d0-7ff7197ca9d3 1732->1734 1736 7ff7197caab1 freeaddrinfo 1733->1736 1737 7ff7197caab7-7ff7197caaba 1733->1737 1734->1730 1735 7ff7197ca9d9-7ff7197ca9ea malloc 1734->1735 1738 7ff7197ca9f0-7ff7197caa25 malloc 1735->1738 1739 7ff7197caa9c 1735->1739 1736->1737 1740 7ff7197caaef-7ff7197caaf2 1737->1740 1741 7ff7197caabc-7ff7197caabf 1737->1741 1744 7ff7197caa8b-7ff7197caa9a free 1738->1744 1745 7ff7197caa27-7ff7197caa3d memcpy 1738->1745 1739->1733 1740->1722 1740->1724 1742 7ff7197caac1-7ff7197caae8 free * 3 1741->1742 1743 7ff7197caaea-7ff7197caaed 1741->1743 1742->1742 1742->1743 1743->1724 1744->1733 1746 7ff7197caa3f-7ff7197caa4c _strdup 1745->1746 1747 7ff7197caa4e-7ff7197caa58 1745->1747 1746->1747 1748 7ff7197caa70-7ff7197caa89 free * 2 1746->1748 1749 7ff7197caa5e 1747->1749 1750 7ff7197caa5a 1747->1750 1748->1733 1749->1730 1750->1749
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                          • String ID:
                          • API String ID: 2364279375-0
                          • Opcode ID: 826810ee5a9ebccdab44c80232c07f21e8297b43653121451e59b1d0358431ae
                          • Instruction ID: bbd1c626558404071a24c2d953e7cd10eee0d3e9d1d48f568c2d2fb81a861b7f
                          • Opcode Fuzzy Hash: 826810ee5a9ebccdab44c80232c07f21e8297b43653121451e59b1d0358431ae
                          • Instruction Fuzzy Hash: 06513A35A19F4286EA69AF11A640129B7B0FF48BF9F844035DE4E13750DF3CE85E8720
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastSleep
                          • String ID:
                          • API String ID: 1458359878-0
                          • Opcode ID: 5889fa0345c52cd6d4f581f2939be173a8a84ba2c72307cee304e578530dd025
                          • Instruction ID: 2aab84320806b9964f4d8f248b4f366b29e8533e80d4d8d1823c66c49f3984e2
                          • Opcode Fuzzy Hash: 5889fa0345c52cd6d4f581f2939be173a8a84ba2c72307cee304e578530dd025
                          • Instruction Fuzzy Hash: B191D821B2CE4386E764AE14A8442F9E2B1FF487FCF945135D91987BC4DF39EA4E8211
                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979F883
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979F8D2
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979F9A3
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979F9AA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: Bf$Sf$gf$xf$f
                          • API String ID: 3668304517-3071979009
                          • Opcode ID: 999b8fb6704ed6e37762fee42026d656bd3a39c9b5e56b52890205e6f3a96b13
                          • Instruction ID: c2d7a787fe0f0ebb47eb5f7fab202d952a053c7f55548b28a5e1b7b56adfd8ca
                          • Opcode Fuzzy Hash: 999b8fb6704ed6e37762fee42026d656bd3a39c9b5e56b52890205e6f3a96b13
                          • Instruction Fuzzy Hash: AA719F62A18A8195FB04EF75D4143BDA331EF49BF8F804635CA5D16ACADF3C958E8350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                          • API String ID: 600764987-1052566392
                          • Opcode ID: c312e47bae083d480977d69b78fcc56b3f3cc5f565424858d79991b1b3b6a96f
                          • Instruction ID: 67a8a828896154189231697db0547bb1739eebed519a9eda06589a8c15ffbcb6
                          • Opcode Fuzzy Hash: c312e47bae083d480977d69b78fcc56b3f3cc5f565424858d79991b1b3b6a96f
                          • Instruction Fuzzy Hash: 06314662A0DFC186E725AF20E4543AAB774FF88BA9F840035DA5D02A95DF3CD54EC724
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                          • API String ID: 600764987-2628789574
                          • Opcode ID: eb913ce04ae3934b53e2c9b669eae7c99e9a923e22017345ee08d1cb073886d2
                          • Instruction ID: f7aed90468d3a7f31b70029efd1b0b88f04eca7ed487547756d340c6ad832b60
                          • Opcode Fuzzy Hash: eb913ce04ae3934b53e2c9b669eae7c99e9a923e22017345ee08d1cb073886d2
                          • Instruction Fuzzy Hash: E8314662A0DFC186E725AF20E4543AAB774FF88BA9F840035DA5D02A95DF3CD54DC724
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                          • API String ID: 600764987-1965992168
                          • Opcode ID: f2b9e5b0b13f6187cca1c1fe9717c9c3dabd0cfd0a73d5400d8c5b097cc57c44
                          • Instruction ID: cc30dfc3b7cf5a6819533dcc1a75b00d1c742412b66f2c12654019be5a50c6f6
                          • Opcode Fuzzy Hash: f2b9e5b0b13f6187cca1c1fe9717c9c3dabd0cfd0a73d5400d8c5b097cc57c44
                          • Instruction Fuzzy Hash: 6A314862A0DFC186E725AF20E4543AAB774FF88BA9F840035DA5D02A95DF3CD54DC724
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                          • API String ID: 600764987-1502336670
                          • Opcode ID: 3cf75d6b14f47e79712e35c80e1940203620386dd547da0375d54fb62db18446
                          • Instruction ID: c42df418c7602c68514d80f33623440669c761e330877bab9438a7e708e8d1ff
                          • Opcode Fuzzy Hash: 3cf75d6b14f47e79712e35c80e1940203620386dd547da0375d54fb62db18446
                          • Instruction Fuzzy Hash: F4314662A0DFC186E725AF20E4543AAB774FF88BA9F840035DA5D02A95DF3CD54DC724
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                          • API String ID: 600764987-3862749013
                          • Opcode ID: 47fac95866ffedb9a8389d01e73e41f08162380b91e2dcd653d7b1f9c4bb4ccf
                          • Instruction ID: 90944944e3fd2758e5861e97539d96570fe6d7ddd32fd359953cfc1f2ca60d72
                          • Opcode Fuzzy Hash: 47fac95866ffedb9a8389d01e73e41f08162380b91e2dcd653d7b1f9c4bb4ccf
                          • Instruction Fuzzy Hash: 93314662A0DFC186E725AF20E4543AAB774FF88BA9F840035DA5D02A95DF3CD54DC724
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                          • API String ID: 600764987-1381340633
                          • Opcode ID: d2d92c8171a57b81ea33b8349c1409968bb8b34de7506742a25f06a5e623c7aa
                          • Instruction ID: 469583c24394317a55c05c0152e81fe896b89996474c5127e67841060a2d696b
                          • Opcode Fuzzy Hash: d2d92c8171a57b81ea33b8349c1409968bb8b34de7506742a25f06a5e623c7aa
                          • Instruction Fuzzy Hash: 73314662A0DFC186E725AF20E4543AAB774FF88BA9F840035DA5D02A95DF3CD54DC724
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                          • API String ID: 600764987-2710416593
                          • Opcode ID: ef126b83569338c8dd8d32fe558353e1f5ca4ef4cae622e2af4e5c83a358bc3f
                          • Instruction ID: cad73f3ea97b8b7de9cf35b4d0b8b2ca610a1a64c7ce88e574ac5f5005c7b9db
                          • Opcode Fuzzy Hash: ef126b83569338c8dd8d32fe558353e1f5ca4ef4cae622e2af4e5c83a358bc3f
                          • Instruction Fuzzy Hash: 25314662A0DFC186E725AF20E4543AAB774FF88BA9F840035DA5D02A95DF3CD54DC724
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                          • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                          • API String ID: 600764987-618797061
                          • Opcode ID: da9e4016f1700bcfd8279e04b10e7bbff56ef87a166a106093475dc8f015fee7
                          • Instruction ID: d2ac8749c0f1792bf1c1ab9c8c27888d3fcf6ebe659dc15c1464078b2dbf85aa
                          • Opcode Fuzzy Hash: da9e4016f1700bcfd8279e04b10e7bbff56ef87a166a106093475dc8f015fee7
                          • Instruction Fuzzy Hash: CD314662A0DAC186E721AF20E4543AAB775FF88BA9F840035DA9D02A55DF3CD54DC720
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: callocfree
                          • String ID:
                          • API String ID: 306872129-0
                          • Opcode ID: 72d853f823ea88fc251c2802e34ed2d947989ce0a54d5650297b26ed064931ff
                          • Instruction ID: 95b7d4e5cd4fd791fe5965b4920cce609112dadaf4f8fd3d19248e98f032fb8b
                          • Opcode Fuzzy Hash: 72d853f823ea88fc251c2802e34ed2d947989ce0a54d5650297b26ed064931ff
                          • Instruction Fuzzy Hash: 5E913C32908BC186E3009F34D4043E877A0FB59B6CF485239DE9D1B796DF7AA199C720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: calloc
                          • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                          • API String ID: 2635317215-3812100122
                          • Opcode ID: bd6f99720c1bb92e00a543da0e9cac06eca5ebf4a937b02936f022757b2017d9
                          • Instruction ID: 9d2e718405790450bdf88cac032767e0dcefeb8dee568eb8b8dfd0b4e4c09d3f
                          • Opcode Fuzzy Hash: bd6f99720c1bb92e00a543da0e9cac06eca5ebf4a937b02936f022757b2017d9
                          • Instruction Fuzzy Hash: 1951D322B0DE428AF619AF2594403F9A6A0EF587E8F540035DB5E473A0DF3DE65E8721
                          APIs
                            • Part of subcall function 00007FF71978F740: memcpy.VCRUNTIME140(?,?,?,00000000,?,?,?,00007FF71979B6D0), ref: 00007FF71978F84E
                            • Part of subcall function 00007FF71978F740: memcpy.VCRUNTIME140(?,?,?,00000000,?,?,?,00007FF71979B6D0), ref: 00007FF71978F85D
                          • memcpy.VCRUNTIME140 ref: 00007FF71979B70F
                          • system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979B782
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979B7BC
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979B80F
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979B88D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturnmemcpy$system
                          • String ID: && timeout /t 5"$start cmd /C "color b && title Error && echo
                          • API String ID: 2264491462-3357973498
                          • Opcode ID: 4b8a51feb1037063bb059112d8736458dad7ce0213eee081cab864378eab82be
                          • Instruction ID: 2be03363947ba78d7e5b345e5e1a21d4b79a17da605d5653873975b5967704df
                          • Opcode Fuzzy Hash: 4b8a51feb1037063bb059112d8736458dad7ce0213eee081cab864378eab82be
                          • Instruction Fuzzy Hash: 10517162A18F8582EB04DF25E454379A371FF89BE8F905235DAAD02795DF6CE08D8350
                          APIs
                            • Part of subcall function 00007FF7197CA950: getaddrinfo.WS2_32 ref: 00007FF7197CA972
                            • Part of subcall function 00007FF7197CA950: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197AE2B5), ref: 00007FF7197CA9DE
                            • Part of subcall function 00007FF7197CA950: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197AE2B5), ref: 00007FF7197CAA18
                            • Part of subcall function 00007FF7197CA950: memcpy.VCRUNTIME140(?,?,?,00007FF7197AE2B5), ref: 00007FF7197CAA31
                            • Part of subcall function 00007FF7197CA950: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7197AE2B5), ref: 00007FF7197CAA3F
                            • Part of subcall function 00007FF7197CA950: freeaddrinfo.WS2_32(?,?,?,00007FF7197AE2B5), ref: 00007FF7197CAAB1
                            • Part of subcall function 00007FF7197CA950: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197AE2B5), ref: 00007FF7197CAAC5
                            • Part of subcall function 00007FF7197CA950: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197AE2B5), ref: 00007FF7197CAACF
                            • Part of subcall function 00007FF7197CA950: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197AE2B5), ref: 00007FF7197CAADC
                          • WSAGetLastError.WS2_32 ref: 00007FF7197AE2BB
                          • WSAGetLastError.WS2_32 ref: 00007FF7197AE2C5
                          • EnterCriticalSection.KERNEL32 ref: 00007FF7197AE2E0
                          • LeaveCriticalSection.KERNEL32 ref: 00007FF7197AE2EF
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197AE300
                          • send.WS2_32 ref: 00007FF7197AE323
                          • WSAGetLastError.WS2_32 ref: 00007FF7197AE32D
                          • LeaveCriticalSection.KERNEL32 ref: 00007FF7197AE340
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                          • String ID:
                          • API String ID: 506363382-0
                          • Opcode ID: 34d92b24159a85357c38d0ada56053ba7442cf5bdefc3c4fdf4df049145647d0
                          • Instruction ID: 88e0715e7de33eca844fb77fff840597cc03a48d6053dbeff4dc428837974e88
                          • Opcode Fuzzy Hash: 34d92b24159a85357c38d0ada56053ba7442cf5bdefc3c4fdf4df049145647d0
                          • Instruction Fuzzy Hash: 01312F32A08E4286E750AF25E454269A7B0FF88FECF940131DA5E92694DF3CE44EC760
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastSleep
                          • String ID:
                          • API String ID: 1458359878-0
                          • Opcode ID: d95a31798d0151bcaeb50a7a4601c107789cf2f957820e7c3fa37ea77088056e
                          • Instruction ID: 84103ed3b5f7f477aa3446ddf80cb10402c9d4f926c731b11e25d23c1d5c922b
                          • Opcode Fuzzy Hash: d95a31798d0151bcaeb50a7a4601c107789cf2f957820e7c3fa37ea77088056e
                          • Instruction Fuzzy Hash: 39A1D921A28E5386E7695E1598003F9E2B5FF48BF8F944238E929477C4DF3DD94E8311
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$CriticalSection$CloseEnterHandleLeaveclosesocket
                          • String ID: %s$Connection #%ld to host %s left intact$mw1 chair
                          • API String ID: 1742564213-708184411
                          • Opcode ID: 14fc8627047496365cab5282c789d4c3397d654a0d5ae097a18192cd864e3027
                          • Instruction ID: 37bf294d8bd0f6cf2afae1d56f465361df3dc80e96bb7c900015d4ced2309390
                          • Opcode Fuzzy Hash: 14fc8627047496365cab5282c789d4c3397d654a0d5ae097a18192cd864e3027
                          • Instruction Fuzzy Hash: 48916236A08E8182E758BF2595403B9A3B1FF49FE8F884431DE4E07255DF39E56E8760
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                          • API String ID: 1294909896-116363806
                          • Opcode ID: c55f672c7333a6716099094c61bfd1cbbbf754fcfb7bdccba06579440c176d2e
                          • Instruction ID: a424f53a830e9698fc21b0bc5f9961a3d8f42528e86f2813eef5e5c1837ca3b8
                          • Opcode Fuzzy Hash: c55f672c7333a6716099094c61bfd1cbbbf754fcfb7bdccba06579440c176d2e
                          • Instruction Fuzzy Hash: 94915B32608F4186EB109F25E8506AEB7B4FB88BE9F840136DE4D47B64DF38D55ACB10
                          APIs
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7197B5A5B), ref: 00007FF7197B51F7
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7197B5A5B), ref: 00007FF7197B5228
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: calloc
                          • String ID:
                          • API String ID: 2635317215-0
                          • Opcode ID: 50987c5cad14bdfcda24b30612eb1aa8d4050ebd4d327836e1914b9a10a96704
                          • Instruction ID: 53df5b20c32cedaf7a0208cc364fce491b009fb119ce929ef934f59ec56918af
                          • Opcode Fuzzy Hash: 50987c5cad14bdfcda24b30612eb1aa8d4050ebd4d327836e1914b9a10a96704
                          • Instruction Fuzzy Hash: AA91AC22609BC189D7459F3894403AD7BA0FB59B6CF480235CFAD4B3D6DF3992A9C721
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B427B
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B4291
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B40AD
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B40CA
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B40DE
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B40FA
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B4117
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B413A
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B414E
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B4162
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B4188
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B419C
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B41B0
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B41FF
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B420C
                            • Part of subcall function 00007FF7197B4030: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B4235
                          • memset.VCRUNTIME140 ref: 00007FF7197B42C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$memset
                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                          • API String ID: 2717317152-3248832348
                          • Opcode ID: 46516f5f89a36fd41fa8d3f8aa0d933426d5d903802ef5b1c03d2c1d1f58118e
                          • Instruction ID: 5a306ae4c5ebaf290a45d980b220051fe5e3f3aa771210fdd19c6a5024f0d363
                          • Opcode Fuzzy Hash: 46516f5f89a36fd41fa8d3f8aa0d933426d5d903802ef5b1c03d2c1d1f58118e
                          • Instruction Fuzzy Hash: 7B71526290CEC185E751EF2594103BDA760EFA9FECF884131DA5E4B295DF38E65E8320
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                          • String ID:
                          • API String ID: 469868127-0
                          • Opcode ID: 90c15c59037da5175e91b1f97d9db1e39e4c3b9db4a617c0b516e91113119501
                          • Instruction ID: 604432b7cab37e8d58537b580242e268bf1850f208f5b329cb89b63fc955e345
                          • Opcode Fuzzy Hash: 90c15c59037da5175e91b1f97d9db1e39e4c3b9db4a617c0b516e91113119501
                          • Instruction Fuzzy Hash: 8121E836A08E5186E720AF12E584269A370FF9DBA4F444131DF8D43B51DF38E4AE8720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastmallocrecvsend
                          • String ID: Send failure: %s
                          • API String ID: 25851408-857917747
                          • Opcode ID: f7caa862d7d0562d6a326ef744cd5be1dbdbfc6008a7b94c6162be3df3c7598e
                          • Instruction ID: ff2d51019163a02c4b0ee95233ab315b9e3ad72c8e2982184a77ac12ed6bdff9
                          • Opcode Fuzzy Hash: f7caa862d7d0562d6a326ef744cd5be1dbdbfc6008a7b94c6162be3df3c7598e
                          • Instruction Fuzzy Hash: 5D417D32705B4189EB60AF25A8447B9A2A1AF59BFCF844135DE6E47794DE38D14EC310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: closesocket$calloc
                          • String ID: d
                          • API String ID: 2958813939-2564639436
                          • Opcode ID: dc96643bf28bd306c5f1ace07b0758f16f93c7f2ff44c8bbdf56e9a8f08e671b
                          • Instruction ID: be826058ff2c1899ff8dbbd40443cb3460f85764a56fffda353322680cc58f9f
                          • Opcode Fuzzy Hash: dc96643bf28bd306c5f1ace07b0758f16f93c7f2ff44c8bbdf56e9a8f08e671b
                          • Instruction Fuzzy Hash: 6B411D35608E4292E740BF35D4542E9A271FF9CBB8F884235DA5D462DAEF38D54E8360
                          APIs
                            • Part of subcall function 00007FF7197BB5D0: GetModuleHandleA.KERNEL32(00000000,?,00000000,00007FF7197E442A,?,?,?,?,00007FF7197BB95B), ref: 00007FF7197BB5E4
                          • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF7197BB95B), ref: 00007FF7197E4440
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: AddressCallerHandleModuleProc
                          • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                          • API String ID: 2084706301-3788156360
                          • Opcode ID: 749552f60eb2127888e98b67cffdfbbd08535677c87377954582435b4fb00ed6
                          • Instruction ID: 63b030fe56fc07bb6913af14581f3573df845e99709e7a5b6b9f31bdcfe5a06d
                          • Opcode Fuzzy Hash: 749552f60eb2127888e98b67cffdfbbd08535677c87377954582435b4fb00ed6
                          • Instruction Fuzzy Hash: 74F01960F09F0785FF95BF15A881770A2B06F6ABA8FC84435C80D52291EE7CA16F8360
                          APIs
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197C3650
                            • Part of subcall function 00007FF7197C3BE0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197C3C3A
                            • Part of subcall function 00007FF7197C3990: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197C3A28
                            • Part of subcall function 00007FF7197C3990: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197C3A31
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$calloc
                          • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                          • API String ID: 3095843317-1242256665
                          • Opcode ID: c396e27ed7a239927dfce4a08ab9b8c93f010392e7d2b45e33ff45d3352210b8
                          • Instruction ID: 4739716b410035fcda7dccd18f8dc5701ed25230df126670274ed5b0e84fa75b
                          • Opcode Fuzzy Hash: c396e27ed7a239927dfce4a08ab9b8c93f010392e7d2b45e33ff45d3352210b8
                          • Instruction Fuzzy Hash: 6C41A831A1CA8386E754EF25A4403B9A7B1AF897ECF844032EA8D57785DE3DD51EC720
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                          • API String ID: 0-3791222319
                          • Opcode ID: 1d7a4d072cdd2c6e46df6e4551e4d0a56e12c4a59ab16b47baf55204849aa488
                          • Instruction ID: c9863e2ff5dd939518fd862895a24b8820deac6982d7944b58321f583cb22a8f
                          • Opcode Fuzzy Hash: 1d7a4d072cdd2c6e46df6e4551e4d0a56e12c4a59ab16b47baf55204849aa488
                          • Instruction Fuzzy Hash: A7518121A18E4785EB94AF2195452B9A7A0EF48FFCF944231EA2D473D4DE3CE44ED320
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freerecv
                          • String ID:
                          • API String ID: 2032557106-0
                          • Opcode ID: 2b7179c2e53bdcc627888a6c325a1966c3b745451b4a8e8bc75eedb3cb8ff2e2
                          • Instruction ID: 32dda4ce001783682a6c9b5cf25fed43947af419bb563d313e593d88e6d30696
                          • Opcode Fuzzy Hash: 2b7179c2e53bdcc627888a6c325a1966c3b745451b4a8e8bc75eedb3cb8ff2e2
                          • Instruction Fuzzy Hash: AAC1B736608A8285EB659E1594447BAA3B0FF48BFCF984235DE5E437C4EE3CD85E8710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                          • API String ID: 1294909896-3248832348
                          • Opcode ID: 424f4a392657ad6d2764c8e514688c217f27326b06242757cd0048e651768efa
                          • Instruction ID: b68293a8fc03946f723ab5d7d44bfc87f0d9b7dfdaa786adf5786cd05bf547f1
                          • Opcode Fuzzy Hash: 424f4a392657ad6d2764c8e514688c217f27326b06242757cd0048e651768efa
                          • Instruction Fuzzy Hash: 8E518162A08AC181E7519F35D0403E9A760EB99BECF484131DF5E0B399DF79D59AC360
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastrecv
                          • String ID:
                          • API String ID: 2514157807-0
                          • Opcode ID: 20e57d370d5a4562b334f604a10441347382489be41bd7eccfc8f966b83bbee2
                          • Instruction ID: cc1d917f3dc35fc0f260f89da75c967fa9636a84d8fb81cd352feb5efba38ccd
                          • Opcode Fuzzy Hash: 20e57d370d5a4562b334f604a10441347382489be41bd7eccfc8f966b83bbee2
                          • Instruction Fuzzy Hash: E6E0DF21F0890583FF286B70B85937851A5DF98B75F885374CA3A863C0EA2C44DA4320
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CloseHandleObjectSingleWait
                          • String ID:
                          • API String ID: 528846559-0
                          • Opcode ID: 8a11b43826a5c1d2fe062743faa585eb1cc7c3fe793f9c8501c6c020771fb244
                          • Instruction ID: f4cc846ef4bb466819359c72c0d642832ad571018a814f9983fe2fee406bd108
                          • Opcode Fuzzy Hash: 8a11b43826a5c1d2fe062743faa585eb1cc7c3fe793f9c8501c6c020771fb244
                          • Instruction Fuzzy Hash: 00E0BF37714E8283DB405FBAF59472A6260EB8CBE4F549130EA69437A4DF38C4A98700
                          APIs
                          • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,00000000,-00000001,?,00007FF7197C1035), ref: 00007FF7197ADEFF
                          • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,00000000,-00000001,?,00007FF7197C1035), ref: 00007FF7197ADF0C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CriticalSection$EnterLeave
                          • String ID:
                          • API String ID: 3168844106-0
                          • Opcode ID: b8d37040b4e5ad0de564752d1a004a95ad015ce422d3aba9948c6b9beccfb232
                          • Instruction ID: 9fd9753f1bb1bde96e3f24bd89f931940c4660772cf27919f060421eca95e4b2
                          • Opcode Fuzzy Hash: b8d37040b4e5ad0de564752d1a004a95ad015ce422d3aba9948c6b9beccfb232
                          • Instruction Fuzzy Hash: 42314132A08E8183E714EF15D5502A9A3B0FF58F98F544435DB5E43B55DF38E59A8710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: closesocket
                          • String ID:
                          • API String ID: 2781271927-0
                          • Opcode ID: 5a1019d261a828d2997fd3be63db00cb255fb9f4cb533f7a408f908a227f19b4
                          • Instruction ID: fa8c0c4a7e4d18846e3970d86815f01fa490e4f165e906ada0a3328d45c6c827
                          • Opcode Fuzzy Hash: 5a1019d261a828d2997fd3be63db00cb255fb9f4cb533f7a408f908a227f19b4
                          • Instruction Fuzzy Hash: 33018421B0A94181EB54EF2AD1593ADA2B0EF9CFDCF485031D71E47291DE28D49E8711
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: socket
                          • String ID:
                          • API String ID: 98920635-0
                          • Opcode ID: eb828bb8e6cf67ca4620dac37dd72dfff1fd979d3311dd17075bff24d790287a
                          • Instruction ID: 8b1a7f19cfa7f61d4d000b781d7a5c0d1797ebadc4079d66433f689661e7d491
                          • Opcode Fuzzy Hash: eb828bb8e6cf67ca4620dac37dd72dfff1fd979d3311dd17075bff24d790287a
                          • Instruction Fuzzy Hash: 3FE09B36E1694183DE097B3584511792371AF95BB8FC44375C53D023D0DD2DD25F9B10
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _beginthreadex
                          • String ID:
                          • API String ID: 3014514943-0
                          • Opcode ID: ffa20f5c86af0c71820ec21381e1c222c80a4396c08846a17e0aaa1445935150
                          • Instruction ID: d8bdb8e330f49be7f3f6c5779eef665627f9acb63300fad0cbaf53ab129af987
                          • Opcode Fuzzy Hash: ffa20f5c86af0c71820ec21381e1c222c80a4396c08846a17e0aaa1445935150
                          • Instruction Fuzzy Hash: 13D02B63718A00439F10DF76A844029E351BB8C7B4B884338AE7D827E4EB3CD24A4600
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ioctlsocket
                          • String ID:
                          • API String ID: 3577187118-0
                          • Opcode ID: 748b9091ed51b69ea683cab6bc317e1796865a5c3fb811f049a1f8a1912088da
                          • Instruction ID: 6ef1a0d94bb1ec78e0990b2d31e47257ff5c178be5612c309cf184763245b679
                          • Opcode Fuzzy Hash: 748b9091ed51b69ea683cab6bc317e1796865a5c3fb811f049a1f8a1912088da
                          • Instruction Fuzzy Hash: D8C08056F149C1C3C3446F655485087A7B2FFC4654FD55435D10741128ED3CD2AD8B50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$fwrite$_strdupmemchrstrncmp
                          • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                          • API String ID: 3939785054-690044944
                          • Opcode ID: a966fad93b7751da1a2eafffaedcf9b2cc46eaf9654dafc2a7450ccaa96eadad
                          • Instruction ID: 0404f83b05530ab4540d4b7273176c1fea8823f4efd0568444ce71de96b6cf56
                          • Opcode Fuzzy Hash: a966fad93b7751da1a2eafffaedcf9b2cc46eaf9654dafc2a7450ccaa96eadad
                          • Instruction Fuzzy Hash: 23C28171A1CE8385EB54AF2584543F9A7B1AF49BFCF884135CE5D0B295EE2DA44EC320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                          • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                          • API String ID: 2059720140-3844637060
                          • Opcode ID: 41103d9851d4d4e19879cecec1e75071db510cede8e2293ef3ff4e83f9a20db5
                          • Instruction ID: 54dba4e8c54407270dde9d99f70bbda857b064c7a1d82c9a3c22b357d81aa537
                          • Opcode Fuzzy Hash: 41103d9851d4d4e19879cecec1e75071db510cede8e2293ef3ff4e83f9a20db5
                          • Instruction Fuzzy Hash: 4A72A461E08F8695FB61AF25D440379E7B0AF58BECF8C0531DA4E46695EF2CE54E8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$#211$fwrite$#217calloc
                          • String ID: ;binary$DN: $LDAP local: %s$LDAP local: %s$LDAP local: Cannot connect to %s:%ld$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                          • API String ID: 2742731861-78870445
                          • Opcode ID: 0132037dcbb878a53ae2eb3e7c95ae34dbe9a0826bf8ec574caacb9de82dcfb9
                          • Instruction ID: d7a0fd182d6a053ea1e738b3ff39755f66c468df55a3fe1a2e37a3aebfd67b08
                          • Opcode Fuzzy Hash: 0132037dcbb878a53ae2eb3e7c95ae34dbe9a0826bf8ec574caacb9de82dcfb9
                          • Instruction Fuzzy Hash: E7425E65B19E4286EB10AF6194542B9A7B1FF89BECF804031CE1E67794EE3CE54EC350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateNameOpenString
                          • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                          • API String ID: 561913010-2037819326
                          • Opcode ID: 04f56f9fc5ea19e209b175ca6a5c16f24bc8558bd1784ab9995ea6de565a5352
                          • Instruction ID: 06c9fc4e8e62debdfef27ae246e15970ffb8fc5f179f1791f2df7eecbb92c548
                          • Opcode Fuzzy Hash: 04f56f9fc5ea19e209b175ca6a5c16f24bc8558bd1784ab9995ea6de565a5352
                          • Instruction Fuzzy Hash: 36429C32A08E4286EB50AF14E4402B9A7B1FF48BE8F944235DA5D27794DF3CE54ED721
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastcallocfreegetsockname
                          • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                          • API String ID: 2454324209-2383553807
                          • Opcode ID: 2506126233441dbd59eeba638b13e9866409b4834d07817132997a71c59bbb09
                          • Instruction ID: 8abb37c98501a75715eda2d2be2a44fadfd21867b62e0b594fe55ea4d1b13c46
                          • Opcode Fuzzy Hash: 2506126233441dbd59eeba638b13e9866409b4834d07817132997a71c59bbb09
                          • Instruction Fuzzy Hash: 8F228861A08F8285EB50AF2594402BAE7B1FF49BECF844031EA5E47695DF3DE54EC720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                          • String ID: array$number overflow parsing '$object$object key$object separator
                          • API String ID: 1346393832-85532522
                          • Opcode ID: 957cb1d069f10821013d6d0e8e743f4fdf26fda56c0313c8a7246a6a80166625
                          • Instruction ID: 6b3ce627c9e66ce0e71b251c00d69ecab492237653867751f5942d2adceb38e8
                          • Opcode Fuzzy Hash: 957cb1d069f10821013d6d0e8e743f4fdf26fda56c0313c8a7246a6a80166625
                          • Instruction Fuzzy Hash: F0829462E18F9585FB00EF78D4452ADA331FF897B8F905231DA5C16AD5EF68E08AC350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemallocstrncmp
                          • String ID: public key hash: sha256//%s$-----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----$;sha256//$sha256//
                          • API String ID: 1436789207-471711153
                          • Opcode ID: 462ab1ef3dc549e44d95ee799e473f2f586a5f4cdc6c78c0b0a941ab025bce8c
                          • Instruction ID: 3c1d1add703f8ea45f22eee72a6b051bb0ba77ce6f9470b5df143f73102b666a
                          • Opcode Fuzzy Hash: 462ab1ef3dc549e44d95ee799e473f2f586a5f4cdc6c78c0b0a941ab025bce8c
                          • Instruction Fuzzy Hash: 8DA18311B0AE4281FA55AF15A814279E6B0AF6CBF8FC44431DD1F577A5EE2CE54F8320
                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719797B07
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719797B46
                            • Part of subcall function 00007FF71978D3B0: memcpy.VCRUNTIME140(?,?,?,?,00007FF719781080), ref: 00007FF71978D3E8
                            • Part of subcall function 00007FF71979B690: memcpy.VCRUNTIME140 ref: 00007FF71979B70F
                            • Part of subcall function 00007FF71979B690: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979B782
                            • Part of subcall function 00007FF71979B690: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979B7BC
                            • Part of subcall function 00007FF71979B690: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979B80F
                            • Part of subcall function 00007FF71978F8A0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71978F967
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719797C61
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719797CB0
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719797CEF
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719797D3E
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719797D7D
                          • memcpy.VCRUNTIME140 ref: 00007FF719797E60
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719797FC5
                          • memset.VCRUNTIME140 ref: 00007FF719797FF1
                          • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF719798019
                          • ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF719798039
                          • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF719798079
                            • Part of subcall function 00007FF7197A6C80: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197A6D98
                            • Part of subcall function 00007FF7197A6C80: memcpy.VCRUNTIME140 ref: 00007FF7197A6DCA
                            • Part of subcall function 00007FF7197A6C80: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197A6DFC
                            • Part of subcall function 00007FF7197A6C80: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197A6E07
                          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF719798142
                          • ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD@Z.MSVCP140 ref: 00007FF719798157
                          • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF719798167
                          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF719798185
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719798272
                          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF719798335
                          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF719798342
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719798381
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719798388
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7197983E1
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979843C
                            • Part of subcall function 00007FF719781AD0: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF71978D4A5,?,?,?,?,00007FF719781080), ref: 00007FF719781ADB
                          Strings
                          • You need to run the KeyAuthApp.init(); function before any other KeyAuth functions, xrefs: 00007FF7197979CF
                          • Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: , xrefs: 00007FF719798289
                          • , xrefs: 00007FF7197980FE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$U?$char_traits@$D@std@@@std@@$memcpy$??6?$basic_ostream@V01@malloc$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?fill@?$basic_ios@?setw@std@@D@std@@@1@@J@1@_Smanip@_U?$_V21@@V?$basic_streambuf@Vios_base@1@Xlength_error@std@@freememsetsystem
                          • String ID: $Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: $You need to run the KeyAuthApp.init(); function before any other KeyAuth functions
                          • API String ID: 3735971780-4274135686
                          • Opcode ID: 05062014d779f7e6fec32f4097d0dc290ca12604f9d7c6b0cf133cfc9143369d
                          • Instruction ID: 249d5cb45f1558dae41a06bc06b8943a7956067519e8a1fe880b7734b35af98b
                          • Opcode Fuzzy Hash: 05062014d779f7e6fec32f4097d0dc290ca12604f9d7c6b0cf133cfc9143369d
                          • Instruction Fuzzy Hash: 0B629062A14E8685EB10EF34D8443EDA771FF497ACF804621DA6D16A99EF78D18EC310
                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719796F19
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719796F68
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719796FA7
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719796FF6
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719797038
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979708A
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7197970C9
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719797314
                          • memset.VCRUNTIME140 ref: 00007FF719797340
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$memset
                          • String ID: $Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message:
                          • API String ID: 3820209055-927317299
                          • Opcode ID: d9f83e36331ecc97ec25f1ecf0fe2c7caa72ba45707463b8d565c630b1046038
                          • Instruction ID: 01a73970be464f3e44b32730e15ab578c77f82b490e4876d2c1625c8741b7781
                          • Opcode Fuzzy Hash: d9f83e36331ecc97ec25f1ecf0fe2c7caa72ba45707463b8d565c630b1046038
                          • Instruction Fuzzy Hash: 15326D62A14A8285EB10EF74D8443ECA371FF49BF8F904231D66D16AD9EF68D18EC310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                          • String ID: $CurrentUser$schannel: Failed to import cert file %s, password is bad
                          • API String ID: 4221717217-4282655970
                          • Opcode ID: 2bc3b4ff1b728bd590babf64760f3361fd49c7e633ab9c713fce5191dcbf56e2
                          • Instruction ID: 595b434659baf59780c11a415328297ae6b475f96f7cbec27b07d45ab30b7d43
                          • Opcode Fuzzy Hash: 2bc3b4ff1b728bd590babf64760f3361fd49c7e633ab9c713fce5191dcbf56e2
                          • Instruction Fuzzy Hash: 51814621F19E4386FB55AF21A854275A6B0BF4DBF8F884535C91E566D0EF3CE44E8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                          • String ID: CurrentUser$schannel: Failed to import cert file %s, password is bad
                          • API String ID: 4221717217-1887299029
                          • Opcode ID: 86fffcfc8eb61dd9ba0f61dda9cea2c5dfdd98c58769a83221200aafa928ff93
                          • Instruction ID: a5f6e0a5d4e1f0a88197ab6e09d663332ee52bcbb6c7593b6e6550cb838d7b13
                          • Opcode Fuzzy Hash: 86fffcfc8eb61dd9ba0f61dda9cea2c5dfdd98c58769a83221200aafa928ff93
                          • Instruction Fuzzy Hash: 0E814621F19E4386FB55AF21A854275A6B0BF49BF8F884535C92E567D0EF3CE44E8320
                          Strings
                          • You need to run the KeyAuthApp.init(); function before any other KeyAuth functions, xrefs: 00007FF71979A5BE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: You need to run the KeyAuthApp.init(); function before any other KeyAuth functions
                          • API String ID: 0-2984758112
                          • Opcode ID: c8e4e7b71f9810b5a41f25e536691d601e7088a1ad53077bc4e8de7c14d4b2e4
                          • Instruction ID: 0ba2007991af92a6b2503ae3313dfeb3d1f6821a3ca5f9cde376e8c765311a3b
                          • Opcode Fuzzy Hash: c8e4e7b71f9810b5a41f25e536691d601e7088a1ad53077bc4e8de7c14d4b2e4
                          • Instruction Fuzzy Hash: 46A2DE62A19A8289EB14EF74D4443ECA771FF497FCF904221DA6D17A99DF38D18AC310
                          Strings
                          • You need to run the KeyAuthApp.init(); function before any other KeyAuth functions, xrefs: 00007FF71979A5BE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: You need to run the KeyAuthApp.init(); function before any other KeyAuth functions
                          • API String ID: 0-2984758112
                          • Opcode ID: 5c02e654ac3daa0694eb309eacaacd9a192ce08af0194dc3c006fc7505a6b47b
                          • Instruction ID: b256cfc6a38427a0fbe2e12b035a9d22ad32ef16500970d67d91a9c029237c9d
                          • Opcode Fuzzy Hash: 5c02e654ac3daa0694eb309eacaacd9a192ce08af0194dc3c006fc7505a6b47b
                          • Instruction Fuzzy Hash: 9992BF62A19A8289EB14EF74D4443ECA771FB497FCF904221DA6D17A99DF38D18EC310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup$fclosefgetsfopen
                          • String ID: $default$login$machine$password
                          • API String ID: 431015889-155862542
                          • Opcode ID: 508c512da910758eb45f15e609f30a01ef11bb745af601c804d16c987fefaa5c
                          • Instruction ID: add78538d9affe0ff35367b6ce8469e70243cec2dbfcb433023dcbe24873ebb0
                          • Opcode Fuzzy Hash: 508c512da910758eb45f15e609f30a01ef11bb745af601c804d16c987fefaa5c
                          • Instruction Fuzzy Hash: A2A18521A0DE8289FA61AF119550779E6B0AF9C7ECF884031DE4E16794EE3CE44E8724
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$_dclass
                          • String ID: array$number overflow parsing '
                          • API String ID: 1391767211-1723591761
                          • Opcode ID: 9538e38ff7c61a3d32f854fbbb1483515952fee3f87f33fb687ee692d21f818d
                          • Instruction ID: d52245b558fdf4897c8afd571162ee8e28ea05bc3d7b65caa9976f0b92dcc982
                          • Opcode Fuzzy Hash: 9538e38ff7c61a3d32f854fbbb1483515952fee3f87f33fb687ee692d21f818d
                          • Instruction Fuzzy Hash: A4E19362A18F9585FB00DF78D4453ADA331FF597F8F905231DA6D16AD5EF28E08AC210
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID: 5$6$7$8$9$:$;$<$=$n
                          • API String ID: 2882836952-3329899210
                          • Opcode ID: 4fdf88316e3e14cd9c51ca5689c98a2efad4e3aab6ebebc18664c92eb7eed8c5
                          • Instruction ID: fac52411282503bbf78d9fe9c20b8449bb0fce0f22313c5e15ba09c715c32fd6
                          • Opcode Fuzzy Hash: 4fdf88316e3e14cd9c51ca5689c98a2efad4e3aab6ebebc18664c92eb7eed8c5
                          • Instruction Fuzzy Hash: 42D17C26E19F9246F703DB399401169F770AFA77D8B94C337FE1432A91EF29A1968300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errno$strtol
                          • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                          • API String ID: 3596500743-988243589
                          • Opcode ID: 2e5424407be538489bc9d8d6cb8a3c1b9d0c12c1910608ac32b99392c699efcf
                          • Instruction ID: 7fc29e0a148c944a8d1d3f15fd49290eacc91e17dbdc664efb5684273f87911f
                          • Opcode Fuzzy Hash: 2e5424407be538489bc9d8d6cb8a3c1b9d0c12c1910608ac32b99392c699efcf
                          • Instruction Fuzzy Hash: 62F1B572F249128AEB28AF6494001BC77B1AF587FDB904235DE1E577D4EE38A84E8750
                          APIs
                            • Part of subcall function 00007FF71979F340: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00007FF71978A7FB), ref: 00007FF71979F4A4
                          • memcpy.VCRUNTIME140 ref: 00007FF719799BAB
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719799D1D
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719799D6F
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719799DC0
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719799DFF
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719799E50
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719799E8F
                            • Part of subcall function 00007FF719781B60: __std_exception_copy.VCRUNTIME140 ref: 00007FF719781B9E
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF719799F0B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                          • String ID: mw1 chair$parse error
                          • API String ID: 2484256320-280240065
                          • Opcode ID: 1536065ae0a35c5f9eacec888e5bf35c9484e616c2239f31697ebbd7b3b1ee5c
                          • Instruction ID: d917acfe3e096136abdc0fffde05a5e85358f6c2bb6549e32a785541eaab800e
                          • Opcode Fuzzy Hash: 1536065ae0a35c5f9eacec888e5bf35c9484e616c2239f31697ebbd7b3b1ee5c
                          • Instruction Fuzzy Hash: 72D18F62A18F8685FB00DF35E4443ADA771FF997F8F905221EA6D12695EF68E089C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                          • String ID: @
                          • API String ID: 3606780921-2766056989
                          • Opcode ID: b199ebcfed380d48043e581de1b523fcb5d011091ec35df18f3fe7f03df88b60
                          • Instruction ID: b14ccf1b78571f5b86a03ec1c58e5e04658a7e290a6a03db23c25d0d39ca64b2
                          • Opcode Fuzzy Hash: b199ebcfed380d48043e581de1b523fcb5d011091ec35df18f3fe7f03df88b60
                          • Instruction Fuzzy Hash: 1A214C32618A8187EB609F61F45466AB371FFC9BD8F845135EA8E47A18DF3CD40A8B14
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: 5$6$7$8$9$:$;$<$=$n
                          • API String ID: 0-3329899210
                          • Opcode ID: 7603848dbae701a4f6dde75cfe4a8349f3b2e3999f758e02aabcd30d25443663
                          • Instruction ID: a7a8ed1c39664b25f92c7f3a4d9edb3792d74e68f7d8740414ca0fb2653474f8
                          • Opcode Fuzzy Hash: 7603848dbae701a4f6dde75cfe4a8349f3b2e3999f758e02aabcd30d25443663
                          • Instruction Fuzzy Hash: C9225E22E18F9146EB12DF359001279E7B0BF5ABD8F84D336ED4927A41EF2DE54A8300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                          • String ID: @
                          • API String ID: 3016261861-2766056989
                          • Opcode ID: 4f400fb149a1b548b67f52ef4e7b998509afac53caf920d5a782184336a16432
                          • Instruction ID: 8810813f29a1b71ee077ce19cfc50eba5326688c216313f632a1cfb38c11ba05
                          • Opcode Fuzzy Hash: 4f400fb149a1b548b67f52ef4e7b998509afac53caf920d5a782184336a16432
                          • Instruction Fuzzy Hash: 8C41CB22A04AA08EF7108FB5E4543FE7BB0FB4A788F444061DE9823A5ACB3C911ED710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Crypt$Context$Release$AcquireRandom
                          • String ID: @
                          • API String ID: 2916321625-2766056989
                          • Opcode ID: 6082fa5a4986b7d1eefb3f70c625ecfa5b2544f5ccb5c2cf636573f7448ed044
                          • Instruction ID: e37f3f82805f2ac09cf5fb1782744398fc58aa02835d6e8daa6f0dd73e8179c7
                          • Opcode Fuzzy Hash: 6082fa5a4986b7d1eefb3f70c625ecfa5b2544f5ccb5c2cf636573f7448ed044
                          • Instruction Fuzzy Hash: BBF08666718A4282E7009F15F448336E370EFCCBE8F844430DE5C56668EE7CC08E8B14
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Crypt$Hash$Param$ContextDestroyRelease
                          • String ID:
                          • API String ID: 2110207923-0
                          • Opcode ID: 8f12a1f414620edc71d4b012d0aba369fc9a7e8b3e0ec3a1e560b23f03fb7696
                          • Instruction ID: 97d030fd544d78b5f3d602610bd6c68bd4039802f593cc1c11463b7fa1882b86
                          • Opcode Fuzzy Hash: 8f12a1f414620edc71d4b012d0aba369fc9a7e8b3e0ec3a1e560b23f03fb7696
                          • Instruction Fuzzy Hash: 34015E36618A41C2EB109F20E45873AB730FF88BE8F944531DA5906A68CF3CE84ECB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: FormatInfoLocaleMessage
                          • String ID: !x-sys-default-locale
                          • API String ID: 4235545615-2729719199
                          • Opcode ID: b6396efd2b411913c604dfbcd843a41c083d30f8696823506ca71d1e4185de52
                          • Instruction ID: 2f93254134e3e8c39020bc74251dd11bf858088743d58919d5fd6e7578304985
                          • Opcode Fuzzy Hash: b6396efd2b411913c604dfbcd843a41c083d30f8696823506ca71d1e4185de52
                          • Instruction Fuzzy Hash: C901C472B08B8282E7119F12B4447BAA7B2FB897E8F848135DA5916A94DF3CD50EC710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Crypt$AcquireContextCreateHash
                          • String ID: @
                          • API String ID: 1914063823-2766056989
                          • Opcode ID: 07c9d47108fc3ad71a41631baf01da2f3da8390ba16a22fec74377c9f0bb1267
                          • Instruction ID: 22d941a0036f703b2b8d7d94db0bbc60ee5e00059dfc61b84dda756eb352144f
                          • Opcode Fuzzy Hash: 07c9d47108fc3ad71a41631baf01da2f3da8390ba16a22fec74377c9f0bb1267
                          • Instruction Fuzzy Hash: F9E01266B2495283F7609F65E405B26A360EF98B98F8540208E8D46A54DF3DD15A8B14
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _getpidhtons
                          • String ID:
                          • API String ID: 3416910171-0
                          • Opcode ID: cc9e7fa553ed23a3e6780596f40e94c0e3b7503552778ab360693c8f915b6de3
                          • Instruction ID: accd8700cf9710874be9a4e7f7a16f5432053ded443a4fd61d8b0c14f77f436a
                          • Opcode Fuzzy Hash: cc9e7fa553ed23a3e6780596f40e94c0e3b7503552778ab360693c8f915b6de3
                          • Instruction Fuzzy Hash: 60113C26A247D0CAD304CF35E5001AD7770FB5CB88B44962AFB9987B19EB78D6D4C744
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f15f5102f12e8194bc44bd48c809dd33afe684242a5eb66359b70ce73724ac58
                          • Instruction ID: d808c092e45e8240c008184c1e7770e2b9da74596132cc50f826917a3858d3e8
                          • Opcode Fuzzy Hash: f15f5102f12e8194bc44bd48c809dd33afe684242a5eb66359b70ce73724ac58
                          • Instruction Fuzzy Hash: 3EC1E373B25A9587E716DF12D945569F7A2FBD8BE4B85C130DA4A07B44CB3CE80AC700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memset
                          • String ID:
                          • API String ID: 2221118986-0
                          • Opcode ID: 45ef815ea85129ee6b0d6973e0bb183715d2ac43699a5b2549753aa1c042f307
                          • Instruction ID: d62cac5a180e3318448442f3d25e3dea04063a12f3c5809b69e3fa5c85ab7d14
                          • Opcode Fuzzy Hash: 45ef815ea85129ee6b0d6973e0bb183715d2ac43699a5b2549753aa1c042f307
                          • Instruction Fuzzy Hash: 8AC10F22A08E9186EB649F11D051379E7A4FF99FD8F84803ACA8D47784DF7CD54E8710
                          APIs
                          • GetProcessHeap.KERNEL32(?,?,?,00007FF7197A5E73,?,?,00000000,00007FF7197A68C5), ref: 00007FF7197A64AD
                            • Part of subcall function 00007FF7197F19B0: AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF719781813), ref: 00007FF7197F19C0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: AcquireExclusiveHeapLockProcess
                          • String ID:
                          • API String ID: 3110430671-0
                          • Opcode ID: d1505e472a0fd281962cf8dbfb803b5a8f8c708247806b02aff7a1cdafd5ce21
                          • Instruction ID: 4ad915320675f4850c592739b8181dc3d587766e82a7df7adf02a1a7655d1302
                          • Opcode Fuzzy Hash: d1505e472a0fd281962cf8dbfb803b5a8f8c708247806b02aff7a1cdafd5ce21
                          • Instruction Fuzzy Hash: 3A317760A1DE42C9E740FF14FC802A4A3B0AF597B8FD44136D45D562A5EE2CA5AFC6A0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2cdca47630f0c8f04c3bca8bb16ecddcb7a49b36e39df03ee866b2b24d727d04
                          • Instruction ID: 14b35d8022eebd16432846c2d9448e7775a5fb1c53360fdc78741727a5a9de0e
                          • Opcode Fuzzy Hash: 2cdca47630f0c8f04c3bca8bb16ecddcb7a49b36e39df03ee866b2b24d727d04
                          • Instruction Fuzzy Hash: 65A12322B18A9586DA149F15C061378F7A1FF59BD8F888072DA8E07798DF3CE85E8710
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                          • Instruction ID: 4ef697208e660e51e32471434644e5badccefc59c34fd8e3ccbce27ccf45d264
                          • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                          • Instruction Fuzzy Hash: 07F05269324B67AEFE01893B4624FAD5E519B90B40FA368748C84020CB9AAE54A7D724
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c289d905f3bdd2934b30085e9b980ed7e8fe7661c540f790fd8fd46bb9bd6746
                          • Instruction ID: 3103bf17cff96ac591342a460208bc6079c5c75b43ad8c10ad5c3311fb5a9ba0
                          • Opcode Fuzzy Hash: c289d905f3bdd2934b30085e9b980ed7e8fe7661c540f790fd8fd46bb9bd6746
                          • Instruction Fuzzy Hash: 61A01123B0AC0AC0A2008B00E2A0E20A220EBC8BA83828020880E028208E28808AC200
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$CounterPerformanceQuery
                          • String ID: Closing connection %ld
                          • API String ID: 3490100708-2599090834
                          • Opcode ID: 8a8a0e4e5fe022af89b3c130e90702d560810d86965a795d9a901474a6c626b6
                          • Instruction ID: 46abe46b303a4ab83456a68a0c1b48be69f8ec07e9c66c94c38b91970a775f50
                          • Opcode Fuzzy Hash: 8a8a0e4e5fe022af89b3c130e90702d560810d86965a795d9a901474a6c626b6
                          • Instruction Fuzzy Hash: 6AC1DC35A09F8186E740AF21D8502AD7374FB99FB8F484135EE5E47669CF38929F8720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                          • API String ID: 1294909896-2200874227
                          • Opcode ID: a40f233960876ef576a7ddbd7bcd06506a2316c435e9cdff5a83187961fdf089
                          • Instruction ID: 0dfca784bfa0cf477631d565637aa1601f1e197d4686c818303fbe4c9ced74ac
                          • Opcode Fuzzy Hash: a40f233960876ef576a7ddbd7bcd06506a2316c435e9cdff5a83187961fdf089
                          • Instruction Fuzzy Hash: A2025575A0AF8285EA54BF15A4503BAA3F1AF487E8F840035DE5E47795EF3CE54E8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree$strpbrk
                          • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                          • API String ID: 2737852498-2994854565
                          • Opcode ID: 7883361c1b58450adb40d46f80fdc1d64b6fc8705fed8b763f7d4c395d0d0150
                          • Instruction ID: 026afad340aa71667ce339781c6dd9b821c4304d34140875cfa089fde4a7ea92
                          • Opcode Fuzzy Hash: 7883361c1b58450adb40d46f80fdc1d64b6fc8705fed8b763f7d4c395d0d0150
                          • Instruction Fuzzy Hash: 6DD14721A09F5284FB51AF22A8546B9A3B0AF49BF8F844431DD5E17795EF2CE54FC320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: calloc$_strdupfreehtonsmemset
                          • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                          • API String ID: 130798683-4053692942
                          • Opcode ID: 27ac65ade6a49855d15a0d887e95371f6df9889a03383c231eb6b08653a7f7a4
                          • Instruction ID: 8b86e27471e84214771b42d31f923fe057d9fb0da26774e548efdeda6d597fdc
                          • Opcode Fuzzy Hash: 27ac65ade6a49855d15a0d887e95371f6df9889a03383c231eb6b08653a7f7a4
                          • Instruction Fuzzy Hash: A1E17F32A08E868AEB60AF21D4403A9B7B0FF49BA8F884135DA4D57654DF3CD55EC750
                          APIs
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFC46
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFC6C
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFC7D
                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFCEB
                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFD1C
                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFD3C
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFD4E
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFDB0
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFE21
                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFE38
                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFEF3
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFF67
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7197DF37F), ref: 00007FF7197DFF70
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$free$_strdupcalloc
                          • String ID: LDAP$base$one$onetree$sub$subtree
                          • API String ID: 112326314-884163498
                          • Opcode ID: 7457ec10a7863926a73970fb80d2f266a049ecbafc5bdee017a16620ab069567
                          • Instruction ID: 54181b66a78311903690da7e126c1713121139be75911a58d32d21f83e245d96
                          • Opcode Fuzzy Hash: 7457ec10a7863926a73970fb80d2f266a049ecbafc5bdee017a16620ab069567
                          • Instruction Fuzzy Hash: 41B17D22A19F8286EA51AF159410279A3F0FF4DBE8F884431DE4D47B95EF3CE55E8720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memchrstrtol
                          • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                          • API String ID: 1626215102-895336422
                          • Opcode ID: 616d3ad0d74c5b29ab7257f440df8e7a03a6e9cb897c17770af368ebb8476fcb
                          • Instruction ID: f22b10520bd38d10c531f8829f292dcabf195a880ae180995e2485b8c3d4191f
                          • Opcode Fuzzy Hash: 616d3ad0d74c5b29ab7257f440df8e7a03a6e9cb897c17770af368ebb8476fcb
                          • Instruction Fuzzy Hash: 44619E60B08E4295EA14AF11A4142B9E2B0AF497F8FD44631D96E577D5EE3CE10FC3A0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                          • API String ID: 1294909896-1595554923
                          • Opcode ID: 570bb8296e1f2627a6445f9f05a289e92b3df1b2c3371be4d9f2f65be19f9100
                          • Instruction ID: a26e44c411893ea95b76b80a35ee7fd77cd82cbb29c3e2172749c8c87f37e7ef
                          • Opcode Fuzzy Hash: 570bb8296e1f2627a6445f9f05a289e92b3df1b2c3371be4d9f2f65be19f9100
                          • Instruction Fuzzy Hash: 23E15B22B08E5295EAA5AF1595002B9A7B0FF08FE8FCC4435DE4D57681DF3CE95E8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@D@std@@@1@@V?$basic_streambuf@_invalid_parameter_noinfo_noreturnmemcpymemset
                          • String ID: $Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message:
                          • API String ID: 1294974349-927317299
                          • Opcode ID: 410f36a4870d238e05208bbdbcc36e2d00af9211a10ad3981071c9aadfc18226
                          • Instruction ID: e411707d812f736267625fd577b51fb04ac4f180aa6cc3bb70f98c9e54cb5655
                          • Opcode Fuzzy Hash: 410f36a4870d238e05208bbdbcc36e2d00af9211a10ad3981071c9aadfc18226
                          • Instruction Fuzzy Hash: D9027062A15AC285EB10EF35D8443E9A771FF89BE8F804232D65D17699EF68D18EC310
                          APIs
                          • memset.VCRUNTIME140 ref: 00007FF71979ED87
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979EEAD
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF71979EEDB
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF71979EEE8
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979EF21
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979EF73
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979F0F7
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF71979F124
                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF71979F131
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979F16B
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979F1BE
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979F2A7
                          • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF71979F2C4
                          • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF71979F2D5
                          • ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z.MSVCP140 ref: 00007FF71979F2F8
                          • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF71979F306
                            • Part of subcall function 00007FF71979B8A0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979B9F7
                            • Part of subcall function 00007FF719799AD0: memcpy.VCRUNTIME140 ref: 00007FF719799BAB
                            • Part of subcall function 00007FF71979C1F0: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,00007FF71979BAB2), ref: 00007FF71979C2CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$D@std@@@std@@U?$char_traits@__std_exception_destroy$?gptr@?$basic_streambuf@memcpy$?eback@?$basic_streambuf@?gbump@?$basic_streambuf@memset
                          • String ID: mw1 chair$value
                          • API String ID: 1588778072-2545578270
                          • Opcode ID: f4837b6ca7ddc26443359525ecf6f66fc6156b3506967fc058f36f18416aeb88
                          • Instruction ID: 90091dbcde305994c2f89bf24ebe41ff1ff9ba0ad1b61fec854d7b7a71a8b65a
                          • Opcode Fuzzy Hash: f4837b6ca7ddc26443359525ecf6f66fc6156b3506967fc058f36f18416aeb88
                          • Instruction Fuzzy Hash: F4029322A18E8185E710AF74D4443ADA771EF897F8F944331EAAD12AD9DF6CD48EC710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                          • String ID:
                          • API String ID: 1087521380-0
                          • Opcode ID: 7f1a20b7f97d444a339020af2ee787f49430f9708660ea9bab881476ffcce99f
                          • Instruction ID: 3e654c96350454a462ead100df65b5fb3efac1e80250688f8858e5667d7be3f0
                          • Opcode Fuzzy Hash: 7f1a20b7f97d444a339020af2ee787f49430f9708660ea9bab881476ffcce99f
                          • Instruction Fuzzy Hash: 4FB16021E0AF4295EB5AAF259510278A6B0AF49FF8F8C0535CE5D46791DF2CE49EC320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchrstrrchr$_strdupstrstr
                          • String ID: .$/$/$/$?
                          • API String ID: 2325335452-1821401756
                          • Opcode ID: 3f58e7fa9ad400dc24d95ef4fcd050962103d863482cf5ca1810015a8c4a0303
                          • Instruction ID: 3367aefdc49b430998241c040b1f4c77a6b67047a630fdfd26004780649f400a
                          • Opcode Fuzzy Hash: 3f58e7fa9ad400dc24d95ef4fcd050962103d863482cf5ca1810015a8c4a0303
                          • Instruction Fuzzy Hash: 1081A311A0CB824AFB676F119500379EAA16F5E7E8F884035DE4D267C6EE7CE44F8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$free
                          • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.70.0%sQUIT$CLIENT libcurl 7.70.0DEFINE %s %sQUIT$CLIENT libcurl 7.70.0MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                          • API String ID: 3578582447-31095704
                          • Opcode ID: f801abd978ecd1412e547588e09c2bc2775defbf52bfc87cce94f67bf4fe725f
                          • Instruction ID: e246cfc410bf161f449e16676e49433d2b3976f8d7b48ff647a5356d4c3fe7aa
                          • Opcode Fuzzy Hash: f801abd978ecd1412e547588e09c2bc2775defbf52bfc87cce94f67bf4fe725f
                          • Instruction Fuzzy Hash: 9A815D21B08E8244FB61AF1195502B9E7E1AF4DBE8FC84431DE5D57796EE2CE50FC221
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: bd80bba0149a04594dff721a1e7c8e4fb3a5c9d356bb0993ff73abd8baa79332
                          • Instruction ID: 72bd2f505cd936729fbcc78b04ec22c68cdde3ff0984e839c501072d5a72223c
                          • Opcode Fuzzy Hash: bd80bba0149a04594dff721a1e7c8e4fb3a5c9d356bb0993ff73abd8baa79332
                          • Instruction Fuzzy Hash: 2291A636A15F81D6E7499F21D9902AC73A8F749F68F440135EF9D47264CF34A2BA8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                          • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                          • API String ID: 3103143820-2414412286
                          • Opcode ID: 2423ba592fad11dd6ce8bcff85e10349de27c45fe07d5c8b5c86b3b9066ac229
                          • Instruction ID: d1efe74c2281cf26115d957b51aa6ad26ad79149f7676eb881c61bec420d89c3
                          • Opcode Fuzzy Hash: 2423ba592fad11dd6ce8bcff85e10349de27c45fe07d5c8b5c86b3b9066ac229
                          • Instruction Fuzzy Hash: 0CD1A621608E8292EA58AF21E4506B9E7B0FF497E8F840032DB5D07659DF3CE55EC711
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                          • API String ID: 1294909896-874090715
                          • Opcode ID: 16a049045801d535978009a31b065c83d94e7eaf32c36e6bf7f3fd082b557e32
                          • Instruction ID: 519e321d4add4b1574663eb85a4940903f9d0645e1c0ebadd3b96cbdc7c49e6b
                          • Opcode Fuzzy Hash: 16a049045801d535978009a31b065c83d94e7eaf32c36e6bf7f3fd082b557e32
                          • Instruction Fuzzy Hash: A2A18C22E08E4285FB50EF51D8405BDA7B4AF587E8F884531DE0E57A95EF38E64E8360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                          • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                          • API String ID: 2243338858-131330169
                          • Opcode ID: 3e79fc39ca36edf3a3601a0182a0fa2abbcb9301044b36530f9349d19e401801
                          • Instruction ID: 80dfb99dd4c16ee2a574f256704245b9c5b4944874cf660ce854c811103dda8e
                          • Opcode Fuzzy Hash: 3e79fc39ca36edf3a3601a0182a0fa2abbcb9301044b36530f9349d19e401801
                          • Instruction Fuzzy Hash: 6A91B121B08E8287EA54AF259844279A3F0FF4ABE8F944031DA5D07798DF3DE45E8721
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$fclose$__acrt_iob_func_unlinkcallocfputsqsort
                          • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                          • API String ID: 1368378007-4087121635
                          • Opcode ID: 7f335d89e45aa7785110ff86ac1c6c45b52a68bd15c63e38a18cd000c1d92f49
                          • Instruction ID: c65bcf7b5c1e0266104f5f14d6b9f9190123bdb654c195e0657d5877bc2ab9b6
                          • Opcode Fuzzy Hash: 7f335d89e45aa7785110ff86ac1c6c45b52a68bd15c63e38a18cd000c1d92f49
                          • Instruction Fuzzy Hash: B7516351B1DE4286EA65BF1198542B9A2B0AF4DFECFC84431DD5E46790EE3CE44F8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Cert$CertificateCertificatesContextEnumFreeStore
                          • String ID: ALPN, server did not agree to a protocol$http/1.1$schannel: ALPN, server accepted to use %.*s$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                          • API String ID: 2572311694-3353508759
                          • Opcode ID: 2095c90b888cff0ce89bc4102fb6157118959c8da0a2b5e28958842bd02a3143
                          • Instruction ID: ebbf3fdfbca27657c862bcadc32cf8a2726910bc80216eaa3f6dfebf6ecb1aa2
                          • Opcode Fuzzy Hash: 2095c90b888cff0ce89bc4102fb6157118959c8da0a2b5e28958842bd02a3143
                          • Instruction Fuzzy Hash: F1B18F61A18E8385EA60AF15D8143B9A3B1EF88BFCF844031DA4E57694DF3CE54EC760
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$strchr$_strdup
                          • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                          • API String ID: 1922034842-2519073162
                          • Opcode ID: 58e342e576d99e2e0d0836eccb8b590fdcfbc66147d025145704a752b4f4fdfd
                          • Instruction ID: 4b2841989f4d8302581ab813d62893191e874db8bca6a121a4719c4f6f6cdd6b
                          • Opcode Fuzzy Hash: 58e342e576d99e2e0d0836eccb8b590fdcfbc66147d025145704a752b4f4fdfd
                          • Instruction Fuzzy Hash: 59916021A18E8385FB61BE1198003B9E7B0AF49BFCF844431DE5D46795EE2DE64EC721
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7197E1DDF), ref: 00007FF7197EEF9D
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0000000100000000,?,00007FF7197E1DDF), ref: 00007FF7197EEFBF
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7197E1DDF), ref: 00007FF7197EEFD0
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7197E1DDF), ref: 00007FF7197EEFFE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupmalloc
                          • String ID: ../$/..$/../$/./
                          • API String ID: 111713529-456519384
                          • Opcode ID: ccac1b9e9287efd9444afb8238d63996b585ec354a197a44d8b8f163bbca949e
                          • Instruction ID: ecc21e3c8fa0f0d252ae7b030f255563d237ba5920751623ab72a11a687d82c6
                          • Opcode Fuzzy Hash: ccac1b9e9287efd9444afb8238d63996b585ec354a197a44d8b8f163bbca949e
                          • Instruction Fuzzy Hash: A171B822E0DE8685FB626F159510279EBB0AF1ABF8F844131CA5D12AD5DE3CE45FC321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupmalloc
                          • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                          • API String ID: 111713529-3006446216
                          • Opcode ID: dcc0e28efd5639a4029cff43ac2cf5110c44896d766acd556051481ea37538c5
                          • Instruction ID: 0f92c5c1976aa41e0ee5e5532142fcd3839d5b372ef6a363f96ca2cbb5542b1f
                          • Opcode Fuzzy Hash: dcc0e28efd5639a4029cff43ac2cf5110c44896d766acd556051481ea37538c5
                          • Instruction Fuzzy Hash: C471A466A0DBC285EB15AF2594102B9BBB0EF497ECF984072CA4D52261DE3DD54FC321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                          • API String ID: 2190258309-1086287758
                          • Opcode ID: 61df0cd0fd5ffcd58d3581005d215a63fb8c56d6a798115e226da23dc31d156c
                          • Instruction ID: 8f7636afaf6c1b800bb6012842f4d019a4bf9d480dea1f00381b2d23b5b37d27
                          • Opcode Fuzzy Hash: 61df0cd0fd5ffcd58d3581005d215a63fb8c56d6a798115e226da23dc31d156c
                          • Instruction Fuzzy Hash: 5BB11F76A08F428AEB50AF65E8442ADB7B4FB48BA8F800035DA4D57B64DF3CD55EC710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                          • API String ID: 1294909896-1220118048
                          • Opcode ID: 12e8450aae44aecd2915e7e3fd89310d281b1443ee42efbc8dd65cb203dc3a3c
                          • Instruction ID: 405988c41792150e758f861d96ed8d23eda9807e0a592deb231ab374cc05976a
                          • Opcode Fuzzy Hash: 12e8450aae44aecd2915e7e3fd89310d281b1443ee42efbc8dd65cb203dc3a3c
                          • Instruction Fuzzy Hash: D2714D65A08F4645EB64BF5195401F9A3B1FF89BE8F884032EE4D17789DE3CD60EC6A0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupmalloctolower
                          • String ID: %%%02x
                          • API String ID: 1244608590-4020994737
                          • Opcode ID: 4304f011963a291b5022b5287124f6b59f2eb77fbcfcaea88a7cf8ac2137bda7
                          • Instruction ID: df818519ab072ab45e26c0fdaac0be3f71a4a9945c5725986da5793a31a13d5b
                          • Opcode Fuzzy Hash: 4304f011963a291b5022b5287124f6b59f2eb77fbcfcaea88a7cf8ac2137bda7
                          • Instruction Fuzzy Hash: 19A1B711A0DA8245FB61AF21A4113B9ABF0AF49BECF884071DA8D562D5DE3DE54F8330
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                          • String ID: -$Set-Cookie:$ignoring failed cookie_init for %s$none
                          • API String ID: 4109794434-3368278292
                          • Opcode ID: 2c913e53c431cad10cc60873120bcae64eaa2d6f776dbdc73628fa919b1aa852
                          • Instruction ID: 3e6af34345b96f357d993729bf7e6c4e96fa226cc33f64e488e5ad8c71297f35
                          • Opcode Fuzzy Hash: 2c913e53c431cad10cc60873120bcae64eaa2d6f776dbdc73628fa919b1aa852
                          • Instruction Fuzzy Hash: 35619F21A0DE8282EA55AF2594042B9A7B4AF5DFE8F8C4034DE8D07795DE3CE44EC720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcmp
                          • String ID: $CAPABILITY$EXAMINE$EXPUNGE$FETCH$LIST$LSUB$NOOP$PREA$SEARCH$SELECT$STORE$UID$Unexpected continuation response
                          • API String ID: 1475443563-555813803
                          • Opcode ID: af6e3256e8de3ca922875de9d61c64c9627a73b0c8b11df895c0859135768475
                          • Instruction ID: 8b5f5233d9169014e057ca82da017ac44154d5f446518b6618f466d75804e644
                          • Opcode Fuzzy Hash: af6e3256e8de3ca922875de9d61c64c9627a73b0c8b11df895c0859135768475
                          • Instruction Fuzzy Hash: A3D15D61E28A4361FB25BE25D5043B8E6B1AF197FCFC84032DA1D46585EE6CE94FC321
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupmalloc
                          • String ID:
                          • API String ID: 111713529-0
                          • Opcode ID: 046c08a381a9ff15b06ac0f62b3d4518ee0341a711aa81c08be52ec43276c146
                          • Instruction ID: 8c8068b1631a3023d7cba18ce14f731fbc41a374521f071e0a9e1e23809d1e73
                          • Opcode Fuzzy Hash: 046c08a381a9ff15b06ac0f62b3d4518ee0341a711aa81c08be52ec43276c146
                          • Instruction Fuzzy Hash: 14615A26A15B42C6E729EF16A844529B3B4FF4CBAAB854035DE4D43760EF3CE49AC710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                          • API String ID: 1294909896-2312071747
                          • Opcode ID: 5143c24113489db69a17f24ed2df36d92f8a309dcef420bbcd250db6b6dbb452
                          • Instruction ID: 16d3d0bec8d28cf8bb881bad182f191aa20f76c2716339cbf67d9b592ff2a27d
                          • Opcode Fuzzy Hash: 5143c24113489db69a17f24ed2df36d92f8a309dcef420bbcd250db6b6dbb452
                          • Instruction Fuzzy Hash: F3D17421A08E8255EA64AF2594403B9E2B1FF497FCFC40235DA6E436C2DF7CE45E8321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$strrchr$__sys_nerrstrerrorstrncpy
                          • String ID: Unknown error %d (%#x)
                          • API String ID: 4262108436-2414550090
                          • Opcode ID: ae376228017f6d9df3f8ad0e570797e3ac83267cd8e81d061c6f7288d7f522bb
                          • Instruction ID: b24a534d25c2f48ea663684b208cdd877feb9223fa988dd34cb67a951fd1b04b
                          • Opcode Fuzzy Hash: ae376228017f6d9df3f8ad0e570797e3ac83267cd8e81d061c6f7288d7f522bb
                          • Instruction Fuzzy Hash: 5F315021B0DE5287EA157F11A814279E671AF88FE8F884035D95E17795FE3CE40F8720
                          APIs
                          • memset.VCRUNTIME140 ref: 00007FF7197DBE3B
                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7197DBF65
                            • Part of subcall function 00007FF7197A8800: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7197B2DF0), ref: 00007FF7197A8827
                            • Part of subcall function 00007FF7197A8800: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7197B2DF0), ref: 00007FF7197A8833
                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7197DBF1F
                            • Part of subcall function 00007FF7197A8760: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7197A8770
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freestrncpy$_strdupmemset
                          • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                          • API String ID: 3826632026-748038847
                          • Opcode ID: defb278e5fb43f9904040db865061a664c89e5a75ffd3507e4d4b7f87a7d24a0
                          • Instruction ID: f2de7b36df9b6b449b4d4043cdccbf908cc4dcd3be2fb722df27db914d71bdb0
                          • Opcode Fuzzy Hash: defb278e5fb43f9904040db865061a664c89e5a75ffd3507e4d4b7f87a7d24a0
                          • Instruction Fuzzy Hash: 9B714D32A08EC294EB21AF14D4417E9A3B0FF887E8F884032DA4D47255EF39D55EC7A1
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: sendto$ErrorLast
                          • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                          • API String ID: 4042023021-4197595102
                          • Opcode ID: e6d3354479b08fe46eb171804f2bc85acfc2093ed9cf5445a9fede18adf3ff93
                          • Instruction ID: 3d937f116f840edefd980c1933ead1d8c64691c230e0ad9106734b189f0ab631
                          • Opcode Fuzzy Hash: e6d3354479b08fe46eb171804f2bc85acfc2093ed9cf5445a9fede18adf3ff93
                          • Instruction Fuzzy Hash: 61B17D76618A82C6E721AF25D4442ADB7B0FF89BDCF844032DE4D4B758DE38E54AC760
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: sendto$_time64
                          • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                          • API String ID: 2327272419-1785996722
                          • Opcode ID: ca74b5d797968b145f31a942eebc3c3538b7aaa53208e05d582363c840217583
                          • Instruction ID: f883651be552195c9e4e886d9a9b5d4dc44d9227a010fab3835350fbf6c654df
                          • Opcode Fuzzy Hash: ca74b5d797968b145f31a942eebc3c3538b7aaa53208e05d582363c840217583
                          • Instruction Fuzzy Hash: EE912A72618A81C6D7129F29D4543A9BBB0FB8CBD8F848132DA4D47758EE39E50AC760
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup$freestrchrstrncmpstrtol
                          • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                          • API String ID: 2070079882-2404041592
                          • Opcode ID: b35e776140a5d9f5433d624f7ea13c1f864f6255c1cd16bf594779d63c7b5ad1
                          • Instruction ID: ba1595661c9d656e907fd5730af5807415c437b84a920b5d153c4dd2e5b13ddf
                          • Opcode Fuzzy Hash: b35e776140a5d9f5433d624f7ea13c1f864f6255c1cd16bf594779d63c7b5ad1
                          • Instruction Fuzzy Hash: 4951D651A0CE9249EB51AF259420379E7F19F59BFCF884032DB5E06681EE2CE64F8321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                          • String ID: Set-Cookie:$none
                          • API String ID: 4109794434-3629594122
                          • Opcode ID: 6c807f11d440087a69fe8ac8c8c949c781a5c189116f017ecbe976bfbf3d813b
                          • Instruction ID: 41e37ad562d90e121faf1d946ee79e5e5ea2b096ac28bf40f2716adfe8047173
                          • Opcode Fuzzy Hash: 6c807f11d440087a69fe8ac8c8c949c781a5c189116f017ecbe976bfbf3d813b
                          • Instruction Fuzzy Hash: BA519621A0DF8292EA55AF21551027AA6B0AF4DFE8F8C4434DE5E06791DF2CE54FC324
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_time64
                          • String ID: mw1 chair
                          • API String ID: 3087401894-2267673244
                          • Opcode ID: 438e2d16cbbf680f8aaa732edc43dd016b5c5608ec2873bf47d827aae19b89fa
                          • Instruction ID: 4402657c8592fb78a8b43e9c20512a749a97ad38a8a05e357837b87ec376b818
                          • Opcode Fuzzy Hash: 438e2d16cbbf680f8aaa732edc43dd016b5c5608ec2873bf47d827aae19b89fa
                          • Instruction Fuzzy Hash: E221C926A09E41C6DB54AF21E844129A3B4FB4CFF8F484431DE4E47764DE38D99EC750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                          • API String ID: 3510742995-1652449680
                          • Opcode ID: 1d0e4f870c9275fc57c7f2d92d8c84fb70c3059963f5b244d831471b159a6669
                          • Instruction ID: aa154133b6330450c5e935696eb75c937251fbe02beedf86913b2a012d58069c
                          • Opcode Fuzzy Hash: 1d0e4f870c9275fc57c7f2d92d8c84fb70c3059963f5b244d831471b159a6669
                          • Instruction Fuzzy Hash: 26A14371A08E8285E750AF2198503F9A371EF59BECF881131DE5E5B285EE3DE54EC321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                          • API String ID: 1294909896-3146291949
                          • Opcode ID: fcce8195664e008045b76721e0f5f56f01232a526dbbf4073a8fb32cf5b5ce04
                          • Instruction ID: 009bf8e7103c2c9f31967364102a37e2beeff795ea5bb84f123962749bfd15f3
                          • Opcode Fuzzy Hash: fcce8195664e008045b76721e0f5f56f01232a526dbbf4073a8fb32cf5b5ce04
                          • Instruction Fuzzy Hash: 78915C21B18E4385FA64AF2195A03B9A6B0AF4DBFCF844435DE4D47681EF2CE54E8360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$D@std@@@std@@U?$char_traits@$?setstate@?$basic_ios@?write@?$basic_ostream@SleepV12@exitmemset
                          • String ID: mw1 chair
                          • API String ID: 469218636-2267673244
                          • Opcode ID: e9d69940daeca3089da93960d06864f2c159207c53fc6d4e26000cc3f19c9224
                          • Instruction ID: ed894f1eaea8a0a7fc5e6a94ba60129eacf9d6d60829314ef79f23064dab3cf9
                          • Opcode Fuzzy Hash: e9d69940daeca3089da93960d06864f2c159207c53fc6d4e26000cc3f19c9224
                          • Instruction Fuzzy Hash: 4EB1A0B2B14E8582EB14EF25E4593BDA371EF49BDCF804035D64D0AAAADF6DD48D8310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$_time64calloctolower
                          • String ID: :%u$Shuffling %i addresses
                          • API String ID: 133842801-338667637
                          • Opcode ID: 5d00e41b3b0ad582ab8dbb05fea8c198c055f6760d7905ee3da7e34754aed76e
                          • Instruction ID: 779b32bdd1e5ca3ab00110d873502d62a2b2c58b0982619f9038966b3005f4d4
                          • Opcode Fuzzy Hash: 5d00e41b3b0ad582ab8dbb05fea8c198c055f6760d7905ee3da7e34754aed76e
                          • Instruction Fuzzy Hash: 21717C72A19E4286EB51AF11E5007A9A2B1FF49BF8F844131DE4E07794EE3CE54EC360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree
                          • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                          • API String ID: 1865132094-1312055526
                          • Opcode ID: 9907b23e1b6f092e0006c1e13a0917ba08d20805789ae0a57308112c53d3db7b
                          • Instruction ID: c9b7bae7e1bb8cce3c0d08bdd0030b77d6c6610596a69890ffa62a55fd80ec8c
                          • Opcode Fuzzy Hash: 9907b23e1b6f092e0006c1e13a0917ba08d20805789ae0a57308112c53d3db7b
                          • Instruction Fuzzy Hash: 1D71B461A08E8384E760AF2494402BDA6B1EF59BECF980431DE4E47795DE3CE58FC361
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 6cefe85152018310b758b62e3db5e15f79b41bcbb26ea0b419b40de666a00e07
                          • Instruction ID: f12230cc6a35c6757aa79a734e8949449bf690e11746f0e52ff56212862c26fe
                          • Opcode Fuzzy Hash: 6cefe85152018310b758b62e3db5e15f79b41bcbb26ea0b419b40de666a00e07
                          • Instruction Fuzzy Hash: 7D51BD35A09E8285EB54AF21D8912FD63B0EF98FE8F884035DE0F4B655CE39955E8360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: AddressProc$HandleLibraryLoadMessageModule
                          • String ID: | Woofer$Detection.$NtRaiseHardError$RtlAdjustPrivilege$ntdll.dll
                          • API String ID: 433497748-3965849657
                          • Opcode ID: fb54dbda07cf8bc06856ed5105a12d84837f352485b1eccd2071a13943dd5e3c
                          • Instruction ID: 02387886f371336ae04d7c33e4d8efd883b9c69a33b04166d306783c6c953fe4
                          • Opcode Fuzzy Hash: fb54dbda07cf8bc06856ed5105a12d84837f352485b1eccd2071a13943dd5e3c
                          • Instruction Fuzzy Hash: CE118F61B18E4282EB40AF20F8545A6B3B0FF88BE8FC51036E95E17624EE7CD15E8710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$calloc$_strdup
                          • String ID: ,$:
                          • API String ID: 2460172880-4193410690
                          • Opcode ID: 45e6e0631cfad8b1a7283d808e92a888af468885c436e9bac817c975c4aea011
                          • Instruction ID: 79d76c543df486fd47fb268b85ae5f3534b02fb3a60877f629119e1f2e8d4633
                          • Opcode Fuzzy Hash: 45e6e0631cfad8b1a7283d808e92a888af468885c436e9bac817c975c4aea011
                          • Instruction Fuzzy Hash: 4C515312E18E8682E711AF35A9112B9A370BF59BECF445234DE8D65652EF3CF1DE8310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup$free$strrchr$_access_stat64
                          • String ID:
                          • API String ID: 2557200964-0
                          • Opcode ID: 7c3cff2b3ef456d16800c9b9f9038c5d8787ff223932a89e2d26e378143c9103
                          • Instruction ID: a60decb6918b5000011082db6b9c5c9d337b433364af5884fa54619e0b422d60
                          • Opcode Fuzzy Hash: 7c3cff2b3ef456d16800c9b9f9038c5d8787ff223932a89e2d26e378143c9103
                          • Instruction Fuzzy Hash: FE413121B09F4289EA54AF12A450279A2B0FF4DFE8F984134DA5D47B90EF3CE55F8350
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemcpy$strchr
                          • String ID:
                          • API String ID: 1615377186-0
                          • Opcode ID: 1b3443cf87eed5acae2277f64f1068bfd47a751939e274cd3a55bae2d505e066
                          • Instruction ID: 1d8565a9f4f9a9f8d7743095f7251454c01f653e57eb7f14cedb9510adc19afa
                          • Opcode Fuzzy Hash: 1b3443cf87eed5acae2277f64f1068bfd47a751939e274cd3a55bae2d505e066
                          • Instruction Fuzzy Hash: C251A226B09F8585EA65AF15A504279E2B1BF5CFE8F884430DE4E47754DF3CE51E8320
                          APIs
                          Strings
                          • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF7197B6DC9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup
                          • String ID: Couldn't find host %s in the .netrc file; using defaults
                          • API String ID: 2653869212-3983049644
                          • Opcode ID: c5967fc71555211af66f93549368ac0787aff9712fcd8b1ec61bcbc1da8be470
                          • Instruction ID: a8186d70a1ae3287f5fbe228ed32ea091e72fae0dd4733f467f703fcc1e9119e
                          • Opcode Fuzzy Hash: c5967fc71555211af66f93549368ac0787aff9712fcd8b1ec61bcbc1da8be470
                          • Instruction Fuzzy Hash: BF716025A08F8286EB65AF25D454369A7B0FF98BB8F440031DB5E47290DF3DE65EC720
                          APIs
                          Strings
                          • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF7197B6DC9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup
                          • String ID: Couldn't find host %s in the .netrc file; using defaults
                          • API String ID: 2653869212-3983049644
                          • Opcode ID: d490d36abb045a0d646bf9579259c763c452da942bdf1d247ca7e4215ccab2cf
                          • Instruction ID: a9c6d264038dc1be9704e5b0a74aec1fc969923553d6e50bdecd9f72a5c2017a
                          • Opcode Fuzzy Hash: d490d36abb045a0d646bf9579259c763c452da942bdf1d247ca7e4215ccab2cf
                          • Instruction Fuzzy Hash: 16519062A09F8286EB55AF21D854369A7B0FF58BA8F850031DB4E47390DF3DE55EC720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$FormatMessagestrchr
                          • String ID: Unknown error %u (0x%08X)
                          • API String ID: 1897771742-1058733786
                          • Opcode ID: 828dffa4292e285c7d5c59183524564e138454dc45eadcbfa36f0b9c43bcb2a7
                          • Instruction ID: 1405021499c15ce6cba12cc8e2b5667e14e1917585b13428ac9d510b0fbdcb71
                          • Opcode Fuzzy Hash: 828dffa4292e285c7d5c59183524564e138454dc45eadcbfa36f0b9c43bcb2a7
                          • Instruction Fuzzy Hash: 86215532A0CF9186E7216F21A80422AFAB1BF5CFE8F894434DE5A13755DE3CD54E8720
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197F027A
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197F02C8
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197F032B
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197F0469
                            • Part of subcall function 00007FF7197E4210: strchr.VCRUNTIME140(00000000,?,?,00007FF7197E37CF), ref: 00007FF7197E4256
                            • Part of subcall function 00007FF7197E4210: strchr.VCRUNTIME140(00000000,?,?,00007FF7197E37CF), ref: 00007FF7197E4266
                            • Part of subcall function 00007FF7197E4210: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,00007FF7197E37CF), ref: 00007FF7197E4290
                            • Part of subcall function 00007FF7197E4210: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197E42C5
                            • Part of subcall function 00007FF7197E4210: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7197E42EA
                            • Part of subcall function 00007FF7197E4210: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7197E430C
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7197F04F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup$callocmallocstrchr$freestrncpy
                          • String ID: GSSAPI$GSSAPI handshake failure (empty challenge message)$Kerberos
                          • API String ID: 370574955-353107822
                          • Opcode ID: cb9a99615fade19466be043fa1b3104e54943aae220dedc29c1bf24f12d4554c
                          • Instruction ID: d1352c8825b5cad2164d6e8192ba3fdfa94e9e47c4bf2bbeeb57361260f6a171
                          • Opcode Fuzzy Hash: cb9a99615fade19466be043fa1b3104e54943aae220dedc29c1bf24f12d4554c
                          • Instruction Fuzzy Hash: 8BA11832B08F418AEB519F65E44066DB3B5FB48BA8F800036DE5D67B58EF38E45AC750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup
                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                          • API String ID: 1169197092-2292467869
                          • Opcode ID: 7f2fdd6674d5bb714ed88ad96ccbfa3a30a8a17a8f74412af12df730ef2673ce
                          • Instruction ID: 42eb4e693e61d5fe1513367165ea996ced623b9bb28781bc5ac22220b049c708
                          • Opcode Fuzzy Hash: 7f2fdd6674d5bb714ed88ad96ccbfa3a30a8a17a8f74412af12df730ef2673ce
                          • Instruction Fuzzy Hash: B4916161E08B8295EF71AF15D540379A7B4EF5DBE8F8C0035DA8E46791EE2CE44E8360
                          APIs
                            • Part of subcall function 00007FF71978BF80: memcpy.VCRUNTIME140(?,?,?,00007FF71978165A), ref: 00007FF71978C073
                            • Part of subcall function 00007FF71978BF80: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF71978165A), ref: 00007FF71978C052
                            • Part of subcall function 00007FF71978BF80: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71978C08F
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF7197816F3), ref: 00007FF719783257
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF7197816F3), ref: 00007FF71978325E
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF7197816F3), ref: 00007FF719783265
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF7197816F3), ref: 00007FF71978326C
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF7197816F3), ref: 00007FF719783273
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy
                          • String ID: 1.0$Y0rrtC1OKt$mw1 chair
                          • API String ID: 2318677668-3633289234
                          • Opcode ID: 705248eb33d8f3939465d25023a88a91d75f94263a864732848d90439f3a2b19
                          • Instruction ID: a8213f7641a6470651668530ab223d24b6fe7d49d0de7dd248e535d1abba2369
                          • Opcode Fuzzy Hash: 705248eb33d8f3939465d25023a88a91d75f94263a864732848d90439f3a2b19
                          • Instruction Fuzzy Hash: 4D716962A08E8685EB00EF25E849378B371FF19BE8F814031CA5C07666DF3DE49E8354
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                          • String ID: mw1 chair$value
                          • API String ID: 1346393832-2545578270
                          • Opcode ID: 57e3dbda99839a8dc92583b0fcac46b78f087c55e55c3b4e767ec8f40a75702c
                          • Instruction ID: 6077d87c681a21f6e2491f5c45aae747dd6f38b63370b9ff20da716d8805b9d5
                          • Opcode Fuzzy Hash: 57e3dbda99839a8dc92583b0fcac46b78f087c55e55c3b4e767ec8f40a75702c
                          • Instruction Fuzzy Hash: 75618362A18E9185EB00DF79E4453ADA371FF497F8F904721EA6C12AD9DF6CD08A8314
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$strchrstrtol
                          • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                          • API String ID: 137861075-1224060940
                          • Opcode ID: 6c949b7d4b1aa729aeef2ffb47019a417abc63240e34f692c98d61cdc8fc0b42
                          • Instruction ID: 44f813657221e681f6abb27c3ecd92d502254fcc066ea2d1cb9397e89ad54a8f
                          • Opcode Fuzzy Hash: 6c949b7d4b1aa729aeef2ffb47019a417abc63240e34f692c98d61cdc8fc0b42
                          • Instruction Fuzzy Hash: 1E517421A09E8644EB21AF15A8502E9E7B0BF59BECF984135ED5E07B94DE3CD64EC310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errno$strtoull
                          • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                          • API String ID: 642117244-808606891
                          • Opcode ID: 8902456e66217ee55b860f8d8cb4530046c5afb76a7645c78c19ab9c290671e8
                          • Instruction ID: 076a957cd2f026c9c838caa6e83c80cbb1cef61939d3b5254c4aae8644ac2e88
                          • Opcode Fuzzy Hash: 8902456e66217ee55b860f8d8cb4530046c5afb76a7645c78c19ab9c290671e8
                          • Instruction Fuzzy Hash: 26611D32A09E0186EB51AF25D444238A3B1FF4AFACF944531C65E42298DF3CE85EC761
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup$callocfreestrrchr
                          • String ID: Wildcard - Parsing started
                          • API String ID: 2641349667-2274641867
                          • Opcode ID: 0e526262335314e114e3f39f03f5603044f14b716cc47db1ef4ee5b0bd1b9aa3
                          • Instruction ID: 42cbc1c0ab9401ffb65124ce6277ae2dca563a1f0d017596cc38b4bfdac74ffa
                          • Opcode Fuzzy Hash: 0e526262335314e114e3f39f03f5603044f14b716cc47db1ef4ee5b0bd1b9aa3
                          • Instruction Fuzzy Hash: A8514B36A08F42C5EB51EF15A4401B8A7F5EF88BA8F854435DA5E4B350EF38E55EC321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                          • API String ID: 2653869212-3672398475
                          • Opcode ID: 9d8f891f3f41c8b3d74b0a738b1040c2e8b4441d78403fd54293a66e47e57d10
                          • Instruction ID: 3b7cd7356f3904fa01864e9e034fa58c4bd2cf4a24b116fb834e7efe37f2a556
                          • Opcode Fuzzy Hash: 9d8f891f3f41c8b3d74b0a738b1040c2e8b4441d78403fd54293a66e47e57d10
                          • Instruction Fuzzy Hash: 61418D65B08B8284EB11BF2594142F9A7B1BF49BECF880431DE0E27755DE3CE54E8321
                          APIs
                          • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1C1C
                          • ?pbase@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1C2A
                          • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1C36
                          • ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1C5A
                          • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1C6B
                          • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1C79
                          • ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1C85
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?pptr@?$basic_streambuf@$?eback@?$basic_streambuf@?egptr@?$basic_streambuf@?epptr@?$basic_streambuf@?gptr@?$basic_streambuf@?pbase@?$basic_streambuf@
                          • String ID: mw1 chair
                          • API String ID: 2869409680-2267673244
                          • Opcode ID: 33b730ec946e25ee1ae6e1b27b3f443e6e38ab79d18b85c3af218aa3595ea471
                          • Instruction ID: 86ef66b49f72091adaf01389b884a2305fab7a4ee6757cc98fe648c30ed10c44
                          • Opcode Fuzzy Hash: 33b730ec946e25ee1ae6e1b27b3f443e6e38ab79d18b85c3af218aa3595ea471
                          • Instruction Fuzzy Hash: 84218162A08F8282E715AF21B844279A7B0BF88FD8F585131DD5E17754EF3CD48E8310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: mallocmemcpy
                          • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                          • API String ID: 4276657696-1832275178
                          • Opcode ID: 42f83696d0159135b283b10c28c722ee0fb1c877429ee7a9aece8cec63422160
                          • Instruction ID: 474278780db0822482ffdf27345f920d1f7966c574f1b5465d3eec209a32d53d
                          • Opcode Fuzzy Hash: 42f83696d0159135b283b10c28c722ee0fb1c877429ee7a9aece8cec63422160
                          • Instruction Fuzzy Hash: 98A14D65A0DF8684EA65AF11A5403A9A3B4FF48BE8F844135DA5D23758EF3CE45EC320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$freemalloc
                          • String ID: 8$Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed
                          • API String ID: 3313557100-1003742340
                          • Opcode ID: 6ae7493d0d287ab86c28a57523b331cd9134d1f8e52e52b0a441fe4f4243fe1b
                          • Instruction ID: 91d16ebcc41c0007653673b18c27dde7f0b2f41c2c0d83bf97ee601b696ff744
                          • Opcode Fuzzy Hash: 6ae7493d0d287ab86c28a57523b331cd9134d1f8e52e52b0a441fe4f4243fe1b
                          • Instruction Fuzzy Hash: 5581B026A08F8186DA54AF26D4403AAA7B0FF587D8F885432DF4E57741DF3CE5AE8350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemcpy
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                          • API String ID: 3401966785-517259162
                          • Opcode ID: 823f5664b5a20b934c369fde119dcb886468fcd45bb0881e8f87818417b82615
                          • Instruction ID: 2e3bf1939ce05cd8b3247d1d9948cd63b1c4d89a610ed4c2647ee0d61b7406cd
                          • Opcode Fuzzy Hash: 823f5664b5a20b934c369fde119dcb886468fcd45bb0881e8f87818417b82615
                          • Instruction Fuzzy Hash: 6A610951B09E8245EB18BF2584142F997B1BF5DBECF880535D90E2B795DE3CA44F8321
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7197C6768), ref: 00007FF7197E2F80
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7197C6768), ref: 00007FF7197E2FB7
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7197C6768), ref: 00007FF7197E2FDE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                          • API String ID: 1294909896-3948863929
                          • Opcode ID: e1cf8f286b731ce99fe9b24acb44f2b98678ab5b919b1287ce6d2f2dbce21d3d
                          • Instruction ID: 9399cbb9262d1b20711b11a9b5bea9f75d06b1a66362aef7445ed48cadfb7dcd
                          • Opcode Fuzzy Hash: e1cf8f286b731ce99fe9b24acb44f2b98678ab5b919b1287ce6d2f2dbce21d3d
                          • Instruction Fuzzy Hash: 30618C32A09F8185E760AF05E8483AAB3B5FB48BE8F804036DA8D57754DF3CD54AC710
                          APIs
                          • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF71979EBD7
                          • ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF71979EBE3
                          • ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ.MSVCP140 ref: 00007FF71979EBF9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?epptr@?$basic_streambuf@?pptr@?$basic_streambuf@Pninc@?$basic_streambuf@
                          • String ID:
                          • API String ID: 4060314879-0
                          • Opcode ID: 4afa7f34cd9e26f79f4dbc3299f72e9d4baef5c441eb6fb6f37cd78b21d0f8d7
                          • Instruction ID: b4f8c5d98d635944fbe9da51d1b6c81cf54a11312d51236ba4f14db0cfdf5503
                          • Opcode Fuzzy Hash: 4afa7f34cd9e26f79f4dbc3299f72e9d4baef5c441eb6fb6f37cd78b21d0f8d7
                          • Instruction Fuzzy Hash: DB418522B08E5182EA12AF66A5441B996A1FF49FF8F840531DF5D177D1EE3CE49F8310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                          • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                          • API String ID: 1392894463-1168109407
                          • Opcode ID: 32cb8aa95daa1064cf183b66ff02640f4bcef308a2ac88c228e8176922a25966
                          • Instruction ID: 25c465fe5c8122777f43d062cdb37b127618074e3c936f3d4bfb1a24d8e226e2
                          • Opcode Fuzzy Hash: 32cb8aa95daa1064cf183b66ff02640f4bcef308a2ac88c228e8176922a25966
                          • Instruction Fuzzy Hash: F741A771A09E8285FA50AF2594402B9E7F1AF49BE8FC84531DA5D572C5EF2CE50EC330
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupmalloc
                          • String ID: %s?%s$Failed sending Gopher request
                          • API String ID: 111713529-132698833
                          • Opcode ID: b5e8de33f13dda6d60085bd712c1e23513799ab72515e7ff86022098712bd6ed
                          • Instruction ID: ab94a0f5ca80cf90a9341952b49ec01bd4fb21e497d86073c782be4ede97e17f
                          • Opcode Fuzzy Hash: b5e8de33f13dda6d60085bd712c1e23513799ab72515e7ff86022098712bd6ed
                          • Instruction Fuzzy Hash: 09519621B0DE4286E651AF25A8141AAE3B0AF8DBF8F840231DE6E577D5DE3CD54F8710
                          APIs
                          • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7197D8CA6
                          • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7197D8CFB
                          • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7197D8D6C
                          • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7197D8D79
                          • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7197D8E8B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _close$_fstat64_openstrchr
                          • String ID: Can't get the size of %s$Can't open %s for writing
                          • API String ID: 423814720-3544860555
                          • Opcode ID: f5dd3d097861bcb5e91f21d1f6e260dd3d46c1d75a931296157783224ca03b39
                          • Instruction ID: 3c9977ff8e30392a264a2b54cfd2142fe251815399ce44f9421c9f3a8ef9b990
                          • Opcode Fuzzy Hash: f5dd3d097861bcb5e91f21d1f6e260dd3d46c1d75a931296157783224ca03b39
                          • Instruction Fuzzy Hash: 28516361708E4282EA14AF2594402F9A3F1BF9CBE8F844435DA5E57395EF3CE40F8711
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdupstrtol
                          • String ID: %%%02x
                          • API String ID: 2999891020-4020994737
                          • Opcode ID: cf76301357e9a89500bd231cfbad3bd141f6d0a8f25058811b9f58142cc1c263
                          • Instruction ID: 9ba89d3bc7a0de0f8ce95527447453c3fd3c5b3c9a839712263eb06f65fc19f7
                          • Opcode Fuzzy Hash: cf76301357e9a89500bd231cfbad3bd141f6d0a8f25058811b9f58142cc1c263
                          • Instruction Fuzzy Hash: E551B711E0DAC145FB62AF1174153B9AAA1AF4ABE8F880171DA9E167C1DE3DE54FC320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1496848336-4020994737
                          • Opcode ID: 3c1b8dcdea6f64c2fc1cbae04e36418582f402feb9f9cffc67aa4e9888169843
                          • Instruction ID: 15e9b83b60ec14c7684455b60d579bdc57c8d88b775893643608464ae4059481
                          • Opcode Fuzzy Hash: 3c1b8dcdea6f64c2fc1cbae04e36418582f402feb9f9cffc67aa4e9888169843
                          • Instruction Fuzzy Hash: F641C711E0DAC245FB62AF1174153B9ABA1AF497F8F880171DA8E167C1DE3DE54F8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdupmalloc
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                          • API String ID: 111713529-517259162
                          • Opcode ID: dff4bc487c394e45db7e62952345c91d0b2d70ceded360e19f8a1a6053f1f4d7
                          • Instruction ID: 735bbdca6d0ed71fbf46c4726b0d52cc5600142cca1a431fded34a6ff0cf3fcb
                          • Opcode Fuzzy Hash: dff4bc487c394e45db7e62952345c91d0b2d70ceded360e19f8a1a6053f1f4d7
                          • Instruction Fuzzy Hash: 18319E55B09F8248EB04BF6594101F9A7B1AF4D7ECF880435DE0E2B756EE3CA54E8321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                          • API String ID: 1294909896-599393795
                          • Opcode ID: 7b6e06541063b9514d198dceaa034673a329d857379d0c9e23e07ff4b8319424
                          • Instruction ID: d9ba1a6f78a081fce9ecf13be4c4ec8de1f11584f5292ced3d94a7a3502199c9
                          • Opcode Fuzzy Hash: 7b6e06541063b9514d198dceaa034673a329d857379d0c9e23e07ff4b8319424
                          • Instruction Fuzzy Hash: B561D061B09E8244EB50AF2495041F9EBB1BF0A7E8FC84436DA4D27B94DE3CE54EC321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$memcpy
                          • String ID: Signature: %s$Signature
                          • API String ID: 901724546-1663925961
                          • Opcode ID: caed441ec9b239e4de89a2cf525abb4a4089d8269db949938733dfa7816769dd
                          • Instruction ID: 0aee728daa171aef8d8610e5b2109b64bf62aaff1ccef3e0cd9c430c7315f498
                          • Opcode Fuzzy Hash: caed441ec9b239e4de89a2cf525abb4a4089d8269db949938733dfa7816769dd
                          • Instruction Fuzzy Hash: 47511422B09E8245EF18AE1590143B9A7B1EF49BF8F840135DA5F17B95EE3CE54F8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$freemalloc
                          • String ID: mw1 chair
                          • API String ID: 3313557100-2267673244
                          • Opcode ID: 0e444acdc1fddeb2ef98b7c78bb87d813779746983a4e7921a9e8eadfa9a1b59
                          • Instruction ID: 7a8017d91213c855d9e886165fee4cce2f6edb6432d2c2de0d1ebb7b8880d57e
                          • Opcode Fuzzy Hash: 0e444acdc1fddeb2ef98b7c78bb87d813779746983a4e7921a9e8eadfa9a1b59
                          • Instruction Fuzzy Hash: 4B612112D18FC586E7119F38D9012F9A330FBA978CF45A325EF8D16956EF68E2D98310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: 8d1d66176d33fe0a594d304f33f0b007853e0ea28bfef0c6bd4080b92891ba15
                          • Instruction ID: 8022de7e57feb0292ffefd022214fd0e28f4266a80cee730d1b3b252648f11da
                          • Opcode Fuzzy Hash: 8d1d66176d33fe0a594d304f33f0b007853e0ea28bfef0c6bd4080b92891ba15
                          • Instruction Fuzzy Hash: 7041CE72B09E4680EE10BF16E4452A9E361BF09BE8F944631DE6D0B785DF3CE54E8310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup
                          • String ID:
                          • API String ID: 1169197092-0
                          • Opcode ID: ed7beec92574d523255fe90d19800622871b48be5f6ac39d8234697a343c6577
                          • Instruction ID: 2ff6ff146951a8ef21c603735498d0d56971adb6ec90e30cdcfd44b67add5158
                          • Opcode Fuzzy Hash: ed7beec92574d523255fe90d19800622871b48be5f6ac39d8234697a343c6577
                          • Instruction Fuzzy Hash: 9E515D2261BF8086EB95DF56B040128B7B4FF58B98B481135EF5E03B59EF28D5EAC710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                          • API String ID: 1294909896-3876350232
                          • Opcode ID: 17f28427e4357b20144aa88d0823b1f09a84473b80f235364f0d61e3d4f345f4
                          • Instruction ID: 6f4076e16c4fe984b1bdc47d2a85827ed2e7bc86a3e87be4710da5f193f8e06e
                          • Opcode Fuzzy Hash: 17f28427e4357b20144aa88d0823b1f09a84473b80f235364f0d61e3d4f345f4
                          • Instruction Fuzzy Hash: A5519D65A09F8284EB14AF6494501F9A7B1BF49BECFC80431DA4D2B695DF3CE94EC321
                          APIs
                          • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF71979552D
                          • ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF71979553B
                          • ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF719795543
                          • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF71979554F
                          • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF71979555B
                          • ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z.MSVCP140 ref: 00007FF719795598
                          • ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD0@Z.MSVCP140 ref: 00007FF7197955A6
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7197955CC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?eback@?$basic_streambuf@$?egptr@?$basic_streambuf@?epptr@?$basic_streambuf@?pptr@?$basic_streambuf@?setg@?$basic_streambuf@?setp@?$basic_streambuf@D00@_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 3548242540-0
                          • Opcode ID: b1965f67e021290d9fede6b30619341af37f4965bcddc91e04bb2a45d3e4482b
                          • Instruction ID: 5bc330cc942420b2006f34ce33b05d0514ebbfe1cb3c6c1165297ce5f0cba785
                          • Opcode Fuzzy Hash: b1965f67e021290d9fede6b30619341af37f4965bcddc91e04bb2a45d3e4482b
                          • Instruction Fuzzy Hash: 41110321B19E5243EA14AF75A819338A271AF4DFF9F940130DA6E576E5EE3C944E8210
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 454ed39f5efddf81be590f5c1386d5301f818907a2144b19a4f1cf09594b13cf
                          • Instruction ID: 31bb34726fcb722fcf520ab04bceacd95f1c5689cf8430a99e66669450e547ce
                          • Opcode Fuzzy Hash: 454ed39f5efddf81be590f5c1386d5301f818907a2144b19a4f1cf09594b13cf
                          • Instruction Fuzzy Hash: E541FA26A18F43C6E761AF21944023DB7B4FF88BB8F844535DA4E53254CF38E99A8790
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 1caf463e8bc9de7a94c6b13313498cda7f6ce1ab5cdc8f20cee183f3b868abfd
                          • Instruction ID: c3e699a1116c5e1dd4d729d426043e0f16eee479be3bcfcebbf7ff2867490d7b
                          • Opcode Fuzzy Hash: 1caf463e8bc9de7a94c6b13313498cda7f6ce1ab5cdc8f20cee183f3b868abfd
                          • Instruction Fuzzy Hash: 7231D836A09E51C6E750AF12E944129A7B4FB88FE8F484031EE8D57B68CE3CD95B8750
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 47fc8a442dac342fb9b9df9c75e5d83f46145fb8fc92d1972bcfc51caf904a5a
                          • Instruction ID: 4f3a52ce6c47e4d0333e3beb003cb15fbd38540154dfcebd947ffc51cbe95962
                          • Opcode Fuzzy Hash: 47fc8a442dac342fb9b9df9c75e5d83f46145fb8fc92d1972bcfc51caf904a5a
                          • Instruction Fuzzy Hash: E301792AB16E01C6DB44AF21ED54038A370EF8CFB9B441131DD4E83638CE2CD9AE8750
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemcpymemset
                          • String ID:
                          • API String ID: 1579693990-0
                          • Opcode ID: f762be633d9edb19ede4387fd90d51d802a5b45f3efeb1374245cd70dad51d13
                          • Instruction ID: 424161b4ae224dd5bb32d742d8f09105eebed76f9570ed530904920b56ba41cf
                          • Opcode Fuzzy Hash: f762be633d9edb19ede4387fd90d51d802a5b45f3efeb1374245cd70dad51d13
                          • Instruction Fuzzy Hash: EC916D61B08F4246FE55BE26945437AA2A0AF49FE8F884435DE0D57786EF3CE41E8320
                          APIs
                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7197A7428), ref: 00007FF7197A7575
                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7197A7428), ref: 00007FF7197A758F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strncmp
                          • String ID: I32$I64$Internal error removing splay node = %d
                          • API String ID: 1114863663-13178787
                          • Opcode ID: 6adc963f91e20aa5404a4c28effe38bb647081ba7ab4554990913ed659e77b29
                          • Instruction ID: f5f8647afedf1a57493fd98cf2949a5771149da6f26797effacf8f36ddb4a126
                          • Opcode Fuzzy Hash: 6adc963f91e20aa5404a4c28effe38bb647081ba7ab4554990913ed659e77b29
                          • Instruction Fuzzy Hash: 03A19332A18A4286E7219F14E45477DBBB4FB48BACF994135CA9E43255EF3CD20EC750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemallocmemcpy
                          • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                          • API String ID: 3056473165-3891197721
                          • Opcode ID: 656c5d837c1eef6f34eb7720f2b71371ee1db04f3e1e24156d0834031034f61b
                          • Instruction ID: 228985f02fd87ea8ec20ca8cee205485084a6745cec8694d08aa878e5eaffe73
                          • Opcode Fuzzy Hash: 656c5d837c1eef6f34eb7720f2b71371ee1db04f3e1e24156d0834031034f61b
                          • Instruction Fuzzy Hash: A7715972B08A028AEB10DF65D8506ADB3B1AF48BBCF414635DE2D577D4EE38E41E8750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fwrite
                          • String ID: ...$...
                          • API String ID: 3559309478-2253869979
                          • Opcode ID: 3bb81341e0279ee0c41448f81f104d314a0583d887367d5672ca3e258ad2d616
                          • Instruction ID: 07b5435b6f9849922a97b756f5dbc595a2249d41bc9699aeb8fbf9a324ae0f53
                          • Opcode Fuzzy Hash: 3bb81341e0279ee0c41448f81f104d314a0583d887367d5672ca3e258ad2d616
                          • Instruction Fuzzy Hash: 1571EE21A08E8185EB64EF21E4443FAA7B0FF98BA8F844131CA5E03694DF3DE15EC751
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$_errno
                          • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                          • API String ID: 2644425738-1191287149
                          • Opcode ID: 8103fd99ddb7e7022e7827c1e972a18de02d3e24e0de315afe8d9d6d5e56ee90
                          • Instruction ID: 8513bd2d539b8b5fda531fc0790902688bfbcbc40544822359448431f4d061a5
                          • Opcode Fuzzy Hash: 8103fd99ddb7e7022e7827c1e972a18de02d3e24e0de315afe8d9d6d5e56ee90
                          • Instruction Fuzzy Hash: D451B522A2DA8781EAA1AF15944017AF2B0AF59BFCFE44031DA4E06755EE2CD54EC321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup
                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                          • API String ID: 1169197092-2292467869
                          • Opcode ID: f49be47f8c855f9c3cc320cb3889ef4a957f8451a0e5b7f6017c46c94148460a
                          • Instruction ID: ea2a2def57dd58100ca813d35767c2db044edfc0a61bf50fb3fa2e5daa550043
                          • Opcode Fuzzy Hash: f49be47f8c855f9c3cc320cb3889ef4a957f8451a0e5b7f6017c46c94148460a
                          • Instruction Fuzzy Hash: E9615F61E08B8295FE71AF15D544379A7B4AF5CBE8F8C0036DA8D06791EF2CE44E8360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdup$strchr
                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                          • API String ID: 3404610657-2292467869
                          • Opcode ID: 72c50b774de2dc0f3f0eac4ed1242e8a7b9fa46f8c411cca09fdf5befa4e93d8
                          • Instruction ID: db45431353e0e0a344063c4eae24637d3dae07d90526404a84c94b2928c8071e
                          • Opcode Fuzzy Hash: 72c50b774de2dc0f3f0eac4ed1242e8a7b9fa46f8c411cca09fdf5befa4e93d8
                          • Instruction Fuzzy Hash: 9D613161E08B8295FF71AF15D544379A7B1AF58BE8F8C0035DA8D46791EF2CE44E8360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strstr
                          • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                          • API String ID: 1392478783-2096918210
                          • Opcode ID: 2f3984c8c42fe732cbca505ce1584099c41b274169359338c8557a425a3ad347
                          • Instruction ID: 3169d2633459fd08f90ac1530b001f56db1fbf3637131773a95d8ac0601af542
                          • Opcode Fuzzy Hash: 2f3984c8c42fe732cbca505ce1584099c41b274169359338c8557a425a3ad347
                          • Instruction Fuzzy Hash: A051C962A08F4186EA15AF14A4442B9F3E2AF597F8FC40231DA6D066D9EF7CD48F8710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                          • API String ID: 2190258309-3231818857
                          • Opcode ID: 463483374b140b9bf31e942be9f58a7d4740fb46218aba4546bc90d234dccca8
                          • Instruction ID: 6a9e46d5fd2c475f3febffcbb87ca2d1e32abb2dfc128fe0c18b0b5f94edb13f
                          • Opcode Fuzzy Hash: 463483374b140b9bf31e942be9f58a7d4740fb46218aba4546bc90d234dccca8
                          • Instruction Fuzzy Hash: 13518E72A0CA9285EB65EF25A4041B9F7B4FF49BE8F840032DA4D53755DE3CD54E8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLastfreememcpy
                          • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout!
                          • API String ID: 1248052217-2335292235
                          • Opcode ID: aed357a4e0f2b390cfa0538acc3c615b70f8ee389ee6a976163f2c24e555d357
                          • Instruction ID: 616c2c12bd183b055042b26cf87e84dd2cc5efe4584d4e093c47f7c5cf12cef2
                          • Opcode Fuzzy Hash: aed357a4e0f2b390cfa0538acc3c615b70f8ee389ee6a976163f2c24e555d357
                          • Instruction Fuzzy Hash: 54518E61A0CE8286FB64AE2595047F993A0AF497ECF844135DE5D872C9EF6CE44F8321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memchrmemcpyrecvfrom
                          • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                          • API String ID: 3107918033-477593554
                          • Opcode ID: a07882fc687146c6963024e51c5158e2cb6f8d6dea283c15ddc842985feaf8f1
                          • Instruction ID: 35346540eecef8db20842235e9d29571f76678299d5c2d1231e292d76daf6d6c
                          • Opcode Fuzzy Hash: a07882fc687146c6963024e51c5158e2cb6f8d6dea283c15ddc842985feaf8f1
                          • Instruction Fuzzy Hash: 0E51B171A08D8286EB65AF2598503B9A3F0EF49BD8F844132DA5D87785DE3CF50EC720
                          APIs
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978AB3B), ref: 00007FF71978CAC3
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978AB3B), ref: 00007FF71978CB16
                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978AB3B), ref: 00007FF71978CB3F
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978AB3B), ref: 00007FF71978CB66
                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978AB3B), ref: 00007FF71978CBAC
                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978AB3B), ref: 00007FF71978CBB3
                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978AB3B), ref: 00007FF71978CBC0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                          • String ID:
                          • API String ID: 1492985063-0
                          • Opcode ID: 73db44d97561db55e9e0a6d62b43c2a04491922c8efdaa8529ca0d72eaa14bfe
                          • Instruction ID: fbef663d099daa2c2e4dea8304d6e2f12e99b43a491163c800bfb947a0e45d49
                          • Opcode Fuzzy Hash: 73db44d97561db55e9e0a6d62b43c2a04491922c8efdaa8529ca0d72eaa14bfe
                          • Instruction Fuzzy Hash: 9C510122A08E4182EB219F19E595238EB70EF89FE9F59C531CA5E437A0DF39D44F8210
                          APIs
                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978ADB8), ref: 00007FF71978CC67
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978ADB8), ref: 00007FF71978CCD4
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978ADB8), ref: 00007FF71978CCFD
                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978ADB8), ref: 00007FF71978CD2F
                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978ADB8), ref: 00007FF71978CD73
                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978ADB8), ref: 00007FF71978CD7A
                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,?,0000006E00000006,00000000,00007FF71978ADB8), ref: 00007FF71978CD87
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                          • String ID:
                          • API String ID: 2331969452-0
                          • Opcode ID: 7ae8c2e24003126f51691325907733536fe10436c955a7932dce4058eeb9a11c
                          • Instruction ID: bf51ef766b81d8e5e51c73b7f74ef4786a761e658a788f3e24d48b3edde89a36
                          • Opcode Fuzzy Hash: 7ae8c2e24003126f51691325907733536fe10436c955a7932dce4058eeb9a11c
                          • Instruction Fuzzy Hash: 4B515032A08E4182EB209F19E594239E7B0FF88FE9B558531CE5E577A0CF39D44E8750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                          • API String ID: 1294909896-1255959952
                          • Opcode ID: 7911d47d4fdfaeb91046c2be4e5d1cc1f970ec50b8a095c02327713cb0115608
                          • Instruction ID: 8d08c43c99428ca7fe3cf41e83572395e439a176816c499f62e2015cc45e0883
                          • Opcode Fuzzy Hash: 7911d47d4fdfaeb91046c2be4e5d1cc1f970ec50b8a095c02327713cb0115608
                          • Instruction Fuzzy Hash: CA519362A08B4299FB51EF25D4802B9A7A1FF44BE8F844031DA4D57691EF3CE45FC360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: 92fb8d35e4be1840c2c10ae80b40b3318d35c6c8dd5972a6a2b472024f17441b
                          • Instruction ID: a6fc76d3c6687d05372a470a81af791345e501194f74d6f568e7149cec8505c2
                          • Opcode Fuzzy Hash: 92fb8d35e4be1840c2c10ae80b40b3318d35c6c8dd5972a6a2b472024f17441b
                          • Instruction Fuzzy Hash: 7541C511A0DAD145EB62AF1174113B9AAA1BF4A7ECF880171DA8E167C1DE3DA54F8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: 5e8b89378db1afc15765f4e33dfc0ec6000b8feb96ee99a63a86642d1fc8989a
                          • Instruction ID: 5d73e7b4a65451f21ba708b6bf0cb4c5d65880197ed0fec5b8c841d4b1497c48
                          • Opcode Fuzzy Hash: 5e8b89378db1afc15765f4e33dfc0ec6000b8feb96ee99a63a86642d1fc8989a
                          • Instruction Fuzzy Hash: 4F41D501E0DAC244FB62AF1174153B9AAA1AF4A7F8F880171DA8E167C1DE3DA44F8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: d37de19f4e04ce048ac25d9317c3adc66ffd4d11e38d0e5d50f045b05afea38b
                          • Instruction ID: fd55a3a8fc13552a46e8a32f6f2737867529dca7f7b6d5cdd52352036f718307
                          • Opcode Fuzzy Hash: d37de19f4e04ce048ac25d9317c3adc66ffd4d11e38d0e5d50f045b05afea38b
                          • Instruction Fuzzy Hash: 8B41D601E0DAD245FB62AF1174153B9AAA16F0A7F8F880171DA9E167C1DE3DA54F8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: 9aea7ed47725927f7b795c864a4851fd38c6499a9223f255fb4fe82095f330ff
                          • Instruction ID: 62763ce5b9082eb84ea11edcd215372bec2d11dc2d97b3b22bc226d51efd2378
                          • Opcode Fuzzy Hash: 9aea7ed47725927f7b795c864a4851fd38c6499a9223f255fb4fe82095f330ff
                          • Instruction Fuzzy Hash: 7E41D601E0DAD245FB62AF1174153B9AAA16F0A7F8F880171DA9E167C1DE3DA54F8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: bf9068647232c23270bb06824756632650ccea384f25d1b9994a83c676910035
                          • Instruction ID: d438c7043e290f4e6689fd3080bcb2ceccfa439d436e90e8ac835e70257c310c
                          • Opcode Fuzzy Hash: bf9068647232c23270bb06824756632650ccea384f25d1b9994a83c676910035
                          • Instruction Fuzzy Hash: D441D701E0DAD244FB62AF1174153B9ABA16F4A7F8F880171DA9E167C1DE3DA44FC320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: 240ef1b1f9facc9e65d5baa561c819f956be297c02644ee5a79b7c41297be8d0
                          • Instruction ID: be4ba93c20f9ac498f6b9def7d460072e9d8acad3fe776a14106f210dd6de4a9
                          • Opcode Fuzzy Hash: 240ef1b1f9facc9e65d5baa561c819f956be297c02644ee5a79b7c41297be8d0
                          • Instruction Fuzzy Hash: A541D701E0DAD245FB62AF1174153B9ABA16F0A7F8F880171DA9E167C1DE3DE54F8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: %%%02x
                          • API String ID: 1941130848-4020994737
                          • Opcode ID: 28c38c2a337478f6eaa9afb4f0928c14d828c94ae3e90ada8e004c9695e32935
                          • Instruction ID: a1b94cca3b81a325a50503cc05c0aa35040a8c4d2722c9dd060b407d35d5c312
                          • Opcode Fuzzy Hash: 28c38c2a337478f6eaa9afb4f0928c14d828c94ae3e90ada8e004c9695e32935
                          • Instruction Fuzzy Hash: 9D41C411E0DBD144FB62AF1174153B9ABA1AF4ABF8F880171DA9E167C1DE3DA44F8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _time64
                          • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                          • API String ID: 1670930206-870032562
                          • Opcode ID: b93b32ea752173c696f6b32425c6179706dd42c8cc666add30c7abec2cbc51ef
                          • Instruction ID: 9631ecf7029b3c518f12ab2b9dc7c0ee6cb48e2d8147660e82157495a82c585a
                          • Opcode Fuzzy Hash: b93b32ea752173c696f6b32425c6179706dd42c8cc666add30c7abec2cbc51ef
                          • Instruction Fuzzy Hash: 7D41D176B24A1586DB24DF2AE000668A7B0FF9CFDCF905432DA0C87784EE39E54AC740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr
                          • String ID: 100-continue$Expect$Expect:$Expect: 100-continue
                          • API String ID: 2830005266-711804848
                          • Opcode ID: 5e3be0d68d4a2175950e6ba9c090828c86d72cbc59a19f2a73c01601e4f7354c
                          • Instruction ID: 4b0e41375e3663134da298a91a4bc303e450d850b7c6863ab4d99f4f41f1bea5
                          • Opcode Fuzzy Hash: 5e3be0d68d4a2175950e6ba9c090828c86d72cbc59a19f2a73c01601e4f7354c
                          • Instruction Fuzzy Hash: CA418621B2CE8785EA54AF1964501B9E7B09F497FCF885034DA4E47746EE1CF44F8B20
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                          • API String ID: 2190258309-3662781045
                          • Opcode ID: ab0d886c58c705babb3c2f495a4e6f11b6d721f0ce908f432582b2f546818fc3
                          • Instruction ID: 97e7cc1996bafc170cc09a823c9fde0c209eeb746e547e5cfe0ca5a95e6ff511
                          • Opcode Fuzzy Hash: ab0d886c58c705babb3c2f495a4e6f11b6d721f0ce908f432582b2f546818fc3
                          • Instruction Fuzzy Hash: 61413026A08E8285EB54EF25A4401A9E7B1FF497E8F980432DA4D17765DE3CD54EC720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                          • API String ID: 1294909896-659367561
                          • Opcode ID: bb31ab71e0d26586360e2024b33e7cbb9b52d9943c98938361c4390443f1005b
                          • Instruction ID: 908c2938a8e6784f5126bae55adc36bd9e1abbc69532fcf91747a9b8e08ddfc7
                          • Opcode Fuzzy Hash: bb31ab71e0d26586360e2024b33e7cbb9b52d9943c98938361c4390443f1005b
                          • Instruction Fuzzy Hash: 4F417155B09A8248EB14BF6594141F9A7B1AF4DBECFC80431DE0E2B786DE3CA54E8321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree
                          • String ID: .
                          • API String ID: 1865132094-916926321
                          • Opcode ID: 14c98bf93d53522ebcafbea39f0ef98a5e05c7352dbac540092c9aa5172eabc0
                          • Instruction ID: cf16348ad707f12fcdb7cd487bf7a175f5b060ef3886b1fcd4286c0194bdd9b5
                          • Opcode Fuzzy Hash: 14c98bf93d53522ebcafbea39f0ef98a5e05c7352dbac540092c9aa5172eabc0
                          • Instruction Fuzzy Hash: 80417E22A09F8586E655AF11A840279A2F4FF49BE8F854031EA4E46650DF38E55FC7A0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$mallocmemcpy
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                          • API String ID: 3401966785-517259162
                          • Opcode ID: 1c12d0456bb279d48f7b13bf8f096ecd373137648bed811bb097c30b77ece786
                          • Instruction ID: 1092a98169264be2325d2dad2ab804ed4b9474ed07ec18505826b982c67d9975
                          • Opcode Fuzzy Hash: 1c12d0456bb279d48f7b13bf8f096ecd373137648bed811bb097c30b77ece786
                          • Instruction Fuzzy Hash: 9141A165B08F8244EB14BF2594142F9A7B1BF59BECF880435DD0E2B755EE3CA54E8321
                          APIs
                          • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1E72
                          • ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1E87
                          • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1EA8
                          • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1ED0
                          • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1EDC
                          • ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z.MSVCP140 ref: 00007FF7197A1EEE
                          • ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140 ref: 00007FF7197A1EF7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: D@std@@@std@@U?$char_traits@$?gptr@?$basic_streambuf@$?eback@?$basic_streambuf@?egptr@?$basic_streambuf@?pptr@?$basic_streambuf@?setg@?$basic_streambuf@D00@
                          • String ID:
                          • API String ID: 1210260451-0
                          • Opcode ID: 098dc9a533f512a288c442b3a7c3cde5c3d9588c6d967cb12034ca7cd18e8c04
                          • Instruction ID: df401597cfd88875aac8976df241b3f5be0974c043f255630f649a0a4cf5226a
                          • Opcode Fuzzy Hash: 098dc9a533f512a288c442b3a7c3cde5c3d9588c6d967cb12034ca7cd18e8c04
                          • Instruction Fuzzy Hash: F5312456A0CAC042E7016F35A19417CABB0AF69FE4BCC4470DBD947B96EE2CD48F8301
                          APIs
                            • Part of subcall function 00007FF7197CE1C0: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197B3579,?,?,?,?,00007FF7197B291B), ref: 00007FF7197CE1E8
                            • Part of subcall function 00007FF7197CE1C0: GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF7197B3579,?,?,?,?,00007FF7197B291B), ref: 00007FF7197CE20E
                            • Part of subcall function 00007FF7197CE1C0: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197B3579,?,?,?,?,00007FF7197B291B), ref: 00007FF7197CE22F
                            • Part of subcall function 00007FF7197CE1C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197B3579,?,?,?,?,00007FF7197B291B), ref: 00007FF7197CE240
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197E243F
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197E2488
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197E2491
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$realloc$EnvironmentVariable
                          • String ID: %s%s.netrc$%s%s_netrc$HOME
                          • API String ID: 4174189579-3384076093
                          • Opcode ID: 88fc2429d984dbd1b98d541e6189830dc4416d1333af91ec037f3cdbf4a5c282
                          • Instruction ID: 44ee8e1f9e2d8eead91c40ce711e772a9d1a9c05103b8d56fae16f92bb217449
                          • Opcode Fuzzy Hash: 88fc2429d984dbd1b98d541e6189830dc4416d1333af91ec037f3cdbf4a5c282
                          • Instruction Fuzzy Hash: E0316821A09F4286EA54EF16B800165E2B0BF8DBF8F940531ED4D57759DE3CE55F8710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$memcpy
                          • String ID: Signature: %s$Signature
                          • API String ID: 3519880569-1663925961
                          • Opcode ID: 6fc690665e3c960f521598fd9cb65c7cbd4b7b7c7eae56d7b332e8ce4af7c09d
                          • Instruction ID: 8eeb43aed52a3b3b7a4e1a09d644664d39612cd925d3b10d1e47b5281325ad35
                          • Opcode Fuzzy Hash: 6fc690665e3c960f521598fd9cb65c7cbd4b7b7c7eae56d7b332e8ce4af7c09d
                          • Instruction Fuzzy Hash: 8331B225B09F8285EE55EF16A4042B9A3B1BF89BF8F840531DE0D177A5EE3CE54E8310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: __stdio_common_vsscanf_strdupfree
                          • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                          • API String ID: 860312144-3309259123
                          • Opcode ID: c0769d112c8980f0ba63fe22be37daa7c687dcefc037a702ecbe341ad1fbb48a
                          • Instruction ID: 4570df543a813634316c4fb1affa017a851383a31515045a9042aa916cb0b6fb
                          • Opcode Fuzzy Hash: c0769d112c8980f0ba63fe22be37daa7c687dcefc037a702ecbe341ad1fbb48a
                          • Instruction Fuzzy Hash: 87314F26A09E4385EA51BF20944117DA3B0AF49BFCFD41432CA0D47255DF3DE55F83A1
                          APIs
                          • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF71978C6C0), ref: 00007FF71978D17D
                          • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF71978C6C0), ref: 00007FF71978D197
                          • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF71978C6C0), ref: 00007FF71978D1C9
                          • ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF71978C6C0), ref: 00007FF71978D1F4
                          • std::_Facet_Register.LIBCPMT ref: 00007FF71978D20D
                          • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF71978C6C0), ref: 00007FF71978D22C
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71978D257
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
                          • String ID:
                          • API String ID: 762505753-0
                          • Opcode ID: cd2bdddb0596ab37e0527cdad35a1f99652aad3cfd6ce1b4799fe4c260516971
                          • Instruction ID: d81f9bf278bede0bd4b9f3165d14bea902328fe2c0d9269e94402c2e49c03bde
                          • Opcode Fuzzy Hash: cd2bdddb0596ab37e0527cdad35a1f99652aad3cfd6ce1b4799fe4c260516971
                          • Instruction Fuzzy Hash: AD311C22A08E4186EA14AF11E444169E370FF8CFE8F880631EA5D577A4DF3CE55EC710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree
                          • String ID: Start Date: %s$FALSE$Start Date$TRUE
                          • API String ID: 1865132094-176635895
                          • Opcode ID: c27b45235923359540d0cdd1a3e729ebf80aec24c35f02631c5a53f0515d5fa0
                          • Instruction ID: 2eb52d9159ff8ebd1096353d8a8be5a08cd5ac8abdb2c68881b7e07d83354983
                          • Opcode Fuzzy Hash: c27b45235923359540d0cdd1a3e729ebf80aec24c35f02631c5a53f0515d5fa0
                          • Instruction Fuzzy Hash: FF219D62B08AC285EB21AF15A4542FAA771BF4A7ECF880031CA4D17755DF3CE59EC321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc$_strdup
                          • String ID: Signature: %s$Signature
                          • API String ID: 1941130848-1663925961
                          • Opcode ID: 8513038bd166b144c7c6de9462af77b3610b9ba8311f5d3a2c0567a3e7933561
                          • Instruction ID: 3e18c21aee1cf8aafa73fefec7cdb02dc447fd1c37069f2684943fe2e67fa6b0
                          • Opcode Fuzzy Hash: 8513038bd166b144c7c6de9462af77b3610b9ba8311f5d3a2c0567a3e7933561
                          • Instruction Fuzzy Hash: 58215066B08F8286EB54AF15A4542AAA3B0FF897E8F840431DE4D17725EE3CD54FC710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 47e5e66416f6e86833811b1b48d9b8c6facdeb4214a28e40684f1d25e079749c
                          • Instruction ID: 822ab5198293c78cc131275ab5fb14d1a9589e353f602671ba10c7a038de7588
                          • Opcode Fuzzy Hash: 47e5e66416f6e86833811b1b48d9b8c6facdeb4214a28e40684f1d25e079749c
                          • Instruction Fuzzy Hash: B001603AA09F01C6D744AF21E99413CB3B4FB8CFA97501125DE4E82728CF38D5AAC750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$memcpy
                          • String ID: 1.1
                          • API String ID: 4107583993-2150719395
                          • Opcode ID: 60af61f91e59ca4e4c8fb60a03de03d5eb3d223a4cbae19e6d8d79e3442697c0
                          • Instruction ID: e5a636135018b99b973bea0305f2e2892259297d24934b04b4d3cb44cb6f6dce
                          • Opcode Fuzzy Hash: 60af61f91e59ca4e4c8fb60a03de03d5eb3d223a4cbae19e6d8d79e3442697c0
                          • Instruction Fuzzy Hash: 77516E72618F8686D6659F22E4403AAA3B0FB48BE8F444031DE9E47754DF3CE16E8710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: mw1 chair
                          • API String ID: 3510742995-2267673244
                          • Opcode ID: 887072a94038dda60cac739dff8bf3d92874356afa2a20b2490d19fdac95f829
                          • Instruction ID: 044fb78bb4e33dd7e6d9e5b0cfa50b1e0799146200988787cb4dc2bc5300765f
                          • Opcode Fuzzy Hash: 887072a94038dda60cac739dff8bf3d92874356afa2a20b2490d19fdac95f829
                          • Instruction Fuzzy Hash: 7641C232604F9192EB10AF29E504269A362FB19FE8F544631DF6D17795DF38E1DAC340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupstrchr$mallocstrncpy
                          • String ID:
                          • API String ID: 2121287944-0
                          • Opcode ID: c055f92e1f15aea81c3b26e3b0f0f3e77bedbc71fc8cc29143d5940d84ca2064
                          • Instruction ID: 5b461b58fe9e01cb6793fed8b3f6aecc5895186bd91154b5b69588aeef9d4813
                          • Opcode Fuzzy Hash: c055f92e1f15aea81c3b26e3b0f0f3e77bedbc71fc8cc29143d5940d84ca2064
                          • Instruction Fuzzy Hash: 65317721B09F418AEA55FF126550279B7B0AF4DBE4F884634DE5E17791EF3CE04A8710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                          • API String ID: 1294909896-517259162
                          • Opcode ID: 202b28cd6889865a983d6f628ccc58a140af8ab33d0ef0544c3ca3d4949ad514
                          • Instruction ID: 038837bf2ecce8a61bebda7b0e72f5bdb75a643e9f2ee3ef88764d4acf589553
                          • Opcode Fuzzy Hash: 202b28cd6889865a983d6f628ccc58a140af8ab33d0ef0544c3ca3d4949ad514
                          • Instruction Fuzzy Hash: 00417F65B08B8248EB14BF6594141F9A7B1BF49BECF880435DE0E27795DE38E54E8321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: callocfreememcpystrchr
                          • String ID: CAPA$Got unexpected pop3-server response
                          • API String ID: 2887963327-1591402739
                          • Opcode ID: ec5f52dcdbad0dc49807fad57b4c1495d81065116b4d0d22bd6cdc754149304d
                          • Instruction ID: 0f638055b4abe28d4d8d180b2d497873e6d5fff4d842d04bd04dbb6bfc9986e0
                          • Opcode Fuzzy Hash: ec5f52dcdbad0dc49807fad57b4c1495d81065116b4d0d22bd6cdc754149304d
                          • Instruction Fuzzy Hash: 40319F65B09B8281FA1DAF11A0452B9A6F4BF497E8F840535CA2E133D1DF3CE46EC321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: Signature: %s$%s%lx$Signature
                          • API String ID: 2190258309-1406629954
                          • Opcode ID: c4bcb139ca479e16397d9b76d97ff7c67916c63ff4a99b4fb65222f06c47e04a
                          • Instruction ID: 0719c85e562ebfbc41f934b5c7c5af82205d1bb6dbee0453970dae60a14c8c73
                          • Opcode Fuzzy Hash: c4bcb139ca479e16397d9b76d97ff7c67916c63ff4a99b4fb65222f06c47e04a
                          • Instruction Fuzzy Hash: 5431A226B09E8285EB64AF25A4442B9A7B0FF49BECF840431DA4D57755EE3DE40E8720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                          • API String ID: 1294909896-517259162
                          • Opcode ID: 817019609291619c52b7da555dfe91ea85f173e23d286e0574096de28b30c2b4
                          • Instruction ID: ca28fcbff4c730a5b17993aebc4ccd3c95862b8e69fe6aa425aab38724885235
                          • Opcode Fuzzy Hash: 817019609291619c52b7da555dfe91ea85f173e23d286e0574096de28b30c2b4
                          • Instruction Fuzzy Hash: E7318D55B09F8244EB14BF6594101F9A7B1AF4DBECF880435DE0E2B796EE3CA54E8321
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupcallocfree
                          • String ID:
                          • API String ID: 1236595397-0
                          • Opcode ID: 2a2af77d4e7b8a978fac17d3c678f712a50c9d7934e228e445caa259c7bde1bf
                          • Instruction ID: f9fadaa46b38ba5614437ade3f8ffb15d89924ab10b48e625bb5e18ccc7bb05f
                          • Opcode Fuzzy Hash: 2a2af77d4e7b8a978fac17d3c678f712a50c9d7934e228e445caa259c7bde1bf
                          • Instruction Fuzzy Hash: A3319032A09E8582EB419F14E4503A9B7F1EF89B98FA80030DE4D47795EF3DD59E8720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                          • API String ID: 3061335427-517259162
                          • Opcode ID: 2e075935b3b11092963faec1eff85a83b69540f76d31e102e28012f47b0b9f08
                          • Instruction ID: 8936d5a41ca931c614b1ddffc778f5e920c955479c3d400a86a6e7c3383182d4
                          • Opcode Fuzzy Hash: 2e075935b3b11092963faec1eff85a83b69540f76d31e102e28012f47b0b9f08
                          • Instruction Fuzzy Hash: 90315D55B09F8248EB14BF6594101F9A7B1AF497ECF880435DE0E2B756EE3CA54E8321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc
                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                          • API String ID: 3061335427-517259162
                          • Opcode ID: 133de6af75a53c72fa457d0f648588528f608e09a9007c1c6225ebac0986f126
                          • Instruction ID: 057a8a8cbebc1fc018027e9d59791a23a007acb10532d73c6a4f8df3828386e9
                          • Opcode Fuzzy Hash: 133de6af75a53c72fa457d0f648588528f608e09a9007c1c6225ebac0986f126
                          • Instruction Fuzzy Hash: C9316B55B09F8248EB04BF6594101F9A7B1AF497ECF880435DE0E2B796EE3CA54E8321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemalloc
                          • String ID: OS/400$SITE NAMEFMT 1
                          • API String ID: 3061335427-2049154998
                          • Opcode ID: 42ee40ad401ca76902203d257c29206fa0bef6c97fb5a22deb1a22658e4e961d
                          • Instruction ID: edab95f0ee8244fa595dc7eba27fad375070a9d836dddbe1ca3e344fdb5b5979
                          • Opcode Fuzzy Hash: 42ee40ad401ca76902203d257c29206fa0bef6c97fb5a22deb1a22658e4e961d
                          • Instruction Fuzzy Hash: AF317062A09AC285F760AF25A4513B8E3B0AF8D7E8FD44031CA8D57755DE3CE64F8720
                          APIs
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979E6A2
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979E6F1
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979E730
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71979E77F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn
                          • String ID: [json.exception.
                          • API String ID: 3668304517-791563284
                          • Opcode ID: ebe7fc72045d5b8f1cfc3d6e0f9283bbab7822993c331b0c9b34373ed142483d
                          • Instruction ID: 3b127d4b77dc9c016cfcc58f81af34d7d219f6613609820e079d8a24160068b6
                          • Opcode Fuzzy Hash: ebe7fc72045d5b8f1cfc3d6e0f9283bbab7822993c331b0c9b34373ed142483d
                          • Instruction Fuzzy Hash: 54918D62F18E4685FB04DF78D4053ACA371EF99BA8F904631DA6C12695EF78E18EC350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupstrchr
                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                          • API String ID: 3727083984-2292467869
                          • Opcode ID: 3fb02eea091f81e3db2e34af5e737cf43fe4a3436e1a432cf7b9012c40b37308
                          • Instruction ID: 6a51125bb701fd2f6803f39f4a771394f43e13a49cda05e68ff7c91e8231681d
                          • Opcode Fuzzy Hash: 3fb02eea091f81e3db2e34af5e737cf43fe4a3436e1a432cf7b9012c40b37308
                          • Instruction Fuzzy Hash: 68615061E08B8295FF71AF15D544379A7B5AF58BE8F8C0036DA8D06791EF2CE44E8360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree
                          • String ID: Forcing HTTP/1.1 for NTLM$The requested URL returned error: %d
                          • API String ID: 1865132094-1204028548
                          • Opcode ID: 9fad2532ab848c8d53990e5781de57f025d867347be9e3b0f2db17eec2151417
                          • Instruction ID: f022f870c7af7734c3729b638f7e16a20c6d96ff75d18a6687a1109d4727175d
                          • Opcode Fuzzy Hash: 9fad2532ab848c8d53990e5781de57f025d867347be9e3b0f2db17eec2151417
                          • Instruction Fuzzy Hash: 8D519471A18E8395FB64AE2490402B9B7B1EF49BFCF980035DA4D466D5CE2CF45E8331
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: tolower$_time64
                          • String ID: :%u$Hostname in DNS cache was stale, zapped
                          • API String ID: 4068448496-2924501231
                          • Opcode ID: be462bc681f294b846ec8b6f7bafb28f8b3c9e723aede0127f877f0f853eacff
                          • Instruction ID: 27c623fa6036157311f6b56bcd142ae133fb3ad6100a278834749ee032b9663d
                          • Opcode Fuzzy Hash: be462bc681f294b846ec8b6f7bafb28f8b3c9e723aede0127f877f0f853eacff
                          • Instruction Fuzzy Hash: 4F418162618E8285EA21AF11E4507A9A774FF89BFCF844232DE5D47795DE2CE50FC320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: mw1 chair
                          • API String ID: 3510742995-2267673244
                          • Opcode ID: 5ce03e0e51cd0d82179c633c46743d7f3b6b9d839c2c0a275ca7238250c9bd13
                          • Instruction ID: 4d91eee24d523ebb19fe5a25ab17181daf5f37323c3d72173ba276af936e2016
                          • Opcode Fuzzy Hash: 5ce03e0e51cd0d82179c633c46743d7f3b6b9d839c2c0a275ca7238250c9bd13
                          • Instruction Fuzzy Hash: B131B022B15B8285FA15BF65B5413B8E1609F49BF8F640231DE2C077D5EE7C95CB8320
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_close_openmalloc
                          • String ID: Couldn't open file %s
                          • API String ID: 3412525164-447283422
                          • Opcode ID: fd079b85187223a1e7896735e7694e13f078ca340770976b25a70d49167bffd7
                          • Instruction ID: f38411d70389c029cbc6c9df94d8bddac348f374be4e938adf0aaabe1aa70b8a
                          • Opcode Fuzzy Hash: fd079b85187223a1e7896735e7694e13f078ca340770976b25a70d49167bffd7
                          • Instruction Fuzzy Hash: A4417161A08E8185EB149F25E8042BAE7F1FF49BE8F888131DA9D47694DF7CE44E8711
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ErrorLast$_errnofreememcpyrecv
                          • String ID: Recv failure: %s
                          • API String ID: 267823591-4276829032
                          • Opcode ID: f2881a5ebb85d8107934ac4dab30561c607821c9b70506d701cc9b9afa656eb5
                          • Instruction ID: 9aa69d4625ed3710ed9c70a0447614d1372a896cb062f82395257a5e080697d7
                          • Opcode Fuzzy Hash: f2881a5ebb85d8107934ac4dab30561c607821c9b70506d701cc9b9afa656eb5
                          • Instruction Fuzzy Hash: 0931AC72B05B4185EB20AF22E8842A9A3A0BB58FECF844135DE1E07784DE3CD56E8350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree
                          • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                          • API String ID: 1865132094-195851662
                          • Opcode ID: 41605b012d6dd3b6376cb0e83c02b400ff94753f3b61c37dc6fcf554858e740d
                          • Instruction ID: 4d33b495c9325116156c01ebc0ec074fa11217134f4d376e35172dccd3395e5c
                          • Opcode Fuzzy Hash: 41605b012d6dd3b6376cb0e83c02b400ff94753f3b61c37dc6fcf554858e740d
                          • Instruction Fuzzy Hash: CB41C322B08E8281EB559F25E0543A9A7A0EF88BDCF484031DB4E47396DF3CE59EC750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfreemalloc
                          • String ID: Unrecognized content encoding type. libcurl understands %s content encodings.$identity
                          • API String ID: 3985033223-1703240927
                          • Opcode ID: 7e6651c2bb5565efb712aade9b4f841ef0da1f18a5a6eb31ccd53c7e723c7609
                          • Instruction ID: 44589729b099067b110805389208b73b78cf8cb1c3919f43d44120ed8d88dda8
                          • Opcode Fuzzy Hash: 7e6651c2bb5565efb712aade9b4f841ef0da1f18a5a6eb31ccd53c7e723c7609
                          • Instruction Fuzzy Hash: BF418021E09E5685EB11AF15D440378A770EF58BF8F884231DE6E47794EE2CE51F8710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfreestrpbrk
                          • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                          • API String ID: 1812939018-579818044
                          • Opcode ID: 6305e402a6e4e1e9a463381f710f6db912d5dfcb830bcf8b5c7718380814cc19
                          • Instruction ID: 3c72abd47896dde6bfe38eb3181a3ac0cc1c26ffa6bc5e62747396f463650a75
                          • Opcode Fuzzy Hash: 6305e402a6e4e1e9a463381f710f6db912d5dfcb830bcf8b5c7718380814cc19
                          • Instruction Fuzzy Hash: 0A314F62A18F8181EB01EF15E4402B9E7A1EF99BE8F884231EA5E03795DF7CD54EC310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Resolving timed out after %I64d milliseconds
                          • API String ID: 1294909896-3343404259
                          • Opcode ID: 57ffa41478984245528955a39b0ac88fe16b075f418efc0be5853ba86c9022a2
                          • Instruction ID: 3a262d8c106c22303d32ca56cfbad17d47685b1ec7052f74e76dfddec366f0ab
                          • Opcode Fuzzy Hash: 57ffa41478984245528955a39b0ac88fe16b075f418efc0be5853ba86c9022a2
                          • Instruction Fuzzy Hash: 49D19161A08A4285FB54AF2994443BDA3B1FF48FECF884432DE0E57695DF38E54E8360
                          APIs
                            • Part of subcall function 00007FF7197E6200: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197E6226
                            • Part of subcall function 00007FF7197E6200: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197E6247
                            • Part of subcall function 00007FF7197E6200: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197E6262
                            • Part of subcall function 00007FF7197E6200: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197E6270
                            • Part of subcall function 00007FF7197E6200: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197E6282
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197E6326
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: HTTP$NTLM
                          • API String ID: 2190258309-4188377180
                          • Opcode ID: e1bf4c8166a8a75f28689fb73979db9686edb6aec639b8e6d768db82bce69aeb
                          • Instruction ID: 1d71d26d45cd9e719de67bb375081a36cd3d4f4746852b6b012f576a55f0f22f
                          • Opcode Fuzzy Hash: e1bf4c8166a8a75f28689fb73979db9686edb6aec639b8e6d768db82bce69aeb
                          • Instruction Fuzzy Hash: 23612F32608F8586E760AF15E44466EB3B4FB88B98F944135DE8D53B58EF3CD45ACB10
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                          • API String ID: 1294909896-1891748601
                          • Opcode ID: db0bab37b2fd77417df0febdb6e61c96d5d80683ff20995e8f75c9cc5a29661c
                          • Instruction ID: 4956778e39ddc3e813cdaae31f91e8e7c5b424a47dffb14147bbdbc152ffe647
                          • Opcode Fuzzy Hash: db0bab37b2fd77417df0febdb6e61c96d5d80683ff20995e8f75c9cc5a29661c
                          • Instruction Fuzzy Hash: 0651856190CE8245E664BF3590503B9A2B1AF597FCF840235DA6E076C2DF7DE54F8321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: callocfreememset
                          • String ID: CONNECT phase completed!$allocate connect buffer!
                          • API String ID: 3505321882-591125384
                          • Opcode ID: 03d6e6cf566f35901d91cb824c607f6b2c99800fcb04ac3beae7ac0d88ac1593
                          • Instruction ID: 95e3338e84d885da47b3fdeada133a0b36aef0bac3aeecea2cf13881f6224c6a
                          • Opcode Fuzzy Hash: 03d6e6cf566f35901d91cb824c607f6b2c99800fcb04ac3beae7ac0d88ac1593
                          • Instruction Fuzzy Hash: 3E51A362A08E8296E714AF21D5543BAB3A4FF587DCF444035CB5D4B281DF78EA6EC311
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Start Date: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Start Date
                          • API String ID: 1294909896-619256714
                          • Opcode ID: c2cc8a4e2921442434964406f6f80384de2b80e7e19b3ecb70c501f697a76c69
                          • Instruction ID: 3b7b47782207074a3c99c3888d1c5f52f02391dcd9bf181ebdf4699a1585426d
                          • Opcode Fuzzy Hash: c2cc8a4e2921442434964406f6f80384de2b80e7e19b3ecb70c501f697a76c69
                          • Instruction Fuzzy Hash: 5651B072B0CA9245EF24AF1595041B9F7B9BF0A7E8FC84031DA4D26A54DE3CE55EC320
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: eaef5b74a2b5aef34d803256b4b6bcee660f146c696fb202dc674434e1d08a92
                          • Instruction ID: 0a3ddca9b1ad673c1a85d299453b9d34f5593f0cd8a490a912156b9b35903e92
                          • Opcode Fuzzy Hash: eaef5b74a2b5aef34d803256b4b6bcee660f146c696fb202dc674434e1d08a92
                          • Instruction Fuzzy Hash: E441B262B08E4191EE10BF16A406369E365FF48BE8F944631DE6D07B95DE7CD44E8321
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errnofreememcpy
                          • String ID: Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                          • API String ID: 738009125-4268564757
                          • Opcode ID: 3517baa6f819c332b961255ff01911a11ae2d3ff234f9926fbd770ff3261afff
                          • Instruction ID: 965ceb9f0ac459f8a9543ae2f45519b5978b181bf5ec48808a9115f935c99df0
                          • Opcode Fuzzy Hash: 3517baa6f819c332b961255ff01911a11ae2d3ff234f9926fbd770ff3261afff
                          • Instruction Fuzzy Hash: 4E519262A0CE8682EA15AE25D4006EDE3B0FF897E8F844031DA9E17A55DF7CE15F8710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Start Date: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Start Date
                          • API String ID: 1294909896-2752585153
                          • Opcode ID: 552777525a44fbdf1f3d2193506851acc5bb04e93bc6d42e9093410d159f814e
                          • Instruction ID: 21b8a897ed008ea66fe9cad1948e4ff3a6b04eed8d8e47ec02f0c72b8c44b675
                          • Opcode Fuzzy Hash: 552777525a44fbdf1f3d2193506851acc5bb04e93bc6d42e9093410d159f814e
                          • Instruction Fuzzy Hash: A5317E62A0CE8285EB20AF6194441F9E7B1BF09BECFC84031D64D2A255DF3CD65EC320
                          APIs
                          • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71978B03B
                          • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF71978B05A
                          • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71978B08C
                          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF71978B0A7
                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF71978B0ED
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?setstate@?$basic_ios@D@std@@@1@_Init@?$basic_streambuf@V?$basic_streambuf@
                          • String ID:
                          • API String ID: 1830095303-0
                          • Opcode ID: bfb136ae2ab69f61ef84cdff7f97bd1ab895b6aab3db558f3df58f414e52c596
                          • Instruction ID: deb0892de21782f7d0e2bfaf61e5f44c2bd2cfe63f72705759c515f8e0c00758
                          • Opcode Fuzzy Hash: bfb136ae2ab69f61ef84cdff7f97bd1ab895b6aab3db558f3df58f414e52c596
                          • Instruction Fuzzy Hash: EC317632605B8286EB109F2AEA94329B7B0FB89FD9F448131CA5D53724DF38C16AC750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: Signature: %s$Signature
                          • API String ID: 2190258309-1663925961
                          • Opcode ID: cba224acf09d27c61e77cd823e1b02bda2a9f6312e22c2ca3b22bf55de9e9ff6
                          • Instruction ID: b0177326831097e9c45d45a51d1b1b7cf9deb28c2e63b200dbf323dcea25adce
                          • Opcode Fuzzy Hash: cba224acf09d27c61e77cd823e1b02bda2a9f6312e22c2ca3b22bf55de9e9ff6
                          • Instruction Fuzzy Hash: 3E21C226B08AC285EB14EF25A4442E9A7A0FF48BF8F880132DE5D53795EE3CD54AC710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Failure sending QUIT command: %s$QUIT
                          • API String ID: 1294909896-1162443993
                          • Opcode ID: 1ca65809ba5d3ff0e0ffbc3f4e64941a58253cf71e040ad689861268439afa50
                          • Instruction ID: 5129d429f411386c8898eefc4306cf2be05d5e9854b28c43c51aeaf865412bc4
                          • Opcode Fuzzy Hash: 1ca65809ba5d3ff0e0ffbc3f4e64941a58253cf71e040ad689861268439afa50
                          • Instruction Fuzzy Hash: 41314C36A08B8281EB50EF21D4442B9A7B4EF89FE8F884035DA5E47695DF38D05E8361
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$calloc$memcpy
                          • String ID:
                          • API String ID: 3478730034-0
                          • Opcode ID: 111d6ed67368218d3dd675a749a234356278db575fe078b726617bf82643b03b
                          • Instruction ID: b21cbfba763a834ffe3bd06154996c2c1c92ab5f39255d3838bcd7db4f3da187
                          • Opcode Fuzzy Hash: 111d6ed67368218d3dd675a749a234356278db575fe078b726617bf82643b03b
                          • Instruction Fuzzy Hash: 3921A161A18F8286E714EF55A810229B7B0FF4CBF8F844234DA5E5B794DF3CD45A8350
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$_strdupmalloc
                          • String ID:
                          • API String ID: 4236146995-0
                          • Opcode ID: d5445c2f3e4fd82d7024e3c80f156bd967658c961cf783a108597ef3bd6f5d8b
                          • Instruction ID: 2ac2d145f70bc2d9f2c81507cb04d3716c2e56c5bc3c89258dc4b76500c98aba
                          • Opcode Fuzzy Hash: d5445c2f3e4fd82d7024e3c80f156bd967658c961cf783a108597ef3bd6f5d8b
                          • Instruction Fuzzy Hash: AC215C72B16F8185EB81DF2194403A863E2EF89BA8F481134DE4D4B758EF29D59AC720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc
                          • String ID: Signature: %s$Signature
                          • API String ID: 2190258309-1663925961
                          • Opcode ID: 97c81e3377b7e5ffb2f5752948f8a23bdb01db794371187708127e8464dd9482
                          • Instruction ID: cad60574b36ce6b4b2998c14de7f23d7ded5aa95069274e5cfa5c575a4b054c9
                          • Opcode Fuzzy Hash: 97c81e3377b7e5ffb2f5752948f8a23bdb01db794371187708127e8464dd9482
                          • Instruction Fuzzy Hash: 5C217F66B09E8285EB54AF25A4402EAA3B0FF887E8F840431DE4D17725EE3CD54F8710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: CloseCriticalHandleSection$EnterLeaveObjectSingleWaitclosesocketfree
                          • String ID:
                          • API String ID: 768628753-0
                          • Opcode ID: 3fba53d2dfbaa3a40788f2cb421903d592e2f32359e050d0e5d03964d6f97957
                          • Instruction ID: d919f0e9ee877f323f2febf39f678b923a63be9469a9aa81f57a2498d3147820
                          • Opcode Fuzzy Hash: 3fba53d2dfbaa3a40788f2cb421903d592e2f32359e050d0e5d03964d6f97957
                          • Instruction Fuzzy Hash: DD213636A09A4186E724AF52E494269A370FF9DFA8F584030DF8D47741DF39E4AA8720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: malloc$free
                          • String ID: Signature: %s$Signature
                          • API String ID: 1480856625-1663925961
                          • Opcode ID: 374f31f02c22e5b03c7cc77e96ec3c5654cb7060cf178e8f8d3fab42a0431982
                          • Instruction ID: db2ed1f7b1c4707344a4d9f4c716648ce7748a77cba2dcc4c72d9610042f8ef3
                          • Opcode Fuzzy Hash: 374f31f02c22e5b03c7cc77e96ec3c5654cb7060cf178e8f8d3fab42a0431982
                          • Instruction Fuzzy Hash: D0213E66B08E8285EB54AF15A4542EAA3B0FF897E8F840432DE4D17725EE3DD54B8710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: malloc$free
                          • String ID: Signature: %s$Signature
                          • API String ID: 1480856625-1663925961
                          • Opcode ID: fb5eabcf671d18d99c030c68fee6fcb880a50d39f0ffce816dc708311095d2aa
                          • Instruction ID: bf30be3b167955d1bfd613cb0d4f881c7b54e51b47651382e2675e9ba7cf2b71
                          • Opcode Fuzzy Hash: fb5eabcf671d18d99c030c68fee6fcb880a50d39f0ffce816dc708311095d2aa
                          • Instruction Fuzzy Hash: 0F216066B08E8285EB54AF25E4442EAA3B0FF887E8F840432DE4D17725EE3CD54E8710
                          APIs
                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7197A2B49), ref: 00007FF7197A34AF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strncpy
                          • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                          • API String ID: 3301158039-3625861382
                          • Opcode ID: ab1af6f3f5c9f8886410f58ef438b31858af9ea9bf8521fa188e47fdd6b36138
                          • Instruction ID: a0cef06548d35ca1f0a0fbead4883844523adddc42644f09377198c29ad013cd
                          • Opcode Fuzzy Hash: ab1af6f3f5c9f8886410f58ef438b31858af9ea9bf8521fa188e47fdd6b36138
                          • Instruction Fuzzy Hash: A311A051E0CD4291EE5A6F28F5542789270AF0DBFCFCC5075D51E07665DD9CE98E8230
                          APIs
                          Strings
                          • ** Resuming transfer from byte position %I64d, xrefs: 00007FF7197C7A98
                          • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 00007FF7197C7AAB
                          • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 00007FF7197C7CF5
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fflush
                          • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                          • API String ID: 497872470-664487449
                          • Opcode ID: 15ac94929da7fc9ea2bba90fd063a65de8b59d0f1290994f5f9f8a1cb3057f6e
                          • Instruction ID: fa9963bcdaa8e20457842b127008fed71fba042090b1699fb7af114dafbb04ff
                          • Opcode Fuzzy Hash: 15ac94929da7fc9ea2bba90fd063a65de8b59d0f1290994f5f9f8a1cb3057f6e
                          • Instruction Fuzzy Hash: 5B919162616B8785DA60EF05E544BAAE374FB88BE4F821032DE5D47B55FF38D04AD700
                          APIs
                          • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,mw1 chair,00000000,?,?,?,?,00007FF71979DF28), ref: 00007FF71978F46C
                          • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,mw1 chair,00000000,?,?,?,?,00007FF71979DF28), ref: 00007FF71978F4E3
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,mw1 chair,00000000), ref: 00007FF71978F5C9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcmp$_invalid_parameter_noinfo_noreturn
                          • String ID: mw1 chair
                          • API String ID: 722167722-2267673244
                          • Opcode ID: 46de5afb9243b64a451b49b7f12b4e6284b28dae7d34156707c287cc34a483a6
                          • Instruction ID: 7419f05de27039c8b5cb7e6469237bacdd5509a88b8c4c44927737b4ae5f94cb
                          • Opcode Fuzzy Hash: 46de5afb9243b64a451b49b7f12b4e6284b28dae7d34156707c287cc34a483a6
                          • Instruction Fuzzy Hash: C871CE22A14A5185F700AF65D8052ACA775FF08BFCF984226DF6C27AC9DF78D48AC350
                          APIs
                          • __std_fs_convert_narrow_to_wide.LIBCPMT ref: 00007FF7197824F5
                            • Part of subcall function 00007FF7197F1228: MultiByteToWideChar.KERNEL32 ref: 00007FF7197F1244
                            • Part of subcall function 00007FF7197F1228: GetLastError.KERNEL32 ref: 00007FF7197F1252
                          • __std_fs_convert_narrow_to_wide.LIBCPMT ref: 00007FF719782591
                            • Part of subcall function 00007FF71978D4B0: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,00007FF719781080), ref: 00007FF71978D5B4
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71978263B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: __std_fs_convert_narrow_to_wide$ByteCharErrorLastMultiWide_invalid_parameter_noinfo_noreturnmemcpy
                          • String ID: Unknown exception
                          • API String ID: 882635279-410509341
                          • Opcode ID: 23801b010b4e29e05f5b21e541ec3f33ff8e4e3321ae88d7a3ac5a48fe529986
                          • Instruction ID: 7c63b38953447f0e6484357245cc63745aa9317c06de2e796f78974ff2eb36a0
                          • Opcode Fuzzy Hash: 23801b010b4e29e05f5b21e541ec3f33ff8e4e3321ae88d7a3ac5a48fe529986
                          • Instruction Fuzzy Hash: 1B41DFA1B04B4182EB18AF66A41526CA2A1FF08FECF945036DE5D47754DF3CE48E8340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _time64$ErrorLast
                          • String ID: TFTP response timeout
                          • API String ID: 3339832089-3820788777
                          • Opcode ID: b50717e9cad3141e678a7a394a05bbd1da01f748d4dc3e60a6d87f2bf4924b80
                          • Instruction ID: eeee4e3fd1ee14008cdba33b7ecdf7cd04a4d8a2ee9b7a348936ca00e21ad295
                          • Opcode Fuzzy Hash: b50717e9cad3141e678a7a394a05bbd1da01f748d4dc3e60a6d87f2bf4924b80
                          • Instruction Fuzzy Hash: 40419231608E4285EB60AF25D8042A9A7B1EF8DBF8F944235DE2D477C5EE7CD40E8760
                          APIs
                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197C5DE9), ref: 00007FF7197C643D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: realloc
                          • String ID: Failed to alloc memory for big header!$Rejected %zu bytes header (max is %d)!
                          • API String ID: 471065373-1365219457
                          • Opcode ID: 3beeb65683480199b1bedaf6b7b6ffd1ea085df5eb7a802a328a46056de9cca4
                          • Instruction ID: a203ae2fb13c7a82d1f5b5538e1fc17dc48bc5a6d320ab977225a42453a1f921
                          • Opcode Fuzzy Hash: 3beeb65683480199b1bedaf6b7b6ffd1ea085df5eb7a802a328a46056de9cca4
                          • Instruction Fuzzy Hash: E7214D32718E8596EB04AF15E5802A9A371FB49BD8F444031EB5D07B59DF3CE5AAC340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup
                          • String ID: :
                          • API String ID: 2653869212-336475711
                          • Opcode ID: c45d2b5df72782fbe071d85433256f31729e5d9dc973456252a8fb31e586fa0f
                          • Instruction ID: 1fce08cd559202ee8a96cd69835fbea9919c59a12fe0f78d239c1abeb9526539
                          • Opcode Fuzzy Hash: c45d2b5df72782fbe071d85433256f31729e5d9dc973456252a8fb31e586fa0f
                          • Instruction Fuzzy Hash: D4217126709F8585EB619F14A5403A9B3B0AF88FA8F884131DB9D43794EF3DD45E8720
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$_strdup
                          • String ID: :
                          • API String ID: 2653869212-336475711
                          • Opcode ID: 29095b0568130ff19574d37664a1f083c32f4ce82a8c982ca180f3e9a7676f0e
                          • Instruction ID: 864ace19af9b8b4d3bf6cbf90f0f31f673eaf75582d9ca4de79b9c075b3b6bad
                          • Opcode Fuzzy Hash: 29095b0568130ff19574d37664a1f083c32f4ce82a8c982ca180f3e9a7676f0e
                          • Instruction Fuzzy Hash: 97115026A09F8585EB659F14E540369B3B0AF48FB8F984131CB9D42294EF39D45E8724
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s%s$LIST "%s" *
                          • API String ID: 0-1744359683
                          • Opcode ID: 1af52120106a868a9372dbe0ca81eb65224baaacbdbe3db127230b2b1f3d1b57
                          • Instruction ID: 0a8203b11349dc984bd66ee56853a44393602ebfb48b841b677197f8e6a5eb45
                          • Opcode Fuzzy Hash: 1af52120106a868a9372dbe0ca81eb65224baaacbdbe3db127230b2b1f3d1b57
                          • Instruction Fuzzy Hash: 59115C21B09A4281EB55AF55E5402B8A3B0EF4CBE8F885032EA0D47755DF2CE59FC360
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfreemalloc
                          • String ID: Start Date: %s$Start Date
                          • API String ID: 3985033223-2389359183
                          • Opcode ID: d2b1c00b909e20b890fb4e0062d983d5fb97e338349e4fc37108598f20f61b8a
                          • Instruction ID: 0f164ee2ac7872eeeb752b04d5afdb3b96bf85835f0eb5c932d98ab578eecba3
                          • Opcode Fuzzy Hash: d2b1c00b909e20b890fb4e0062d983d5fb97e338349e4fc37108598f20f61b8a
                          • Instruction Fuzzy Hash: 3D019251B0CA8245EB15BF1154101F5A7B2AF4E7ECFC80431D90E17651EF3CA55EC321
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: strchr$mallocmemcpy
                          • String ID:
                          • API String ID: 320687583-0
                          • Opcode ID: 43d33f69d7b46d77ad51b196039b478be65aab803770c5cab441e8a8604720a2
                          • Instruction ID: 13938c949d8ef688b8cca73fc262348003fbca79ee49cef36b2012ebffdccc34
                          • Opcode Fuzzy Hash: 43d33f69d7b46d77ad51b196039b478be65aab803770c5cab441e8a8604720a2
                          • Instruction Fuzzy Hash: 64219111A1DE9241EE55AF1161502B9E6E19F88FECF8C8171EE9D277C6EE1CE40F8220
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 2b03602e1434e0c29793a06970333b697ab7929545fddd4927f1f9923a5339dc
                          • Instruction ID: 1d55ea3b0a4c8a8d086b507beaee5ecd58048924606a3b45810d9fb0d2ab2161
                          • Opcode Fuzzy Hash: 2b03602e1434e0c29793a06970333b697ab7929545fddd4927f1f9923a5339dc
                          • Instruction Fuzzy Hash: 99117236A05E41C6DB44AF25E99412CB3B4FF88FA9B444136DA4E46768CF38D8AAC750
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: Resolving timed out after %I64d milliseconds
                          • API String ID: 0-3343404259
                          • Opcode ID: 958c1c72430a9759cd60c7a8016d4a664ab8b5720951585b51dc72d3751e759c
                          • Instruction ID: 17f0ca0615b27188b359b664851ef703a1db4b65375a3d548123377dbcf2ed47
                          • Opcode Fuzzy Hash: 958c1c72430a9759cd60c7a8016d4a664ab8b5720951585b51dc72d3751e759c
                          • Instruction Fuzzy Hash: E5B18631A08A4285FB68BE29945527DA3B1EF49FECF9C4432C90E476D5DE39E44EC360
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy__std_exception_destroy
                          • String ID:
                          • API String ID: 2138705365-0
                          • Opcode ID: ef30f342f18779cefc098feeeec0a8cf56bb7c21243c1b935969be8fd67687eb
                          • Instruction ID: e3c210e07568021a128dc16eb6102ae33a2a0b72488696af3d926c0195ccadfa
                          • Opcode Fuzzy Hash: ef30f342f18779cefc098feeeec0a8cf56bb7c21243c1b935969be8fd67687eb
                          • Instruction Fuzzy Hash: E1814CB2A04E8191EB04AF29E48436CA375FF48BDCF944032D64D06A69EF79D89EC350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: calloc$free
                          • String ID: chunked
                          • API String ID: 171065143-1066005980
                          • Opcode ID: 08834f5897146e599e02c0f443a288e628c1ae88f281425fd47e4f998475c843
                          • Instruction ID: 3b577a9452a178ea6f8c8c74d6efc6dff2c680d4c7bfc4dd42780b28777508ba
                          • Opcode Fuzzy Hash: 08834f5897146e599e02c0f443a288e628c1ae88f281425fd47e4f998475c843
                          • Instruction Fuzzy Hash: CD519521E08E5645FA61AF1999103B9A2B1AF18BE8FCC8031DE5E57785DF2CE55F8320
                          APIs
                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,00007FF719781080), ref: 00007FF71978D5B4
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF719781080), ref: 00007FF71978D604
                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,00007FF719781080), ref: 00007FF71978D60E
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71978D657
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: ef819783ac6dfb46507127db48b59a69ac1ddc65704f51fb471b12a656be0a33
                          • Instruction ID: f36d00c9962bbf748d953ac67e493dd4bb5b089efa780a54dd680a62f93994bd
                          • Opcode Fuzzy Hash: ef819783ac6dfb46507127db48b59a69ac1ddc65704f51fb471b12a656be0a33
                          • Instruction Fuzzy Hash: F24179A1B04E4591EA14EF16A105169E2A1BF48BFCF944632DA7D17BD8EE3CE04EC310
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a2d3acb32eebbc79a8bec8fd58dc6768f7c9206479ae4f4a2d70295e399ff8a4
                          • Instruction ID: 863bce878dc439581178a034cc6ea248a07d35815a247324a050f1974e243c62
                          • Opcode Fuzzy Hash: a2d3acb32eebbc79a8bec8fd58dc6768f7c9206479ae4f4a2d70295e399ff8a4
                          • Instruction Fuzzy Hash: 2E514E32608E8185DB509F29E45536DF7B4FB88BE8F944136DA9D837A8EF28C44DC710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                          • String ID:
                          • API String ID: 1155477157-0
                          • Opcode ID: 9ae1c0818c19189228e5ea369b6cef65982f92858fa4cc59376554a8a1e91e6b
                          • Instruction ID: 132cd2f4e5f0e17385d064a16e77292d770686d951b6dda3e2cf33a2d0e9f1cf
                          • Opcode Fuzzy Hash: 9ae1c0818c19189228e5ea369b6cef65982f92858fa4cc59376554a8a1e91e6b
                          • Instruction Fuzzy Hash: 31310362B19E8688FA14BE15A505378D261AF09FFCF940531DA2D077C5DE3CE48F8360
                          APIs
                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF7197A609F,?,?,00000010,00007FF7197A6B75), ref: 00007FF7197A6355
                          • memset.VCRUNTIME140(?,?,?,?,?,?,?,00007FF7197A609F,?,?,00000010,00007FF7197A6B75), ref: 00007FF7197A635E
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF7197A609F,?,?,00000010,00007FF7197A6B75), ref: 00007FF7197A6363
                          • _invalid_parameter_noinfo.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF7197A609F,?,?,00000010,00007FF7197A6B75), ref: 00007FF7197A636F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errno_invalid_parameter_noinfomemcpymemset
                          • String ID:
                          • API String ID: 187659361-0
                          • Opcode ID: 9dba31419a1e83dc60b0d81ee1b1de2dd0c47819ee3d89dbf19d3a9d81a6ed50
                          • Instruction ID: 564a148e54da7ea7197b824225e50f20682fa40a4c79ef68d53f22b8220d9660
                          • Opcode Fuzzy Hash: 9dba31419a1e83dc60b0d81ee1b1de2dd0c47819ee3d89dbf19d3a9d81a6ed50
                          • Instruction Fuzzy Hash: 84415B36B09E4582DA04AF2AE44422DB7B0FB88FA8F598125DB6C03795CF3CD49AC750
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF7197D02D0,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF7197ECC33
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197ECCBC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: %s
                          • API String ID: 1294909896-3043279178
                          • Opcode ID: 1b2b18801062c11d61c8b2f7972cf702da7d30a9b1e5781ad466eae7cb750bbb
                          • Instruction ID: 0b43e23c6de41ae38560d3951633b5d81520163e8b786eb9c77d0e78dce4945b
                          • Opcode Fuzzy Hash: 1b2b18801062c11d61c8b2f7972cf702da7d30a9b1e5781ad466eae7cb750bbb
                          • Instruction Fuzzy Hash: C7416226A08B4582E651EF15A4401AAB3A0FB49BE8F484134DF8E47BA5DF38E19A8710
                          APIs
                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,00007FF71978BE19,?,?,00000004,00007FF7197829A4), ref: 00007FF71978D33C
                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,00007FF71978BE19,?,?,00000004,00007FF7197829A4), ref: 00007FF71978D370
                          • memcpy.VCRUNTIME140(?,?,00000000,?,?,00007FF71978BE19,?,?,00000004,00007FF7197829A4), ref: 00007FF71978D37A
                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71978D3A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                          • String ID:
                          • API String ID: 1775671525-0
                          • Opcode ID: 33cbdc669a6ecce8d7c4dfee12642a7b3cc1941b68a243084cfef76afc258c93
                          • Instruction ID: b57eb14a97868eb93ee7e99d892b57df6f7822960039178a080587559f9b8b38
                          • Opcode Fuzzy Hash: 33cbdc669a6ecce8d7c4dfee12642a7b3cc1941b68a243084cfef76afc258c93
                          • Instruction Fuzzy Hash: 50319261B19E8195EE20BF16A1052ADE371AF09BF8F940631DA6D07BD5DE3CE14E8310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: MW1
                          • API String ID: 3510742995-937612318
                          • Opcode ID: bc41e70c7875e4183203e2348137900ed34a528d02077f6f12296afcae3cecad
                          • Instruction ID: 8656350104dba4fe68c612b67254bd186786febf121b6fb457cf74acf83786b4
                          • Opcode Fuzzy Hash: bc41e70c7875e4183203e2348137900ed34a528d02077f6f12296afcae3cecad
                          • Instruction Fuzzy Hash: CB316022A08F81C1E710AF25E5452A9E371FB48BD8F984521DF8D17B55DF7CE2AAC350
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197D82B4
                            • Part of subcall function 00007FF7197B8980: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7197B8C25
                            • Part of subcall function 00007FF7197B8980: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7197B8C40
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: fwrite$free
                          • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                          • API String ID: 3468156532-1133524294
                          • Opcode ID: ed0a054de22cf63fc2d2c0b0eea7833e907fe3d26c57b9f4fe24df54473951fc
                          • Instruction ID: dc4834b9c5e496c57dc20701292997a9d2e90f6fd8a1f1d5145ef791f5cb1989
                          • Opcode Fuzzy Hash: ed0a054de22cf63fc2d2c0b0eea7833e907fe3d26c57b9f4fe24df54473951fc
                          • Instruction Fuzzy Hash: CC411A36A08E41C5E710AF26D4441EDA3B0EF48BE8F894032DE5E5B395EE39D44E8721
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: memcpy$Concurrency::cancel_current_task
                          • String ID:
                          • API String ID: 326894585-0
                          • Opcode ID: ad56ab1de2e68881b467226e3986e4b69e72f0cc5c4353fef94bbd3dec8be0f4
                          • Instruction ID: 0aeda04b339676883528ecc9d0ff42bb59652e4ca6c1dffd4af3e3128e6cd14a
                          • Opcode Fuzzy Hash: ad56ab1de2e68881b467226e3986e4b69e72f0cc5c4353fef94bbd3dec8be0f4
                          • Instruction Fuzzy Hash: 8221B262A09F4685EA24BF52B5413B8D160AF097F8F980630DE6D077D6EE7CA58F8310
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B3352
                          • memcpy.VCRUNTIME140 ref: 00007FF7197B338D
                            • Part of subcall function 00007FF7197A86F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197A8705
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7197B33C2
                            • Part of subcall function 00007FF7197A8800: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7197B2DF0), ref: 00007FF7197A8827
                            • Part of subcall function 00007FF7197A8800: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7197B2DF0), ref: 00007FF7197A8833
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$malloc$memcpy
                          • String ID: %s:
                          • API String ID: 901724546-64597662
                          • Opcode ID: 5ad095337469a53f74b6dd5582fc58b64712b76ccb338d76d0a6d0b041f18508
                          • Instruction ID: acfa73ea1c5c5491b03cc8d2fdc83f6645aae60a85a029ce93814232d460130d
                          • Opcode Fuzzy Hash: 5ad095337469a53f74b6dd5582fc58b64712b76ccb338d76d0a6d0b041f18508
                          • Instruction Fuzzy Hash: C6219122A09A8581DB00DF16E9401AAA3B4FF58FF8F880131EE5E47395DE38D54A8350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Start Date: %s$%s%lx$Start Date
                          • API String ID: 1294909896-3519493645
                          • Opcode ID: d982a141fe4fd32179e51179128d4bd32ed23819d210d5562c0bcf4d9157b856
                          • Instruction ID: 5c428f3c01066795a2c461ec49815693aae69b7503e7a020224259f1fabe3e48
                          • Opcode Fuzzy Hash: d982a141fe4fd32179e51179128d4bd32ed23819d210d5562c0bcf4d9157b856
                          • Instruction Fuzzy Hash: 0721C962B08A8245EB25BF2184102F9A7B2AF0E7ECFC84431D90E1B645DE3DA54E8320
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197E5E09,00000000,?,?,00007FF7197E53C6), ref: 00007FF7197E50C9
                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197E5E09,00000000,?,?,00007FF7197E53C6), ref: 00007FF7197E5100
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197E5E09,00000000,?,?,00007FF7197E53C6), ref: 00007FF7197E5112
                          • memcpy.VCRUNTIME140(?,?,?,00007FF7197E5E09,00000000,?,?,00007FF7197E53C6), ref: 00007FF7197E513A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freemallocmemcpyrealloc
                          • String ID:
                          • API String ID: 3881842442-0
                          • Opcode ID: 4083f11bae88e74ee7beb669290e3ba3f7922def87a3684652b932b1c3c7254e
                          • Instruction ID: 531aaec3729b639570c0502b8e9d3689e12637f750ee4a86b8935a96a6a878b6
                          • Opcode Fuzzy Hash: 4083f11bae88e74ee7beb669290e3ba3f7922def87a3684652b932b1c3c7254e
                          • Instruction Fuzzy Hash: A4213B26A0AF85C2DB44DF16E450229A3A0EB48FD8B888031EE5E57759EF38D49A8710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ByteCharErrorLastMultiWide
                          • String ID:
                          • API String ID: 203985260-0
                          • Opcode ID: 2049468764637b44ca22309fe5bdd45d4d164cd133c058965f5059536a419a51
                          • Instruction ID: e84478045054759022c61b2f809d83e825f55d3ad2fefc127586d3aee58e5a3b
                          • Opcode Fuzzy Hash: 2049468764637b44ca22309fe5bdd45d4d164cd133c058965f5059536a419a51
                          • Instruction Fuzzy Hash: FA211A72A18B8187E7109F11A44432EB6B4FB99BE8F540134DB9963B54DF38D44A8B10
                          APIs
                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197B3579,?,?,?,?,00007FF7197B291B), ref: 00007FF7197CE1E8
                          • GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF7197B3579,?,?,?,?,00007FF7197B291B), ref: 00007FF7197CE20E
                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197B3579,?,?,?,?,00007FF7197B291B), ref: 00007FF7197CE22F
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7197B3579,?,?,?,?,00007FF7197B291B), ref: 00007FF7197CE240
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: realloc$EnvironmentVariablefree
                          • String ID:
                          • API String ID: 2828309815-0
                          • Opcode ID: 603f52401b7a4f94860c6ed5cd702b65138d4baa18c7164299371fc2fcd00788
                          • Instruction ID: 94085b05221c9eb9940dd8fbfee2a34868d6aed10898890f9469fafdee86ceed
                          • Opcode Fuzzy Hash: 603f52401b7a4f94860c6ed5cd702b65138d4baa18c7164299371fc2fcd00788
                          • Instruction Fuzzy Hash: 45118F21B1EF4286EA65AF12658033AE1B5EF4CBE4F880534DD4D43B54DE2CE84A8710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$freemalloc
                          • String ID:
                          • API String ID: 2605342592-0
                          • Opcode ID: 6856295598706f4aa715c36a2d27931428d5fbedd846ce095c910ddb88d20117
                          • Instruction ID: f1fb206405a20d12f99a572e51b9e1c93ba91bf65908949f025b843540654376
                          • Opcode Fuzzy Hash: 6856295598706f4aa715c36a2d27931428d5fbedd846ce095c910ddb88d20117
                          • Instruction Fuzzy Hash: 1E115B35B09B418AE710AF62B80412DB7B0EF88FE4B884038DB8D53B14DF38E55A8750
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID: Proxy-Connection: Keep-Alive
                          • API String ID: 1294909896-2835282938
                          • Opcode ID: a789077352957d17ab479c7fa7dd41f6bc0439dcd38ff40c2d6f07100b50b540
                          • Instruction ID: a9375da1c4593adbbfc626f55ed078817efc6cba525b4421a6f9c222d12a3a8d
                          • Opcode Fuzzy Hash: a789077352957d17ab479c7fa7dd41f6bc0439dcd38ff40c2d6f07100b50b540
                          • Instruction Fuzzy Hash: 7F016162F05A4182FB156F55B8403A9A2A09F48BF5F444230DE6D067D4DF2C999E8750
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupfree$strchr
                          • String ID:
                          • API String ID: 1739957132-0
                          • Opcode ID: 8c331c07166a5d943bd5d990b51ea78ce36a87ccf8930224460ce54822e5a6f6
                          • Instruction ID: e0ecaf4ad12b6a269be5d85bb71585c9aad58ada487ed17793245bf153aca46d
                          • Opcode Fuzzy Hash: 8c331c07166a5d943bd5d990b51ea78ce36a87ccf8930224460ce54822e5a6f6
                          • Instruction Fuzzy Hash: 34014061B0EB8146FF99AF1A755413892B09F5CBE8B880074E94E96B58DE2CD89F8710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$CriticalDeleteSectionclosesocket
                          • String ID:
                          • API String ID: 3086658127-0
                          • Opcode ID: 6a3ebfb7eec6cce9feb8e27136b24de4a838a3b93fc4c870f4a2ff287389644f
                          • Instruction ID: ed33f45c34b3549436f4311afca2ba4992d3fb31a782605a5ade699a319c933d
                          • Opcode Fuzzy Hash: 6a3ebfb7eec6cce9feb8e27136b24de4a838a3b93fc4c870f4a2ff287389644f
                          • Instruction Fuzzy Hash: A7015212E19E8283EB04EF31D8201786370FFEDF7CB456331DD6D011A5AF68A1D98210
                          APIs
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7197B9586), ref: 00007FF7197E3144
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _errno
                          • String ID: %lx
                          • API String ID: 2918714741-1448181948
                          • Opcode ID: bcb3027899a3bd5b43b06c100c216ad3aab05f43c4f3940e8de3b1d6ed88832c
                          • Instruction ID: 0f7f7fdacb6b9950b1c276b51cc1f2e9f3e44260cdae5fd261ebab7479229a66
                          • Opcode Fuzzy Hash: bcb3027899a3bd5b43b06c100c216ad3aab05f43c4f3940e8de3b1d6ed88832c
                          • Instruction Fuzzy Hash: B4814E22A0C5D285EB659E25945063DFBF0FF897E8F544239E69E622C0DE3CD44EC710
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF7197CE973), ref: 00007FF7197CF062
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF7197CE973), ref: 00007FF7197CF0B3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupmalloc
                          • String ID: (){ %*]
                          • API String ID: 3515966317-731572209
                          • Opcode ID: 8f7694c9cd0a0ee4e450a6bbd6317877bd449a36409b03c2b89570ff87c8727f
                          • Instruction ID: 0a6f6808944d849f673733a4f1308f45f2d03a867be913c928eff285abb87493
                          • Opcode Fuzzy Hash: 8f7694c9cd0a0ee4e450a6bbd6317877bd449a36409b03c2b89570ff87c8727f
                          • Instruction Fuzzy Hash: 4F31161291DE8744FB626F116040375ABE1AF5ABFCFD44131DA8E033C6CE2DA98F8221
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: _strdupmalloc
                          • String ID: identity
                          • API String ID: 3515966317-1788209604
                          • Opcode ID: feb86175fef0f71ebeacd7b899c94d9fd6ae3fb3f794f5a5b662746285d29ca7
                          • Instruction ID: d3a08136fdb72cceeb286204bde92802c10c551952ac0c005ba2a3ed4cb8efcf
                          • Opcode Fuzzy Hash: feb86175fef0f71ebeacd7b899c94d9fd6ae3fb3f794f5a5b662746285d29ca7
                          • Instruction Fuzzy Hash: FF318361E09E9681EB119F19D940375A7B0EF58BFCF888231CE2E17795EE2CD51E8310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: mallocrealloc
                          • String ID:
                          • API String ID: 948496778-3916222277
                          • Opcode ID: a64c936502f876d28fb7be1aba1d87b64db1183e85868f469c01bb970dc8107f
                          • Instruction ID: f8bdb5793011da36e37b2dd6274b272a8424fbea87ca2e3d341d31483d8fc3e6
                          • Opcode Fuzzy Hash: a64c936502f876d28fb7be1aba1d87b64db1183e85868f469c01bb970dc8107f
                          • Instruction Fuzzy Hash: D6119372A0AF8181DB459F15E550229B3B1FB4CFE8F884135EA5E47798EF38D89AC350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: getsockoptsetsockopt
                          • String ID: @
                          • API String ID: 194641219-2726393805
                          • Opcode ID: 69e0e99b5c37d9449c9aefcc0651eb50d32ebac4eec04080a766398f068a9fa9
                          • Instruction ID: 1c3e865cfb0ea7d8029f6293c0683da6bcbaabd25b0a6c9d52cd2131b0badcca
                          • Opcode Fuzzy Hash: 69e0e99b5c37d9449c9aefcc0651eb50d32ebac4eec04080a766398f068a9fa9
                          • Instruction Fuzzy Hash: EB11637160854286F720AF50E405275F7B0EF99799F940030EA5D06694DB7DD55ECB10
                          APIs
                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,mw1 chair,00007FF7197A221B), ref: 00007FF7197A7115
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,mw1 chair,00007FF7197A221B), ref: 00007FF7197A712B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: freerealloc
                          • String ID: mw1 chair
                          • API String ID: 786099813-2267673244
                          • Opcode ID: def7c55abe833da2d1690067e4f316c47b7efd82955140958593ec220db22e25
                          • Instruction ID: dff2a8660f14ed42a8acbd01bbcb865c9b58d27d44b9be88bcbf8a4fc9095add
                          • Opcode Fuzzy Hash: def7c55abe833da2d1690067e4f316c47b7efd82955140958593ec220db22e25
                          • Instruction Fuzzy Hash: E4E01211B1AB8181EE559F02B904025D2B0AF5CFE4F4C4070EE4D07B14DE2CD49B8710
                          APIs
                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7197E2318), ref: 00007FF7197EF211
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7197E2318), ref: 00007FF7197EF224
                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7197E2318), ref: 00007FF7197EF24B
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7197E2318), ref: 00007FF7197EF258
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$freemalloc
                          • String ID:
                          • API String ID: 2605342592-0
                          • Opcode ID: d0f1642345a1695d252b89921160b6acbb798d8fdb281f30b466b378d28530ab
                          • Instruction ID: aeb1bb20f9fe5b860ea72d36cbc7535ed392f2fa08c582bda65327567e59b5d6
                          • Opcode Fuzzy Hash: d0f1642345a1695d252b89921160b6acbb798d8fdb281f30b466b378d28530ab
                          • Instruction Fuzzy Hash: 56117725B08B4182EB10DF56F84003AE6B4EF8CBE8B880535DB5C57BA4DF3CD54A8710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free$memset
                          • String ID:
                          • API String ID: 2717317152-0
                          • Opcode ID: 57cad7ea430cab819a1f346e04c4a5446da803304ae885c752c395315350f6f9
                          • Instruction ID: 7048dac4d74e8a706ea47c9025616da71ad67a25365db551e35f592e6d64f878
                          • Opcode Fuzzy Hash: 57cad7ea430cab819a1f346e04c4a5446da803304ae885c752c395315350f6f9
                          • Instruction Fuzzy Hash: 1A210C32E14B9193E704DF22D6502A8A370FB99B54F559225EB9D43A51DF74F1FAC300
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 0f232e06f22b44954997fabda13f018f6877ddd9f8c22ba8cc440ed84e9eb8b9
                          • Instruction ID: d1c27a2e4455e32139918574e218d15919f992dbe9678063b3385d88f9bcd864
                          • Opcode Fuzzy Hash: 0f232e06f22b44954997fabda13f018f6877ddd9f8c22ba8cc440ed84e9eb8b9
                          • Instruction Fuzzy Hash: 9711EF36E09E4185EB54AF25E85023CA3B4FF98FA8F544031DA4E42764CE3CD85E8750
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: d9fc0dafa36eeb8547900e43abaec9d8ac2fa0d416f996b62de7c6423f221789
                          • Instruction ID: e91409c2b04292c0d5718510f729f1f79dbab08e3608d4f33af3d94c85c9ecd2
                          • Opcode Fuzzy Hash: d9fc0dafa36eeb8547900e43abaec9d8ac2fa0d416f996b62de7c6423f221789
                          • Instruction Fuzzy Hash: D511E936A05E45C6D7409F25E580268B3B4FB88FA8F484035DF8E57628CF38E8AAC750
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699306057.00007FF719781000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF719780000, based on PE: true
                          • Associated: 00000000.00000002.1699290060.00007FF719780000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699353486.00007FF7197F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699386492.00007FF719810000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699450541.00007FF719812000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff719780000_SecuriteInfo.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 4d6ad8114966ce1c178f6473bb2adf4280ef40217638cbeed137c53cc562f174
                          • Instruction ID: a3023e4145cb746e33259c52618a382f545a3b83c8a71aa099bc102c574e2d0d
                          • Opcode Fuzzy Hash: 4d6ad8114966ce1c178f6473bb2adf4280ef40217638cbeed137c53cc562f174
                          • Instruction Fuzzy Hash: A4F0B636A05F01C6DB449F25E994028B3B4FB98FA87514131DA5E42764CF38C5AAC750