Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AimPrivStoreAtt117.exe

Overview

General Information

Sample name:AimPrivStoreAtt117.exe
Analysis ID:1590900
MD5:199e093792c0a0c91233709796553e3c
SHA1:3046ad48ef9e69c4482b58e89f2d6573e2e75793
SHA256:cbb3e224ed616e62f2a81dedd1d88a7b1c3dfe318372506364662cadb73353c6
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • AimPrivStoreAtt117.exe (PID: 3536 cmdline: "C:\Users\user\Desktop\AimPrivStoreAtt117.exe" MD5: 199E093792C0A0C91233709796553E3C)
    • conhost.exe (PID: 5852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4688 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1656 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5260 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2804 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3480 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 4320 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6224 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1240 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5780 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5860 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 652 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 5352 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 3012 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6768 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6204 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3176 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1436 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2788 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5004 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 3560 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 4564 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5012 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 7124 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1200 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3160 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 4616 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6536 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1656 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6256 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 4352 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 892 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1816 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6612 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: AimPrivStoreAtt117.exeVirustotal: Detection: 60%Perma Link
Source: AimPrivStoreAtt117.exeReversingLabs: Detection: 63%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.5% probability
Source: AimPrivStoreAtt117.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F677A87D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF7F677A87D
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F679D780 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7F679D780
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F679F870 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7F679F870
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6796410 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF7F6796410
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6796D30 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF7F6796D30
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F677CB50 CryptHashData,0_2_00007FF7F677CB50
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F677CB60 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7F677CB60
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6779B70 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF7F6779B70
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6779C40 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7F6779C40
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F677CB00 CryptAcquireContextA,CryptCreateHash,0_2_00007FF7F677CB00
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF7F675FA20
Source: AimPrivStoreAtt117.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF7F6789440
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: AimPrivStoreAtt117.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Aim\x64\Release\EpicGames.pdb source: AimPrivStoreAtt117.exe
Source: Binary string: 2D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Aim\x64\Release\EpicGames.pdb source: AimPrivStoreAtt117.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6766810 malloc,recv,send,WSAGetLastError,0_2_00007FF7F6766810
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: AimPrivStoreAtt117.exeString found in binary or memory: http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exe
Source: AimPrivStoreAtt117.exeString found in binary or memory: http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exeC:
Source: AimPrivStoreAtt117.exeString found in binary or memory: http://167.114.85.75/aimhvcionattprivatestore674.exe
Source: AimPrivStoreAtt117.exeString found in binary or memory: http://167.114.85.75/aimhvcionattprivatestore674.exeC:
Source: AimPrivStoreAtt117.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: AimPrivStoreAtt117.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571877A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.cc/panel/bronkzware/Loader
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571874C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571874C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/emin
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571874C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/m
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmp, AimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571874C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571874C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/ESSOR
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F679D780 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7F679D780
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F677A87D0_2_00007FF7F677A87D
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67686000_2_00007FF7F6768600
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67672C00_2_00007FF7F67672C0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67692C00_2_00007FF7F67692C0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F676FED00_2_00007FF7F676FED0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6751E700_2_00007FF7F6751E70
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6751AD00_2_00007FF7F6751AD0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F679F8000_2_00007FF7F679F800
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F674977B0_2_00007FF7F674977B
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F679D7800_2_00007FF7F679D780
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67517800_2_00007FF7F6751780
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F674959D0_2_00007FF7F674959D
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67786000_2_00007FF7F6778600
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67964100_2_00007FF7F6796410
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67853300_2_00007FF7F6785330
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F674D3400_2_00007FF7F674D340
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67731D00_2_00007FF7F67731D0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F676A1800_2_00007FF7F676A180
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67592D00_2_00007FF7F67592D0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67410000_2_00007FF7F6741000
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6760F400_2_00007FF7F6760F40
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6775D200_2_00007FF7F6775D20
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6790EC00_2_00007FF7F6790EC0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F674DED00_2_00007FF7F674DED0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6791EF00_2_00007FF7F6791EF0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F677CF100_2_00007FF7F677CF10
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6789E600_2_00007FF7F6789E60
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F678DB600_2_00007FF7F678DB60
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F674AC3D0_2_00007FF7F674AC3D
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F674EC600_2_00007FF7F674EC60
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6763C700_2_00007FF7F6763C70
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F677A93C0_2_00007FF7F677A93C
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F677A9450_2_00007FF7F677A945
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7F6753970 appears 49 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7F67696F0 appears 46 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7F6760B80 appears 70 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7F676AC70 appears 33 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7F676ABE0 appears 37 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7F6766430 appears 323 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7F676AD50 appears 34 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7F67662B0 appears 381 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7F67697C0 appears 36 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7F67A0B9C appears 47 times
Source: classification engineClassification label: mal56.evad.winEXE@67/18@1/2
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F675279A FormatMessageA,strchr,_errno,_errno,GetLastError,SetLastError,0_2_00007FF7F675279A
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5852:120:WilError_03
Source: AimPrivStoreAtt117.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: AimPrivStoreAtt117.exeVirustotal: Detection: 60%
Source: AimPrivStoreAtt117.exeReversingLabs: Detection: 63%
Source: AimPrivStoreAtt117.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\AimPrivStoreAtt117.exe "C:\Users\user\Desktop\AimPrivStoreAtt117.exe"
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: AimPrivStoreAtt117.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: AimPrivStoreAtt117.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Aim\x64\Release\EpicGames.pdb source: AimPrivStoreAtt117.exe
Source: Binary string: 2D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Aim\x64\Release\EpicGames.pdb source: AimPrivStoreAtt117.exe
Source: AimPrivStoreAtt117.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: AimPrivStoreAtt117.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: AimPrivStoreAtt117.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: AimPrivStoreAtt117.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: AimPrivStoreAtt117.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67692C0 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF7F67692C0
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeWindow / User API: threadDelayed 3335Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeWindow / User API: threadDelayed 6633Jump to behavior
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 3561Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-48005
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeAPI coverage: 5.2 %
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exe TID: 2928Thread sleep time: -166750s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exe TID: 2928Thread sleep time: -331650s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571874C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67A06AC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7F67A06AC
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67A0A48 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF7F67A0A48
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67692C0 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF7F67692C0
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67A0854 SetUnhandledExceptionFilter,0_2_00007FF7F67A0854
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67A06AC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7F67A06AC
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67A03B4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7F67A03B4
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67A08C4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7F67A08C4
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F67753A0 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF7F67753A0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6785330 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF7F6785330
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F6767F70 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF7F6767F70
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F678C090 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF7F678C090
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7F678BE35 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF7F678BE35
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets3
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590900 Sample: AimPrivStoreAtt117.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 56 33 keyauth.win 2->33 39 Multi AV Scanner detection for submitted file 2->39 41 Machine Learning detection for sample 2->41 43 AI detected suspicious sample 2->43 8 AimPrivStoreAtt117.exe 1 2->8         started        signatures3 process4 dnsIp5 35 keyauth.win 104.26.0.5, 443, 49708 CLOUDFLARENETUS United States 8->35 37 127.0.0.1 unknown unknown 8->37 11 cmd.exe 1 8->11         started        13 cmd.exe 1 8->13         started        15 cmd.exe 1 8->15         started        17 16 other processes 8->17 process6 process7 19 taskkill.exe 1 11->19         started        21 sc.exe 1 13->21         started        23 sc.exe 1 15->23         started        25 taskkill.exe 1 17->25         started        27 taskkill.exe 1 17->27         started        29 taskkill.exe 1 17->29         started        31 9 other processes 17->31

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
AimPrivStoreAtt117.exe61%VirustotalBrowse
AimPrivStoreAtt117.exe63%ReversingLabsWin64.Trojan.Generic
AimPrivStoreAtt117.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exeC:0%Avira URL Cloudsafe
http://167.114.85.75/aimhvcionattprivatestore674.exe0%Avira URL Cloudsafe
https://keyauth.cc/panel/bronkzware/Loader0%Avira URL Cloudsafe
http://167.114.85.75/aimhvcionattprivatestore674.exeC:0%Avira URL Cloudsafe
http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exe0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.1/false
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exeAimPrivStoreAtt117.exefalse
      • Avira URL Cloud: safe
      unknown
      http://167.114.85.75/aimhvcionattprivatestore674.exeAimPrivStoreAtt117.exefalse
      • Avira URL Cloud: safe
      unknown
      https://keyauth.win/api/1.1/eminAimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571874C000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://167.114.85.75/aimhvcionattprivatestore674.exeC:AimPrivStoreAtt117.exefalse
        • Avira URL Cloud: safe
        unknown
        https://keyauth.win/api/1.2/ESSORAimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571874C000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exeC:AimPrivStoreAtt117.exefalse
          • Avira URL Cloud: safe
          unknown
          https://keyauth.win/api/1.1/mAimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571874C000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://curl.haxx.se/docs/http-cookies.htmlAimPrivStoreAtt117.exefalse
              high
              https://curl.haxx.se/docs/http-cookies.html#AimPrivStoreAtt117.exefalse
                high
                https://keyauth.cc/panel/bronkzware/LoaderAimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571877A000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://keyauth.win/api/1.2/AimPrivStoreAtt117.exe, 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmp, AimPrivStoreAtt117.exe, 00000000.00000002.3331028031.000001571874C000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.26.0.5
                  keyauth.winUnited States
                  13335CLOUDFLARENETUSfalse
                  IP
                  127.0.0.1
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1590900
                  Start date and time:2025-01-14 16:44:14 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 45s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:38
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:AimPrivStoreAtt117.exe
                  Detection:MAL
                  Classification:mal56.evad.winEXE@67/18@1/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 48
                  • Number of non-executed functions: 232
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  TimeTypeDescription
                  10:45:48API Interceptor200943x Sleep call for process: AimPrivStoreAtt117.exe modified
                  10:47:04API Interceptor439x Sleep call for process: conhost.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  104.26.0.5B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                    B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                      ak3o7AZ3mH.exeGet hashmaliciousBabadeda, Conti, MimikatzBrowse
                        IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                          IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                            dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                              file.exeGet hashmaliciousUnknownBrowse
                                IAdjMfB2A5.exeGet hashmaliciousXWormBrowse
                                  SecuriteInfo.com.Win64.Evo-gen.9614.31304.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.W64.GenKryptik.GHEK.tr.25144.16407.exeGet hashmaliciousUnknownBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      keyauth.winB06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      ak3o7AZ3mH.exeGet hashmaliciousBabadeda, Conti, MimikatzBrowse
                                      • 104.26.0.5
                                      Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUSConfirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 104.21.64.1
                                      0dsIoO7xjt.docxGet hashmaliciousUnknownBrowse
                                      • 172.65.251.78
                                      http://wagestream.acemlnb.comGet hashmaliciousUnknownBrowse
                                      • 104.20.0.15
                                      Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                      • 104.18.95.41
                                      Payment_243.jsGet hashmaliciousNetSupport RATBrowse
                                      • 172.67.68.212
                                      Payment_243.jsGet hashmaliciousNetSupport RATBrowse
                                      • 104.26.0.231
                                      http://vionicstore.shopGet hashmaliciousUnknownBrowse
                                      • 104.18.73.116
                                      http://yourexcellency.activehosted.comGet hashmaliciousUnknownBrowse
                                      • 104.17.25.14
                                      https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                      • 172.67.197.240
                                      mWAik6b.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                      • 172.67.150.129
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0eConfirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 104.26.0.5
                                      Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                      • 104.26.0.5
                                      http://vionicstore.shopGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      q9JZUaS1Gy.docGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      TiOWA908TP.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      https://www.tiktok.com/link/v2?aid=1988&lang=en&scene=bio_url&target=https%3A%2F%2Fgoogle.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%253Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3D.%2F%2F%2F%2Famp%2Fs%2Fmessagupdates.courtfilepro.com%2FVTtMaGet hashmaliciousHTMLPhisherBrowse
                                      • 104.26.0.5
                                      TiOWA908TP.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      No context
                                      Process:C:\Users\user\Desktop\AimPrivStoreAtt117.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):302
                                      Entropy (8bit):3.591458873507413
                                      Encrypted:false
                                      SSDEEP:3:rRRqmIEaGj3F/9Dqa+U4W42oJXTIFNBh2To3G3oJXTIFNBhWXqowvxOwVGt:H041lqABhHfABhwcV4
                                      MD5:2093ABDC1CC5C502980BCE5F4F8897A7
                                      SHA1:23552E512460D3CC05A91E5491BF3ADCD9AB8568
                                      SHA-256:6B1550C3CDBCADFC23C19F432C52168C41BF0B54784962910391352D800ECDA5
                                      SHA-512:6E6C2E4E350921C2F8070E2B47FF1B056AEC8102CDA839B7288B578F7C86791C50DAE291568948C6E759801018BDFF48023FD856DDF56FF1D07F7E8BD21402F3
                                      Malicious:false
                                      Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[1] Iniciar Valorant Aim (HVCI DESLIGADO): ..[2] Iniciar Valorant Aim (HVCI HABILITADO): ....[+] Selecione a opcao:
                                      Process:C:\Windows\System32\cmd.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):44
                                      Entropy (8bit):4.003997527334849
                                      Encrypted:false
                                      SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                      MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                      SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                      SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                      SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                      Malicious:false
                                      Preview:The system cannot find the file specified...
                                      File type:PE32+ executable (console) x86-64, for MS Windows
                                      Entropy (8bit):6.418976746883596
                                      TrID:
                                      • Win64 Executable Console (202006/5) 92.65%
                                      • Win64 Executable (generic) (12005/4) 5.51%
                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                      • DOS Executable Generic (2002/1) 0.92%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:AimPrivStoreAtt117.exe
                                      File size:510'464 bytes
                                      MD5:199e093792c0a0c91233709796553e3c
                                      SHA1:3046ad48ef9e69c4482b58e89f2d6573e2e75793
                                      SHA256:cbb3e224ed616e62f2a81dedd1d88a7b1c3dfe318372506364662cadb73353c6
                                      SHA512:f59dc0b6b5df0889db3819bb57c71bf878ccefaf0107fc1fb0e54a49a161fcb35caadd8cb3995760cc9cf871656d5aa0b6f437d53a9c6a755e74f17167f53c0a
                                      SSDEEP:12288:GXDur8S9+8Qu/y9x2EpL5UcY+6cm3C/pk:6urP93v/C2E19Y+7/pk
                                      TLSH:8FB46D96A7A913E9D1A7C07CC547C603E7B6B4991311DBDB43A0CA791F137E22E3A720
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._...B...PHe.^...PH..v...PH..\...PH..R...PH..P.......A...V...x.......?...9H..T...9H..W...9Hg.W...9H..W...RichV..
                                      Icon Hash:00928e8e8686b000
                                      Entrypoint:0x140060398
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x140000000
                                      Subsystem:windows cui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x677DDF4C [Wed Jan 8 02:13:32 2025 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:0
                                      File Version Major:6
                                      File Version Minor:0
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:0
                                      Import Hash:551e5f19de2baa264d46ee5c6718793c
                                      Instruction
                                      dec eax
                                      sub esp, 28h
                                      call 00007F024508C2C8h
                                      dec eax
                                      add esp, 28h
                                      jmp 00007F024508BC17h
                                      int3
                                      int3
                                      jmp 00007F024508C57Eh
                                      int3
                                      int3
                                      int3
                                      inc eax
                                      push ebx
                                      dec eax
                                      sub esp, 20h
                                      dec eax
                                      mov ebx, ecx
                                      xor ecx, ecx
                                      call dword ptr [00001D6Bh]
                                      dec eax
                                      mov ecx, ebx
                                      call dword ptr [00001D5Ah]
                                      call dword ptr [00001DB4h]
                                      dec eax
                                      mov ecx, eax
                                      mov edx, C0000409h
                                      dec eax
                                      add esp, 20h
                                      pop ebx
                                      dec eax
                                      jmp dword ptr [00001DB0h]
                                      dec eax
                                      mov dword ptr [esp+08h], ecx
                                      dec eax
                                      sub esp, 38h
                                      mov ecx, 00000017h
                                      call dword ptr [00001DA4h]
                                      test eax, eax
                                      je 00007F024508BDA9h
                                      mov ecx, 00000002h
                                      int 29h
                                      dec eax
                                      lea ecx, dword ptr [00019462h]
                                      call 00007F024508BF6Eh
                                      dec eax
                                      mov eax, dword ptr [esp+38h]
                                      dec eax
                                      mov dword ptr [00019549h], eax
                                      dec eax
                                      lea eax, dword ptr [esp+38h]
                                      dec eax
                                      add eax, 08h
                                      dec eax
                                      mov dword ptr [000194D9h], eax
                                      dec eax
                                      mov eax, dword ptr [00019532h]
                                      dec eax
                                      mov dword ptr [000193A3h], eax
                                      dec eax
                                      mov eax, dword ptr [esp+40h]
                                      dec eax
                                      mov dword ptr [000194A7h], eax
                                      mov dword ptr [0001937Dh], C0000409h
                                      mov dword ptr [00019377h], 00000001h
                                      mov dword ptr [00000081h], 00000000h
                                      Programming Language:
                                      • [IMP] VS2008 SP1 build 30729
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x773180x1cc.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7f0000x1e8.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7a0000x405c.pdata
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x800000x4ec.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x710800x70.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x711000x28.rdata
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x70f400x140.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x620000x858.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x607180x60800602f1089df07ef344959cfe41447af2cFalse0.5326414750647669data6.334775760528484IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x620000x16ec40x1700034b296da2f473d4b9bd8f08336dcff29False0.37954313858695654data5.599267697230251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x790000xe080x4005b070ba4bf716bd9abd9429588bdb3edFalse0.21484375data2.448207517753268IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .pdata0x7a0000x405c0x420012d13dd91b54cb2b26af3136bc3f645dFalse0.4738991477272727data5.697151102004698IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .rsrc0x7f0000x1e80x2009682c2bd23621eded0bee00be928ba8fFalse0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x800000x4ec0x60043a6897ca7133ec62c7e8be294ec97b7False0.5162760416666666data4.831811206446416IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_MANIFEST0x7f0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                      DLLImport
                                      KERNEL32.dllReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, WideCharToMultiByte, RtlCaptureContext, GetModuleHandleA, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, FreeLibrary, GetSystemDirectoryA, QueryPerformanceFrequency, VerSetConditionMask, SleepEx, GetEnvironmentVariableA, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, DeleteCriticalSection, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileType, MultiByteToWideChar, WaitForSingleObjectEx, MoveFileExA, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, LeaveCriticalSection, GetSystemTimeAsFileTime, GetProcAddress, GetLastError, InitializeCriticalSectionEx, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, SetConsoleScreenBufferInfoEx, GetConsoleScreenBufferInfoEx, SetConsoleMode, GetConsoleMode, Sleep, RtlLookupFunctionEntry, GetStdHandle, OutputDebugStringW, InitializeSListHead
                                      USER32.dllMessageBoxA, MoveWindow, GetWindowRect, GetWindowLongA, SetWindowLongA
                                      ADVAPI32.dllCryptEncrypt, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey
                                      SHELL32.dllShellExecuteA
                                      MSVCP140.dll?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Xlength_error@std@@YAXPEBD@Z, _Thrd_detach, _Cnd_do_broadcast_at_thread_exit, ?_Throw_Cpp_error@std@@YAXH@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?_Random_device@std@@YAIXZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                      urlmon.dllURLDownloadToFileA
                                      Normaliz.dllIdnToAscii
                                      WLDAP32.dll
                                      CRYPT32.dllCertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertOpenStore, CertCloseStore
                                      WS2_32.dllntohl, gethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, __WSAFDIsSet, ioctlsocket, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, listen
                                      VCRUNTIME140.dll__std_exception_destroy, __std_exception_copy, memcpy, memcmp, _CxxThrowException, __std_terminate, __C_specific_handler, strchr, __current_exception_context, strrchr, __current_exception, memchr, memset, strstr, memmove
                                      VCRUNTIME140_1.dll__CxxFrameHandler4
                                      api-ms-win-crt-runtime-l1-1-0.dll_errno, __sys_nerr, _invalid_parameter_noinfo_noreturn, strerror, exit, _getpid, system, _beginthreadex, _register_thread_local_exe_atexit_callback, terminate, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, _c_exit, _get_initial_narrow_environment, _initterm, _initterm_e, _exit, __p___argv, __p___argc
                                      api-ms-win-crt-heap-l1-1-0.dll_callnewh, calloc, realloc, malloc, _set_new_mode, free
                                      api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, fputc, ftell, _lseeki64, _read, _write, _close, _open, __acrt_iob_func, __stdio_common_vsscanf, fgets, fputs, fopen, fflush, __stdio_common_vsprintf, fread, fclose, _set_fmode, fwrite
                                      api-ms-win-crt-convert-l1-1-0.dllatoi, strtoul, strtoull, strtoll, strtol, strtod
                                      api-ms-win-crt-locale-l1-1-0.dlllocaleconv, _configthreadlocale
                                      api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                      api-ms-win-crt-string-l1-1-0.dllstrpbrk, strcspn, strcmp, strncmp, strncpy, strspn, isupper, tolower, _strdup
                                      api-ms-win-crt-utility-l1-1-0.dllqsort
                                      api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _access, _unlink, _fstat64
                                      api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 14, 2025 16:45:10.843503952 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:45:10.843533993 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:45:10.843638897 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:45:10.855520010 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:45:10.855535984 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:45:11.337727070 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:45:11.337945938 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:45:11.341658115 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:45:11.341679096 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:45:11.341931105 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:45:11.345634937 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:45:11.391324043 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:45:11.575515032 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:45:11.575612068 CET44349708104.26.0.5192.168.2.5
                                      Jan 14, 2025 16:45:11.575659037 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:45:11.584867954 CET49708443192.168.2.5104.26.0.5
                                      Jan 14, 2025 16:45:11.584887028 CET44349708104.26.0.5192.168.2.5
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 14, 2025 16:45:10.825987101 CET5614453192.168.2.51.1.1.1
                                      Jan 14, 2025 16:45:10.838439941 CET53561441.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 14, 2025 16:45:10.825987101 CET192.168.2.51.1.1.10x78eStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 14, 2025 16:45:10.838439941 CET1.1.1.1192.168.2.50x78eNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                      Jan 14, 2025 16:45:10.838439941 CET1.1.1.1192.168.2.50x78eNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                      Jan 14, 2025 16:45:10.838439941 CET1.1.1.1192.168.2.50x78eNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                      • keyauth.win
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.549708104.26.0.54433536C:\Users\user\Desktop\AimPrivStoreAtt117.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-14 15:45:11 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                      Host: keyauth.win
                                      Accept: */*
                                      Content-Length: 74
                                      Content-Type: application/x-www-form-urlencoded
                                      2025-01-14 15:45:11 UTC74OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 32 2e 36 26 6e 61 6d 65 3d 4c 6f 61 64 65 72 20 50 72 69 6e 63 69 70 61 6c 20 7c 20 50 72 69 76 61 74 65 20 53 74 6f 72 65 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                      Data Ascii: type=init&ver=2.6&name=Loader Principal | Private Store&ownerid=9WIvTVJa9m
                                      2025-01-14 15:45:11 UTC1322INHTTP/1.1 200 OK
                                      Date: Tue, 14 Jan 2025 15:45:11 GMT
                                      Content-Type: application/json; charset=UTF-8
                                      Content-Length: 475
                                      Connection: close
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tdyJEPoB6gy4XcXiJczH5t3IeGokf1XObk0eWdPzJsLjUJqQPHIBeU2KapvJq1Vh8XA%2FeTGunRCwAdf2WFGZC58zzQFiuD56jJULUZqB07eiq%2B1sc%2BAGFdpOXwtY"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Acknowledge: Credit to VaultCord.com
                                      X-Powered-By: VaultCord.com
                                      content-security-policy: upgrade-insecure-requests
                                      permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                      referrer-policy: strict-origin-when-cross-origin
                                      strict-transport-security: max-age=31536000; includeSubDomains
                                      x-content-security-policy: img-src *; media-src * data:;
                                      x-content-type-options: nosniff
                                      x-frame-options: DENY
                                      x-xss-protection: 1; mode=block
                                      Access-Control-Allow-Headers: *
                                      Access-Control-Allow-Methods: *
                                      Access-Control-Allow-Origin: *
                                      Server: cloudflare
                                      CF-RAY: 901ec06e4b615e82-EWR
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1633&min_rtt=1632&rtt_var=615&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2346&recv_bytes=862&delivery_rate=1773997&cwnd=216&unsent_bytes=0&cid=1bda6a38da404f4a&ts=250&x=0"
                                      2025-01-14 15:45:11 UTC47INData Raw: 7b 22 73 75 63 63 65 73 73 22 3a 74 72 75 65 2c 22 63 6f 64 65 22 3a 36 38 2c 22 6d 65 73 73 61 67 65 22 3a 22 49 6e 69 74 69 61 6c 69 7a 65
                                      Data Ascii: {"success":true,"code":68,"message":"Initialize
                                      2025-01-14 15:45:11 UTC428INData Raw: 64 22 2c 22 73 65 73 73 69 6f 6e 69 64 22 3a 22 61 35 35 61 30 63 63 38 22 2c 22 61 70 70 69 6e 66 6f 22 3a 7b 22 6e 75 6d 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4f 6e 6c 69 6e 65 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4b 65 79 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 32 2e 36 22 2c 22 63 75 73 74 6f 6d 65
                                      Data Ascii: d","sessionid":"a55a0cc8","appinfo":{"numUsers":"N/A - Use fetchStats() function in latest example","numOnlineUsers":"N/A - Use fetchStats() function in latest example","numKeys":"N/A - Use fetchStats() function in latest example","version":"2.6","custome


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:10:45:07
                                      Start date:14/01/2025
                                      Path:C:\Users\user\Desktop\AimPrivStoreAtt117.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\AimPrivStoreAtt117.exe"
                                      Imagebase:0x7ff7f6740000
                                      File size:510'464 bytes
                                      MD5 hash:199E093792C0A0C91233709796553E3C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:false

                                      Target ID:1
                                      Start time:10:45:07
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Target ID:2
                                      Start time:10:45:07
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:10:45:07
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff74efb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:5
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff74efb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:7
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:8
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff74efb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:9
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff7b1040000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:11
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:12
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff7b1040000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:13
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:14
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:15
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff74efb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:16
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:17
                                      Start time:10:45:08
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff74efb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:18
                                      Start time:10:45:09
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:19
                                      Start time:10:45:09
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff74efb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:20
                                      Start time:10:45:09
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:21
                                      Start time:10:45:09
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff7b1040000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:22
                                      Start time:10:45:09
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:23
                                      Start time:10:45:10
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff7b1040000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:24
                                      Start time:10:45:10
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff6d64d0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:25
                                      Start time:10:45:10
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:26
                                      Start time:10:45:10
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff74efb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:27
                                      Start time:10:45:11
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:28
                                      Start time:10:45:11
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff74efb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:29
                                      Start time:10:45:11
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:30
                                      Start time:10:45:11
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff74efb0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:31
                                      Start time:10:45:11
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:32
                                      Start time:10:45:11
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff7b1040000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:33
                                      Start time:10:45:11
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:34
                                      Start time:10:45:11
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff7b1040000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:35
                                      Start time:10:45:11
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff61d7f0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:4.8%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:22.8%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:93
                                        execution_graph 47601 7ff7f67580bb 47602 7ff7f67580ce 47601->47602 47603 7ff7f6758187 47602->47603 47606 7ff7f67580d6 47602->47606 47624 7ff7f676c010 47602->47624 47605 7ff7f6758113 47603->47605 47603->47606 47608 7ff7f6757640 292 API calls 47605->47608 47613 7ff7f6757bbb 47606->47613 47703 7ff7f676bec0 free 47606->47703 47608->47613 47609 7ff7f675810d 47609->47603 47609->47605 47609->47606 47644 7ff7f6771c10 47609->47644 47610 7ff7f6758de0 17 API calls 47610->47613 47612 7ff7f6758c62 47613->47610 47613->47612 47614 7ff7f6758c53 47613->47614 47620 7ff7f6757c5e 47613->47620 47662 7ff7f6767b30 47613->47662 47668 7ff7f67662b0 19 API calls 47613->47668 47669 7ff7f6757640 47613->47669 47704 7ff7f6761d70 47613->47704 47728 7ff7f6756360 15 API calls 47613->47728 47729 7ff7f6775b20 22 API calls 47613->47729 47730 7ff7f67662b0 19 API calls 47614->47730 47619 7ff7f67662b0 19 API calls 47619->47620 47620->47613 47620->47619 47625 7ff7f676c05f 47624->47625 47626 7ff7f676c044 47624->47626 47627 7ff7f676c0a1 memset 47625->47627 47631 7ff7f676c065 47625->47631 47626->47625 47740 7ff7f67604b0 47626->47740 47629 7ff7f676c0d3 47627->47629 47633 7ff7f676c12e calloc 47629->47633 47634 7ff7f676c1a6 47629->47634 47731 7ff7f679ff40 47631->47731 47636 7ff7f676c15c 47633->47636 47637 7ff7f676c146 47633->47637 47763 7ff7f676b3c0 404 API calls 47634->47763 47753 7ff7f6766430 47636->47753 47637->47631 47639 7ff7f676c1b6 47641 7ff7f6766430 15 API calls 47639->47641 47642 7ff7f676c1d1 47639->47642 47641->47642 47642->47631 47643 7ff7f676c1db free 47642->47643 47643->47631 47645 7ff7f6771c3c 47644->47645 47646 7ff7f676c010 407 API calls 47645->47646 47650 7ff7f6771c46 47646->47650 47647 7ff7f679ff40 8 API calls 47648 7ff7f6771da2 47647->47648 47648->47603 47649 7ff7f6771d5c 47652 7ff7f6771d76 47649->47652 47653 7ff7f67604b0 255 API calls 47649->47653 47650->47649 47651 7ff7f6771c97 47650->47651 47650->47652 47654 7ff7f67697c0 13 API calls 47651->47654 47652->47647 47653->47652 47655 7ff7f6771d08 calloc 47654->47655 47656 7ff7f6771d27 47655->47656 47657 7ff7f6771d20 47655->47657 48039 7ff7f67722a0 47656->48039 47657->47652 47659 7ff7f6771d36 47659->47652 48049 7ff7f6772050 47659->48049 47663 7ff7f6767b7a 47662->47663 47664 7ff7f676e0f0 2 API calls 47663->47664 47665 7ff7f6767b9a 47663->47665 47664->47665 47666 7ff7f679ff40 8 API calls 47665->47666 47667 7ff7f6767c2e 47666->47667 47667->47613 47668->47613 47670 7ff7f675767c 47669->47670 47696 7ff7f6757752 47669->47696 48099 7ff7f675b890 47670->48099 47672 7ff7f679ff40 8 API calls 47674 7ff7f6757787 47672->47674 47673 7ff7f6757687 free free 47675 7ff7f67576b7 47673->47675 47674->47613 47678 7ff7f67576f5 47675->47678 48127 7ff7f6775600 22 API calls 47675->48127 48117 7ff7f6758de0 47678->48117 47679 7ff7f67577bc 48121 7ff7f676ee60 47679->48121 47680 7ff7f675770f 47680->47679 47680->47696 48128 7ff7f676f820 free free free free 47680->48128 47684 7ff7f67577eb 47685 7ff7f67577f0 free 47684->47685 47685->47685 47686 7ff7f675780e 47685->47686 47687 7ff7f675793b 47686->47687 47689 7ff7f6757877 47686->47689 47688 7ff7f6761d70 90 API calls 47687->47688 47691 7ff7f675796d 47688->47691 47690 7ff7f67697c0 13 API calls 47689->47690 47692 7ff7f67578d6 47690->47692 48132 7ff7f6761ef0 292 API calls 47691->48132 48129 7ff7f675f080 92 API calls 47692->48129 47695 7ff7f67578f7 47697 7ff7f67578fb 47695->47697 47698 7ff7f6757925 47695->47698 47696->47672 47699 7ff7f6766430 15 API calls 47697->47699 48131 7ff7f6761ef0 292 API calls 47698->48131 47701 7ff7f6757916 47699->47701 48130 7ff7f6761ef0 292 API calls 47701->48130 47703->47613 47705 7ff7f6761eac 47704->47705 47707 7ff7f6761d92 47704->47707 47705->47613 47706 7ff7f6761dbf 47708 7ff7f676ee60 9 API calls 47706->47708 47707->47705 47707->47706 48141 7ff7f676f820 free free free free 47707->48141 47710 7ff7f6761dd2 47708->47710 48138 7ff7f6791650 47710->48138 47728->47613 47729->47613 47730->47612 47732 7ff7f679ff49 47731->47732 47733 7ff7f676c205 47732->47733 47734 7ff7f67a03e8 IsProcessorFeaturePresent 47732->47734 47733->47609 47735 7ff7f67a0400 47734->47735 47764 7ff7f67a05dc RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 47735->47764 47737 7ff7f67a0413 47765 7ff7f67a03b4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47737->47765 47741 7ff7f67604d7 47740->47741 47742 7ff7f67604de 47740->47742 47802 7ff7f6760e90 memset 47741->47802 47744 7ff7f6760504 47742->47744 47745 7ff7f676050d 47742->47745 47747 7ff7f6760547 47742->47747 47806 7ff7f67662b0 19 API calls 47744->47806 47766 7ff7f6779730 47745->47766 47784 7ff7f677a3c0 47745->47784 47747->47625 47748 7ff7f6760557 47748->47747 47749 7ff7f6760532 47749->47747 47803 7ff7f67759d0 47749->47803 47754 7ff7f6766439 47753->47754 47755 7ff7f676658e 47753->47755 47762 7ff7f6766509 47754->47762 48034 7ff7f67698c0 13 API calls 47754->48034 47755->47634 47756 7ff7f679ff40 8 API calls 47756->47755 47758 7ff7f676648c 47759 7ff7f67664f1 47758->47759 48035 7ff7f67697c0 47758->48035 47760 7ff7f676653e fwrite fwrite 47759->47760 47759->47762 47760->47762 47762->47756 47763->47639 47764->47737 47767 7ff7f677a3c0 47766->47767 47768 7ff7f677a409 47767->47768 47769 7ff7f6767b30 10 API calls 47767->47769 47780 7ff7f677a43b 47767->47780 47768->47749 47771 7ff7f677a427 47769->47771 47770 7ff7f677a532 47770->47768 47953 7ff7f677bb20 69 API calls 47770->47953 47774 7ff7f677a51c 47771->47774 47807 7ff7f677a5b0 47771->47807 47772 7ff7f6767b30 10 API calls 47772->47780 47952 7ff7f67662b0 19 API calls 47774->47952 47777 7ff7f677a515 47777->47768 47780->47768 47780->47770 47780->47772 47780->47774 47781 7ff7f677a4fd WSAGetLastError 47780->47781 47782 7ff7f677a4ec 47780->47782 47861 7ff7f6776920 47780->47861 47885 7ff7f677b390 47780->47885 47951 7ff7f67662b0 19 API calls 47781->47951 47782->47768 47782->47774 47785 7ff7f677a414 47784->47785 47788 7ff7f677a409 47784->47788 47786 7ff7f6767b30 10 API calls 47785->47786 47798 7ff7f677a43b 47785->47798 47789 7ff7f677a427 47786->47789 47787 7ff7f677a532 47787->47788 48030 7ff7f677bb20 69 API calls 47787->48030 47788->47749 47792 7ff7f677a51c 47789->47792 47794 7ff7f677a5b0 74 API calls 47789->47794 47790 7ff7f6767b30 10 API calls 47790->47798 48029 7ff7f67662b0 19 API calls 47792->48029 47794->47798 47795 7ff7f677a515 47795->47788 47796 7ff7f6776920 19 API calls 47796->47798 47797 7ff7f677b390 254 API calls 47797->47798 47798->47787 47798->47788 47798->47790 47798->47792 47798->47796 47798->47797 47799 7ff7f677a4fd WSAGetLastError 47798->47799 47800 7ff7f677a4ec 47798->47800 48028 7ff7f67662b0 19 API calls 47799->48028 47800->47788 47800->47792 47802->47742 48031 7ff7f676e0f0 47803->48031 47805 7ff7f67759ea 47805->47747 47806->47748 47808 7ff7f677a622 47807->47808 47954 7ff7f6769140 47808->47954 47811 7ff7f677a671 47813 7ff7f677a67a GetModuleHandleA GetProcAddress 47811->47813 47817 7ff7f677a6b8 47811->47817 47812 7ff7f6766430 15 API calls 47812->47811 47814 7ff7f677a69c 47813->47814 47813->47817 47815 7ff7f6769140 14 API calls 47814->47815 47816 7ff7f677a6b0 47815->47816 47816->47817 47818 7ff7f677a715 47817->47818 47819 7ff7f6769140 14 API calls 47817->47819 47823 7ff7f677b047 47818->47823 47830 7ff7f677a863 47818->47830 47820 7ff7f677a711 47819->47820 47820->47818 47821 7ff7f677a722 47820->47821 47979 7ff7f67662b0 19 API calls 47821->47979 47962 7ff7f6778240 47823->47962 47824 7ff7f677b196 47827 7ff7f679ff40 8 API calls 47824->47827 47826 7ff7f677b05c 47828 7ff7f677b06f 47826->47828 47831 7ff7f6778240 13 API calls 47826->47831 47829 7ff7f677b34c 47827->47829 47832 7ff7f6766430 15 API calls 47828->47832 47833 7ff7f677b082 47828->47833 47829->47780 47980 7ff7f67662b0 19 API calls 47830->47980 47831->47828 47832->47833 47836 7ff7f6766430 15 API calls 47833->47836 47838 7ff7f677b0cb 47833->47838 47835 7ff7f677b03e 47835->47823 47835->47824 47836->47838 47837 7ff7f677b12d calloc 47839 7ff7f677b187 47837->47839 47840 7ff7f677b1a0 47837->47840 47838->47837 47981 7ff7f67662b0 19 API calls 47839->47981 47840->47824 47842 7ff7f677b2ac 47840->47842 47843 7ff7f677b209 free 47840->47843 47976 7ff7f6766b70 47842->47976 47844 7ff7f677b23a 47843->47844 47845 7ff7f677b286 47843->47845 47848 7ff7f677b242 47844->47848 47849 7ff7f677b260 47844->47849 47986 7ff7f6752650 22 API calls 47845->47986 47982 7ff7f6752650 22 API calls 47848->47982 47984 7ff7f6752650 22 API calls 47849->47984 47852 7ff7f677b290 47987 7ff7f67662b0 19 API calls 47852->47987 47854 7ff7f677b249 47983 7ff7f67662b0 19 API calls 47854->47983 47855 7ff7f677b26a 47985 7ff7f67662b0 19 API calls 47855->47985 47859 7ff7f677a731 47859->47824 47862 7ff7f6776967 47861->47862 47866 7ff7f677699b 47861->47866 47863 7ff7f6776971 47862->47863 47862->47866 47864 7ff7f677698b Sleep 47863->47864 47865 7ff7f6776978 WSASetLastError 47863->47865 47873 7ff7f6776994 47863->47873 47864->47873 47865->47873 47868 7ff7f6776ae5 47866->47868 47870 7ff7f6776b13 select 47866->47870 47867 7ff7f679ff40 8 API calls 47872 7ff7f6776c4e 47867->47872 47871 7ff7f6776aea 47868->47871 47874 7ff7f6776b06 Sleep 47868->47874 47875 7ff7f6776af3 WSASetLastError 47868->47875 47870->47871 47871->47873 47876 7ff7f6776bb2 __WSAFDIsSet __WSAFDIsSet 47871->47876 47877 7ff7f6776bdc 47871->47877 47872->47780 47873->47867 47874->47871 47875->47871 47876->47877 47878 7ff7f6776be4 __WSAFDIsSet 47877->47878 47884 7ff7f6776c0b 47877->47884 47880 7ff7f6776bfa __WSAFDIsSet 47878->47880 47881 7ff7f6776bf7 47878->47881 47879 7ff7f6776c13 __WSAFDIsSet 47882 7ff7f6776c29 __WSAFDIsSet 47879->47882 47883 7ff7f6776c26 47879->47883 47880->47884 47881->47880 47882->47873 47883->47882 47884->47873 47884->47879 47887 7ff7f677b400 47885->47887 47886 7ff7f677baff 47887->47886 47888 7ff7f677b4a2 47887->47888 47889 7ff7f677b462 malloc 47887->47889 47890 7ff7f677b4a8 malloc 47888->47890 47891 7ff7f677b4f3 47888->47891 47889->47886 47889->47888 47890->47886 47890->47891 47892 7ff7f677b560 47891->47892 47893 7ff7f677b506 realloc 47891->47893 47898 7ff7f677b5a5 47892->47898 48010 7ff7f6766630 recv 47892->48010 47893->47892 47894 7ff7f677b522 47893->47894 48013 7ff7f67662b0 19 API calls 47894->48013 47897 7ff7f677b5ea malloc 47897->47886 47899 7ff7f677b687 memcpy 47897->47899 47898->47897 47902 7ff7f677b7fa 47898->47902 47907 7ff7f677b531 47898->47907 47900 7ff7f677b6a7 free 47899->47900 47899->47907 47906 7ff7f677b719 47900->47906 47900->47907 47901 7ff7f679ff40 8 API calls 47903 7ff7f677b54d 47901->47903 48014 7ff7f67662b0 19 API calls 47902->48014 47903->47780 47908 7ff7f677ba8c 47906->47908 47910 7ff7f677b83d 47906->47910 47924 7ff7f677b738 47906->47924 47907->47901 47908->47907 47909 7ff7f677ba9a 47908->47909 48026 7ff7f6752650 22 API calls 47909->48026 47912 7ff7f677b846 47910->47912 47913 7ff7f677b884 47910->47913 47912->47909 47915 7ff7f677b853 47912->47915 48017 7ff7f6752650 22 API calls 47913->48017 47914 7ff7f677baaf 48027 7ff7f67662b0 19 API calls 47914->48027 48015 7ff7f6752650 22 API calls 47915->48015 47919 7ff7f677b7a4 47928 7ff7f677b7d0 memcpy 47919->47928 47930 7ff7f677b8d8 47919->47930 47920 7ff7f677b89b 48018 7ff7f67662b0 19 API calls 47920->48018 47921 7ff7f6766b70 48 API calls 47921->47924 47922 7ff7f677b868 48016 7ff7f67662b0 19 API calls 47922->48016 47924->47919 47924->47921 47927 7ff7f677b8b2 47924->47927 47926 7ff7f677b815 47926->47907 48019 7ff7f67662b0 19 API calls 47927->48019 47928->47902 47928->47930 47930->47907 47931 7ff7f677ba60 47930->47931 47934 7ff7f677ba33 47930->47934 47936 7ff7f677b989 47930->47936 47931->47907 47932 7ff7f677ba7b 47931->47932 48025 7ff7f6796410 91 API calls 47932->48025 48023 7ff7f6752650 22 API calls 47934->48023 47938 7ff7f677b9fb 47936->47938 47942 7ff7f677b997 memset 47936->47942 47937 7ff7f677ba47 48024 7ff7f67662b0 19 API calls 47937->48024 47940 7ff7f677ba0a CertFreeCertificateContext 47938->47940 47941 7ff7f677ba10 47938->47941 47940->47941 47941->47931 47944 7ff7f677ba14 47941->47944 47945 7ff7f677b9bc 47942->47945 47943 7ff7f677ba59 47943->47938 48022 7ff7f67662b0 19 API calls 47944->48022 47945->47938 47947 7ff7f677b9cc 47945->47947 47950 7ff7f677b9e6 47945->47950 47947->47950 48020 7ff7f675fa20 255 API calls 47947->48020 47950->47938 48021 7ff7f67662b0 19 API calls 47950->48021 47951->47777 47952->47777 47953->47768 47955 7ff7f676916d 47954->47955 47956 7ff7f676921f VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 47955->47956 47959 7ff7f6769185 47955->47959 47957 7ff7f6769274 VerifyVersionInfoA 47956->47957 47958 7ff7f6769262 VerSetConditionMask 47956->47958 47957->47959 47958->47957 47960 7ff7f679ff40 8 API calls 47959->47960 47961 7ff7f67692ab 47960->47961 47961->47811 47961->47812 47963 7ff7f677824c 47962->47963 47970 7ff7f6778276 47962->47970 47964 7ff7f6778251 _errno 47963->47964 47973 7ff7f6778267 47963->47973 47964->47826 47965 7ff7f6778337 47965->47826 47966 7ff7f67782d0 strchr 47966->47970 47967 7ff7f67783e0 strchr 47969 7ff7f6778400 strchr 47967->47969 47967->47973 47968 7ff7f679ff40 8 API calls 47971 7ff7f6778546 47968->47971 47969->47973 47970->47965 47970->47966 47971->47826 47972 7ff7f67784f5 47975 7ff7f677848d 47972->47975 47989 7ff7f6778290 strchr 47972->47989 47973->47967 47973->47972 47973->47975 47975->47968 47990 7ff7f6766810 47976->47990 47979->47859 47980->47835 47981->47824 47982->47854 47983->47859 47984->47855 47985->47859 47986->47852 47987->47859 47988 7ff7f67662b0 19 API calls 47988->47824 47989->47975 47991 7ff7f6766917 send 47990->47991 47992 7ff7f676687f 47990->47992 47993 7ff7f6766944 47991->47993 47994 7ff7f6766935 WSAGetLastError 47991->47994 47992->47991 47997 7ff7f6776920 19 API calls 47992->47997 47998 7ff7f679ff40 8 API calls 47993->47998 47994->47993 47995 7ff7f6766950 47994->47995 48008 7ff7f6752e40 27 API calls 47995->48008 48000 7ff7f67668b3 47997->48000 48001 7ff7f6766997 47998->48001 47999 7ff7f6766962 48009 7ff7f67662b0 19 API calls 47999->48009 48000->47991 48004 7ff7f67668bc 48000->48004 48001->47824 48001->47988 48003 7ff7f6766974 48003->47993 48005 7ff7f67668c4 malloc 48004->48005 48006 7ff7f67668f0 recv 48004->48006 48005->48006 48007 7ff7f676690d 48005->48007 48006->47991 48006->48007 48007->47991 48008->47999 48009->48003 48011 7ff7f676664b WSAGetLastError 48010->48011 48012 7ff7f6766672 48010->48012 48011->47898 48012->47898 48013->47907 48014->47926 48015->47922 48016->47926 48017->47920 48018->47926 48019->47926 48020->47950 48021->47938 48022->47926 48023->47937 48024->47943 48025->47926 48026->47914 48027->47926 48028->47795 48029->47795 48030->47788 48032 7ff7f676e13d GetTickCount 48031->48032 48033 7ff7f676e102 QueryPerformanceCounter 48031->48033 48032->47805 48033->47805 48034->47758 48038 7ff7f676a180 13 API calls 48035->48038 48037 7ff7f67697f3 48037->47759 48038->48037 48069 7ff7f6769830 15 API calls 48039->48069 48041 7ff7f67722c9 48042 7ff7f677230a 48041->48042 48043 7ff7f67722d1 48041->48043 48045 7ff7f6772329 48042->48045 48046 7ff7f6772317 free free 48042->48046 48070 7ff7f6771ee0 7 API calls 48043->48070 48045->47659 48046->48045 48048 7ff7f67722f5 free 48048->47659 48050 7ff7f67720b2 48049->48050 48051 7ff7f677211a 48050->48051 48052 7ff7f67720c4 48050->48052 48072 7ff7f6766b00 48051->48072 48071 7ff7f676c9c0 malloc 48052->48071 48054 7ff7f67720d9 48056 7ff7f67720ff memcpy 48054->48056 48057 7ff7f67720e0 48054->48057 48056->48051 48059 7ff7f67720f7 48057->48059 48060 7ff7f67720e5 free free 48057->48060 48062 7ff7f6771d58 48059->48062 48060->48059 48061 7ff7f677217c 48075 7ff7f67661f0 fwrite fwrite 48061->48075 48062->47649 48062->47652 48063 7ff7f6772269 free free 48063->48062 48065 7ff7f67721ae 48065->48062 48065->48063 48066 7ff7f677218d 48067 7ff7f67721a6 48066->48067 48076 7ff7f67661f0 fwrite fwrite 48066->48076 48067->48065 48069->48041 48070->48048 48071->48054 48077 7ff7f677c5d0 48072->48077 48075->48066 48076->48067 48078 7ff7f677c649 malloc 48077->48078 48079 7ff7f677c622 48077->48079 48080 7ff7f677c689 48078->48080 48081 7ff7f677c63c 48078->48081 48079->48078 48079->48081 48082 7ff7f677c6a9 memcpy 48080->48082 48083 7ff7f679ff40 8 API calls 48081->48083 48088 7ff7f677c72c 48082->48088 48084 7ff7f6766b30 48083->48084 48084->48061 48084->48065 48085 7ff7f677c7cd 48086 7ff7f677c839 free 48085->48086 48086->48081 48087 7ff7f6767b30 10 API calls 48087->48088 48088->48085 48088->48086 48088->48087 48089 7ff7f677c801 48088->48089 48091 7ff7f6776920 19 API calls 48088->48091 48093 7ff7f677c7db WSAGetLastError 48088->48093 48096 7ff7f6766b70 48 API calls 48088->48096 48098 7ff7f67662b0 19 API calls 48089->48098 48091->48088 48092 7ff7f677c813 48092->48086 48097 7ff7f67662b0 19 API calls 48093->48097 48095 7ff7f677c7f3 48095->48085 48096->48088 48097->48095 48098->48092 48100 7ff7f675b8b7 48099->48100 48101 7ff7f675b8a5 48099->48101 48104 7ff7f675b9c8 EnterCriticalSection LeaveCriticalSection 48100->48104 48105 7ff7f675ba54 free 48100->48105 48101->48100 48102 7ff7f675b8ab 48101->48102 48133 7ff7f67796e0 WaitForSingleObjectEx CloseHandle 48102->48133 48107 7ff7f675ba0b 48104->48107 48108 7ff7f675ba01 CloseHandle 48104->48108 48105->47673 48106 7ff7f675b8b0 48106->48100 48109 7ff7f675ba19 48107->48109 48110 7ff7f675ba11 48107->48110 48113 7ff7f675ba2c 48108->48113 48135 7ff7f675ba70 7 API calls 48109->48135 48134 7ff7f67796e0 WaitForSingleObjectEx CloseHandle 48110->48134 48114 7ff7f675ba41 closesocket 48113->48114 48136 7ff7f6756440 free 48113->48136 48114->48105 48116 7ff7f675ba22 free 48116->48113 48118 7ff7f6758df7 48117->48118 48120 7ff7f6758e30 48117->48120 48137 7ff7f6756130 17 API calls 48118->48137 48120->47680 48122 7ff7f676eeda 48121->48122 48126 7ff7f676ee81 48121->48126 48123 7ff7f679ff40 8 API calls 48122->48123 48124 7ff7f67577cb free 48123->48124 48124->47684 48124->47686 48125 7ff7f676eea3 _time64 48125->48122 48126->48122 48126->48125 48127->47678 48128->47679 48129->47695 48133->48106 48134->48109 48135->48116 48136->48114 48137->48120 48142 7ff7f6794bd0 8 API calls 48138->48142 48140 7ff7f6791665 48141->47706 48142->48140 48143 7ff7f6757d7c 48144 7ff7f67759d0 2 API calls 48143->48144 48145 7ff7f6757d89 48144->48145 48146 7ff7f6757da5 48145->48146 48201 7ff7f6756130 17 API calls 48145->48201 48148 7ff7f6757dc1 48146->48148 48202 7ff7f6756130 17 API calls 48146->48202 48170 7ff7f6761ad0 free free 48148->48170 48151 7ff7f6757dd1 48152 7ff7f6766430 15 API calls 48151->48152 48155 7ff7f6757e27 48151->48155 48166 7ff7f6757bbb 48151->48166 48153 7ff7f6757e1b 48152->48153 48154 7ff7f6758de0 17 API calls 48153->48154 48154->48155 48155->48166 48203 7ff7f676bec0 free 48155->48203 48158 7ff7f6758c62 48159 7ff7f6758c53 48206 7ff7f67662b0 19 API calls 48159->48206 48161 7ff7f6758de0 17 API calls 48161->48166 48162 7ff7f6761d70 90 API calls 48162->48166 48164 7ff7f6767b30 10 API calls 48164->48166 48165 7ff7f6757c5e 48165->48166 48168 7ff7f67662b0 19 API calls 48165->48168 48166->48158 48166->48159 48166->48161 48166->48162 48166->48164 48166->48165 48169 7ff7f6757640 292 API calls 48166->48169 48200 7ff7f67662b0 19 API calls 48166->48200 48204 7ff7f6756360 15 API calls 48166->48204 48205 7ff7f6775b20 22 API calls 48166->48205 48168->48165 48169->48166 48207 7ff7f67618b0 48170->48207 48173 7ff7f67618b0 292 API calls 48174 7ff7f6761b36 memset 48173->48174 48240 7ff7f6763260 48174->48240 48177 7ff7f6761bfe 48179 7ff7f6761d70 90 API calls 48177->48179 48181 7ff7f6761b7d 48177->48181 48178 7ff7f67759d0 2 API calls 48180 7ff7f6761b9f 48178->48180 48179->48181 48180->48181 48182 7ff7f6761bcb free 48180->48182 48183 7ff7f6761bf2 48180->48183 48181->48151 48332 7ff7f67696f0 15 API calls 48182->48332 48183->48177 48184 7ff7f676e0f0 2 API calls 48183->48184 48186 7ff7f6761c40 48184->48186 48187 7ff7f6761c7d 48186->48187 48188 7ff7f6761c54 48186->48188 48190 7ff7f67759d0 2 API calls 48187->48190 48333 7ff7f67670c0 48188->48333 48192 7ff7f6761c8a 48190->48192 48195 7ff7f6761cad 48192->48195 48196 7ff7f67759d0 2 API calls 48192->48196 48193 7ff7f6761d37 48194 7ff7f676e0f0 2 API calls 48193->48194 48194->48181 48344 7ff7f6767c40 48195->48344 48196->48195 48199 7ff7f6766430 15 API calls 48199->48193 48200->48166 48201->48146 48202->48148 48203->48166 48204->48166 48205->48166 48206->48158 48208 7ff7f6761abb 48207->48208 48209 7ff7f67618bf 48207->48209 48208->48173 48209->48208 48374 7ff7f6756360 15 API calls 48209->48374 48211 7ff7f67618dd 48212 7ff7f67618f1 48211->48212 48375 7ff7f6757270 292 API calls 48211->48375 48214 7ff7f6761902 48212->48214 48376 7ff7f6756f60 292 API calls 48212->48376 48216 7ff7f6761933 48214->48216 48217 7ff7f6761926 free 48214->48217 48377 7ff7f6761ef0 292 API calls 48216->48377 48217->48216 48241 7ff7f67632a5 48240->48241 48330 7ff7f67632c9 48241->48330 48378 7ff7f6762a60 calloc 48241->48378 48243 7ff7f679ff40 8 API calls 48245 7ff7f6761b65 48243->48245 48244 7ff7f67632db 48244->48330 48393 7ff7f6764ed0 48244->48393 48245->48177 48245->48178 48245->48181 48248 7ff7f6763324 48250 7ff7f6763330 _strdup 48248->48250 48251 7ff7f6763342 48248->48251 48249 7ff7f6763312 _strdup 48249->48248 48249->48330 48250->48251 48250->48330 48443 7ff7f6763c70 48251->48443 48255 7ff7f67697c0 13 API calls 48256 7ff7f67633b5 48255->48256 48256->48330 48502 7ff7f67644c0 48256->48502 48257 7ff7f6763407 48258 7ff7f676344c _strdup 48257->48258 48259 7ff7f6763462 48257->48259 48257->48330 48258->48259 48258->48330 48260 7ff7f676346c _strdup 48259->48260 48261 7ff7f6763485 48259->48261 48260->48261 48260->48330 48518 7ff7f6764930 48261->48518 48266 7ff7f67634d2 48268 7ff7f67634f4 48266->48268 48269 7ff7f6762000 38 API calls 48266->48269 48266->48330 48267 7ff7f6762000 38 API calls 48267->48266 48270 7ff7f6762000 38 API calls 48268->48270 48271 7ff7f6763516 48268->48271 48268->48330 48269->48268 48270->48271 48272 7ff7f676359e 48271->48272 48271->48330 48540 7ff7f6771e30 calloc 48271->48540 48273 7ff7f67636af 48272->48273 48276 7ff7f6763614 48272->48276 48272->48330 48549 7ff7f675f7e0 48273->48549 48275 7ff7f676384a 48277 7ff7f675f7e0 8 API calls 48275->48277 48275->48330 48278 7ff7f6763634 48276->48278 48279 7ff7f676369f 48276->48279 48280 7ff7f6763861 48277->48280 48629 7ff7f675e720 17 API calls 48278->48629 48281 7ff7f67620d0 2 API calls 48279->48281 48280->48330 48573 7ff7f6765390 48280->48573 48281->48330 48284 7ff7f676364a 48286 7ff7f6765e00 17 API calls 48284->48286 48284->48330 48291 7ff7f676365c 48286->48291 48287 7ff7f6763954 48328 7ff7f6763a01 48287->48328 48633 7ff7f675ecc0 13 API calls 48287->48633 48288 7ff7f6763662 48288->48330 48290 7ff7f67638b9 48290->48287 48292 7ff7f67638c1 48290->48292 48291->48288 48630 7ff7f676d2e0 17 API calls 48291->48630 48632 7ff7f6765ab0 34 API calls 48292->48632 48293 7ff7f6766430 15 API calls 48297 7ff7f6763a10 48293->48297 48635 7ff7f6762ef0 44 API calls 48297->48635 48298 7ff7f67638d1 free free 48300 7ff7f67638f8 48298->48300 48303 7ff7f6766430 15 API calls 48300->48303 48301 7ff7f67639a6 48308 7ff7f67639eb 48301->48308 48634 7ff7f675ea70 QueryPerformanceCounter GetTickCount 48301->48634 48306 7ff7f676394f 48303->48306 48304 7ff7f6763a8c 48637 7ff7f675e720 17 API calls 48304->48637 48305 7ff7f67639cd 48311 7ff7f67639ed 48305->48311 48312 7ff7f67639e0 48305->48312 48592 7ff7f67620d0 48306->48592 48308->48304 48636 7ff7f675eb40 QueryPerformanceCounter GetTickCount 48308->48636 48310 7ff7f6763ac1 48310->48306 48324 7ff7f6766430 15 API calls 48310->48324 48317 7ff7f6766430 15 API calls 48311->48317 48316 7ff7f6761d70 90 API calls 48312->48316 48314 7ff7f6763b0b 48596 7ff7f6765e00 48314->48596 48315 7ff7f6763a9b 48315->48310 48320 7ff7f6766430 15 API calls 48315->48320 48315->48330 48316->48308 48317->48328 48318 7ff7f6763a75 48321 7ff7f6763c5b 48318->48321 48322 7ff7f6763a81 48318->48322 48320->48310 48323 7ff7f6766430 15 API calls 48321->48323 48325 7ff7f6761d70 90 API calls 48322->48325 48323->48328 48329 7ff7f6763aef 48324->48329 48325->48304 48328->48293 48329->48306 48330->48243 48332->48183 48334 7ff7f676e0f0 2 API calls 48333->48334 48335 7ff7f67670e3 48334->48335 48336 7ff7f676715b 48335->48336 48339 7ff7f6767174 48335->48339 48776 7ff7f67662b0 19 API calls 48336->48776 48338 7ff7f676716a 48341 7ff7f6761c6a 48338->48341 48342 7ff7f676727d 48339->48342 48711 7ff7f6768600 48339->48711 48341->48177 48341->48193 48342->48341 48777 7ff7f6756130 17 API calls 48342->48777 48345 7ff7f6767c77 48344->48345 48346 7ff7f6767e73 48344->48346 48345->48346 48348 7ff7f6767c91 getpeername 48345->48348 48347 7ff7f679ff40 8 API calls 48346->48347 48349 7ff7f6761cc7 48347->48349 48350 7ff7f6767ced getsockname 48348->48350 48351 7ff7f6767cb6 WSAGetLastError 48348->48351 48349->48193 48349->48199 48352 7ff7f6767d77 48350->48352 48353 7ff7f6767d40 WSAGetLastError 48350->48353 48816 7ff7f6752e40 27 API calls 48351->48816 48820 7ff7f6766e70 19 API calls 48352->48820 48818 7ff7f6752e40 27 API calls 48353->48818 48357 7ff7f6767cd3 48817 7ff7f67662b0 19 API calls 48357->48817 48358 7ff7f6767d5d 48819 7ff7f67662b0 19 API calls 48358->48819 48359 7ff7f6767d99 48362 7ff7f6767ddd 48359->48362 48363 7ff7f6767d9d _errno _errno 48359->48363 48823 7ff7f6766e70 19 API calls 48362->48823 48821 7ff7f6752e40 27 API calls 48363->48821 48364 7ff7f6767ce8 48364->48346 48367 7ff7f6767dc3 48822 7ff7f67662b0 19 API calls 48367->48822 48368 7ff7f6767e2f 48368->48346 48369 7ff7f6767e33 _errno _errno 48368->48369 48824 7ff7f6752e40 27 API calls 48369->48824 48372 7ff7f6767e59 48825 7ff7f67662b0 19 API calls 48372->48825 48374->48211 48375->48212 48376->48214 48379 7ff7f6762a85 48378->48379 48380 7ff7f6762a90 calloc 48378->48380 48379->48244 48381 7ff7f6762aba 48380->48381 48382 7ff7f6762d01 free 48380->48382 48383 7ff7f676e0f0 2 API calls 48381->48383 48382->48244 48384 7ff7f6762b51 48383->48384 48385 7ff7f676e0f0 2 API calls 48384->48385 48386 7ff7f6762b65 48385->48386 48387 7ff7f6762d3d 48386->48387 48388 7ff7f6762cc7 _strdup 48386->48388 48389 7ff7f676e0f0 2 API calls 48387->48389 48388->48387 48390 7ff7f6762cd9 48388->48390 48391 7ff7f6762d7d 48389->48391 48392 7ff7f6762ce7 free free 48390->48392 48391->48244 48392->48382 48638 7ff7f6765eb0 8 API calls 48393->48638 48396 7ff7f6764ef7 48642 7ff7f678ee40 calloc 48396->48642 48397 7ff7f6764ef0 48641 7ff7f678ee80 23 API calls 48397->48641 48400 7ff7f6764ef5 48401 7ff7f6764efc 48400->48401 48406 7ff7f6764f72 48401->48406 48440 7ff7f67632fc 48401->48440 48643 7ff7f678eab0 tolower 48401->48643 48402 7ff7f6765035 48646 7ff7f678efc0 8 API calls 48402->48646 48405 7ff7f6764f3f 48405->48406 48407 7ff7f6764f4b free 48405->48407 48408 7ff7f6764f58 48405->48408 48406->48402 48406->48440 48645 7ff7f678efc0 8 API calls 48406->48645 48407->48408 48644 7ff7f67696f0 15 API calls 48408->48644 48411 7ff7f676509c 48647 7ff7f67662b0 19 API calls 48411->48647 48413 7ff7f676501c 48413->48402 48415 7ff7f6765028 free 48413->48415 48413->48440 48414 7ff7f67650ae 48414->48440 48415->48402 48416 7ff7f676505e 48416->48411 48417 7ff7f67650d4 48416->48417 48416->48440 48648 7ff7f678efc0 8 API calls 48417->48648 48419 7ff7f67650fb 48420 7ff7f6765122 48419->48420 48421 7ff7f6765105 _strdup 48419->48421 48420->48440 48649 7ff7f678efc0 8 API calls 48420->48649 48421->48420 48421->48440 48423 7ff7f6765145 48424 7ff7f6765168 48423->48424 48425 7ff7f676514f _strdup 48423->48425 48424->48440 48650 7ff7f678efc0 8 API calls 48424->48650 48425->48424 48425->48440 48427 7ff7f6765188 48428 7ff7f676521d 48427->48428 48429 7ff7f6765192 _strdup 48427->48429 48428->48440 48651 7ff7f678efc0 8 API calls 48428->48651 48429->48428 48429->48440 48431 7ff7f6765238 48431->48440 48652 7ff7f678efc0 8 API calls 48431->48652 48433 7ff7f676526d 48433->48440 48653 7ff7f678efc0 8 API calls 48433->48653 48435 7ff7f67652b1 48436 7ff7f67652d1 strtoul 48435->48436 48437 7ff7f67652b5 48435->48437 48436->48437 48437->48440 48654 7ff7f678efc0 8 API calls 48437->48654 48439 7ff7f676534d _strdup 48439->48440 48440->48248 48440->48249 48440->48330 48441 7ff7f6765310 48441->48439 48441->48441 48655 7ff7f6765f80 20 API calls 48441->48655 48444 7ff7f6763d8d 48443->48444 48445 7ff7f6763cbd memset memset 48443->48445 48446 7ff7f6763d99 _strdup 48444->48446 48447 7ff7f6763dc0 48444->48447 48448 7ff7f6763d08 48445->48448 48449 7ff7f6763cf0 strncpy 48445->48449 48446->48447 48452 7ff7f6763da7 48446->48452 48453 7ff7f6763dcc _strdup 48447->48453 48454 7ff7f6763ddf 48447->48454 48450 7ff7f6763d14 strncpy 48448->48450 48451 7ff7f6763d2f 48448->48451 48449->48448 48450->48451 48662 7ff7f677c9c0 malloc strtoul free 48451->48662 48664 7ff7f67662b0 19 API calls 48452->48664 48453->48452 48453->48454 48477 7ff7f6763e3e 48454->48477 48665 7ff7f677c880 realloc GetEnvironmentVariableA realloc free 48454->48665 48458 7ff7f6763d4f 48461 7ff7f6763d7c 48458->48461 48663 7ff7f677c9c0 malloc strtoul free 48458->48663 48459 7ff7f6763db6 48462 7ff7f67642e7 free free 48459->48462 48460 7ff7f6763e00 48463 7ff7f6763e1c 48460->48463 48666 7ff7f677c880 realloc GetEnvironmentVariableA realloc free 48460->48666 48461->48444 48461->48462 48466 7ff7f679ff40 8 API calls 48462->48466 48470 7ff7f6766430 15 API calls 48463->48470 48463->48477 48465 7ff7f67640a1 free 48467 7ff7f67640de 48465->48467 48468 7ff7f67640b1 48465->48468 48471 7ff7f6763357 48466->48471 48473 7ff7f6764108 48467->48473 48478 7ff7f67640f8 free 48467->48478 48468->48467 48472 7ff7f67640d2 free 48468->48472 48470->48477 48471->48255 48471->48256 48471->48330 48472->48467 48479 7ff7f676410d 48473->48479 48671 7ff7f6764b80 47 API calls 48473->48671 48474 7ff7f6763f96 48474->48465 48475 7ff7f6763fe9 48474->48475 48480 7ff7f6763fd0 tolower 48474->48480 48667 7ff7f677c880 realloc GetEnvironmentVariableA realloc free 48475->48667 48476 7ff7f6764124 free free free 48487 7ff7f6764117 48476->48487 48477->48474 48477->48476 48477->48477 48484 7ff7f6763eae strchr 48477->48484 48497 7ff7f6763ec7 48477->48497 48478->48473 48479->48487 48500 7ff7f67641c1 48479->48500 48672 7ff7f6764b80 47 API calls 48479->48672 48480->48475 48480->48480 48483 7ff7f676416f free 48483->48479 48483->48487 48484->48474 48484->48497 48486 7ff7f676404c 48489 7ff7f676407f 48486->48489 48669 7ff7f677c880 realloc GetEnvironmentVariableA realloc free 48486->48669 48487->48462 48488 7ff7f67641a3 free 48488->48487 48488->48500 48491 7ff7f6766430 15 API calls 48489->48491 48492 7ff7f676409c 48489->48492 48491->48492 48492->48465 48493 7ff7f6764010 48493->48486 48668 7ff7f677c880 realloc GetEnvironmentVariableA realloc free 48493->48668 48494 7ff7f6764068 48494->48489 48670 7ff7f677c880 realloc GetEnvironmentVariableA realloc free 48494->48670 48495 7ff7f6763ef0 strchr 48495->48497 48497->48474 48497->48476 48497->48495 48499 7ff7f6763f20 strchr 48497->48499 48499->48497 48500->48487 48501 7ff7f6764237 free 48500->48501 48501->48487 48503 7ff7f6764524 48502->48503 48504 7ff7f67644f1 48502->48504 48505 7ff7f6764539 free _strdup 48503->48505 48506 7ff7f676455b 48503->48506 48504->48503 48509 7ff7f6764504 free 48504->48509 48510 7ff7f6764510 48504->48510 48505->48506 48516 7ff7f6764658 48505->48516 48507 7ff7f6764591 48506->48507 48508 7ff7f676456f free _strdup 48506->48508 48512 7ff7f67645a5 free _strdup 48507->48512 48514 7ff7f67645cf 48507->48514 48508->48507 48508->48516 48509->48510 48510->48503 48511 7ff7f6764518 free 48510->48511 48511->48503 48512->48514 48512->48516 48514->48516 48673 7ff7f6790d70 36 API calls 48514->48673 48515 7ff7f676463e 48515->48516 48517 7ff7f6766430 15 API calls 48515->48517 48516->48257 48517->48516 48525 7ff7f6764960 48518->48525 48519 7ff7f6763497 48519->48330 48528 7ff7f6762000 48519->48528 48521 7ff7f6764a38 strchr 48522 7ff7f6764a4d strtol 48521->48522 48521->48525 48522->48525 48524 7ff7f6764ada free 48524->48525 48525->48519 48525->48521 48525->48524 48526 7ff7f6764a07 free 48525->48526 48527 7ff7f6766430 15 API calls 48525->48527 48674 7ff7f67696f0 15 API calls 48525->48674 48675 7ff7f6764730 22 API calls 48525->48675 48526->48524 48526->48525 48527->48525 48529 7ff7f676204f 48528->48529 48531 7ff7f6762035 48528->48531 48530 7ff7f679ff40 8 API calls 48529->48530 48532 7ff7f6762061 48530->48532 48531->48529 48676 7ff7f6790cc0 18 API calls 48531->48676 48532->48266 48532->48267 48532->48330 48534 7ff7f6762088 48534->48529 48535 7ff7f676209b GetLastError 48534->48535 48677 7ff7f6752f80 21 API calls 48535->48677 48537 7ff7f67620b3 48678 7ff7f67662b0 19 API calls 48537->48678 48539 7ff7f67620c9 48539->48529 48541 7ff7f6771e5d 48540->48541 48542 7ff7f6771e70 48540->48542 48541->48272 48679 7ff7f675c6c0 memset 48542->48679 48544 7ff7f6771e7c 48545 7ff7f6771e9c 48544->48545 48546 7ff7f6771eb8 48544->48546 48545->48272 48680 7ff7f67662b0 19 API calls 48546->48680 48548 7ff7f6771ec7 48548->48272 48550 7ff7f675f826 _strdup 48549->48550 48551 7ff7f675f845 48549->48551 48550->48551 48552 7ff7f675f835 48550->48552 48553 7ff7f675f852 _strdup 48551->48553 48554 7ff7f675f871 48551->48554 48552->48275 48553->48554 48555 7ff7f675f861 48553->48555 48556 7ff7f675f87e _strdup 48554->48556 48557 7ff7f675f89d 48554->48557 48555->48275 48556->48557 48558 7ff7f675f88d 48556->48558 48559 7ff7f675f8aa _strdup 48557->48559 48560 7ff7f675f8c9 48557->48560 48558->48275 48559->48560 48561 7ff7f675f8b9 48559->48561 48562 7ff7f675f8d6 _strdup 48560->48562 48563 7ff7f675f8f5 48560->48563 48561->48275 48562->48563 48564 7ff7f675f8e5 48562->48564 48565 7ff7f675f902 _strdup 48563->48565 48566 7ff7f675f921 48563->48566 48564->48275 48565->48566 48567 7ff7f675f911 48565->48567 48568 7ff7f675f92e _strdup 48566->48568 48569 7ff7f675f94d 48566->48569 48567->48275 48568->48569 48570 7ff7f675f93d 48568->48570 48571 7ff7f675f95a _strdup 48569->48571 48572 7ff7f675f969 48569->48572 48570->48275 48571->48572 48572->48275 48574 7ff7f676e0f0 2 API calls 48573->48574 48578 7ff7f67653a3 48574->48578 48575 7ff7f6763877 48575->48287 48631 7ff7f6760f40 15 API calls 48575->48631 48577 7ff7f676ee60 9 API calls 48577->48578 48578->48575 48578->48577 48579 7ff7f6791650 8 API calls 48578->48579 48581 7ff7f6766430 15 API calls 48578->48581 48583 7ff7f6766f10 closesocket free 48578->48583 48584 7ff7f6765516 30 API calls 48578->48584 48681 7ff7f676f820 free free free free 48578->48681 48682 7ff7f6791260 48578->48682 48685 7ff7f675b540 48578->48685 48579->48578 48581->48578 48583->48578 48699 7ff7f67631e0 free free 48584->48699 48586 7ff7f6765776 48587 7ff7f6765784 free 48586->48587 48700 7ff7f675f990 8 API calls 48587->48700 48589 7ff7f67657a4 48701 7ff7f675f990 8 API calls 48589->48701 48591 7ff7f67657b0 free free free 48591->48578 48593 7ff7f67620de 48592->48593 48594 7ff7f676e0f0 2 API calls 48593->48594 48595 7ff7f6762148 48594->48595 48595->48314 48597 7ff7f6765e1c 48596->48597 48629->48284 48630->48279 48631->48290 48632->48298 48633->48301 48634->48305 48635->48330 48636->48318 48637->48315 48656 7ff7f678ee50 48638->48656 48641->48400 48643->48405 48644->48406 48645->48413 48646->48416 48647->48414 48648->48419 48649->48423 48650->48427 48651->48431 48652->48433 48653->48435 48654->48441 48655->48439 48657 7ff7f6764ee4 48656->48657 48658 7ff7f678ee55 48656->48658 48657->48396 48657->48397 48661 7ff7f678fe30 12 API calls 48658->48661 48662->48458 48663->48461 48664->48459 48665->48460 48666->48463 48667->48493 48668->48486 48669->48494 48670->48489 48671->48483 48672->48488 48673->48515 48674->48525 48675->48525 48676->48534 48677->48537 48678->48539 48679->48544 48680->48548 48681->48578 48702 7ff7f6795180 7 API calls 48682->48702 48684 7ff7f679127e 48686 7ff7f675b9b0 48685->48686 48687 7ff7f675b9c8 EnterCriticalSection LeaveCriticalSection 48686->48687 48688 7ff7f675ba54 free 48686->48688 48689 7ff7f675ba0b 48687->48689 48690 7ff7f675ba01 CloseHandle 48687->48690 48688->48578 48691 7ff7f675ba19 48689->48691 48692 7ff7f675ba11 48689->48692 48693 7ff7f675ba2c 48690->48693 48704 7ff7f675ba70 7 API calls 48691->48704 48703 7ff7f67796e0 WaitForSingleObjectEx CloseHandle 48692->48703 48696 7ff7f675ba41 closesocket 48693->48696 48705 7ff7f6756440 free 48693->48705 48696->48688 48698 7ff7f675ba22 free 48698->48693 48699->48586 48700->48589 48701->48591 48702->48684 48703->48691 48704->48698 48705->48696 48712 7ff7f676866f memcpy 48711->48712 48714 7ff7f67686d8 socket 48712->48714 48717 7ff7f67686ab 48712->48717 48714->48717 48716 7ff7f679ff40 8 API calls 48718 7ff7f6768bab 48716->48718 48720 7ff7f6768717 48717->48720 48769 7ff7f6768a34 48717->48769 48798 7ff7f67755d0 ioctlsocket 48717->48798 48718->48339 48719 7ff7f6768b3a _errno _errno _errno 48811 7ff7f6752e40 27 API calls 48719->48811 48720->48719 48778 7ff7f6791b00 48720->48778 48723 7ff7f6768b6b 48812 7ff7f67662b0 19 API calls 48723->48812 48724 7ff7f6768764 48724->48719 48726 7ff7f676876d htons 48724->48726 48728 7ff7f6766430 15 API calls 48726->48728 48727 7ff7f6768b80 48729 7ff7f6766f10 2 API calls 48727->48729 48730 7ff7f676878e 48728->48730 48763 7ff7f6768a15 48729->48763 48731 7ff7f6768809 48730->48731 48732 7ff7f67687af setsockopt 48730->48732 48736 7ff7f6769140 14 API calls 48731->48736 48741 7ff7f6768841 48731->48741 48732->48731 48733 7ff7f67687dd WSAGetLastError 48732->48733 48799 7ff7f6752e40 27 API calls 48733->48799 48734 7ff7f6768862 getsockopt 48737 7ff7f6768889 48734->48737 48738 7ff7f6768893 setsockopt 48734->48738 48736->48741 48737->48738 48739 7ff7f6768845 48737->48739 48738->48739 48743 7ff7f67688ca setsockopt 48739->48743 48747 7ff7f6768909 48739->48747 48740 7ff7f67687f7 48744 7ff7f6766430 15 API calls 48740->48744 48741->48734 48741->48739 48742 7ff7f67689d7 48746 7ff7f67689e8 48742->48746 48749 7ff7f6768a3e 48742->48749 48745 7ff7f67688f7 48743->48745 48752 7ff7f676890e 48743->48752 48744->48731 48748 7ff7f6766430 15 API calls 48745->48748 48800 7ff7f6767f70 596 API calls 48746->48800 48747->48742 48764 7ff7f6768a29 48747->48764 48748->48747 48797 7ff7f67755d0 ioctlsocket 48749->48797 48751 7ff7f6768a4b 48754 7ff7f676e0f0 2 API calls 48751->48754 48755 7ff7f676893c WSAIoctl 48752->48755 48758 7ff7f6768a55 48754->48758 48755->48747 48759 7ff7f6768984 WSAGetLastError 48755->48759 48756 7ff7f6768a04 48756->48749 48757 7ff7f6768a0a 48756->48757 48801 7ff7f6766f10 48757->48801 48761 7ff7f6768a7f 48758->48761 48809 7ff7f6756130 17 API calls 48758->48809 48762 7ff7f6766430 15 API calls 48759->48762 48767 7ff7f6768ac8 WSAGetLastError 48761->48767 48768 7ff7f6768a9f connect 48761->48768 48761->48769 48762->48747 48763->48769 48766 7ff7f6766f10 2 API calls 48764->48766 48766->48769 48767->48769 48770 7ff7f6768ad5 48767->48770 48768->48767 48768->48769 48769->48716 48770->48769 48810 7ff7f6752e40 27 API calls 48770->48810 48772 7ff7f6768af1 48773 7ff7f6766430 15 API calls 48772->48773 48774 7ff7f6768b07 48773->48774 48775 7ff7f6766f10 2 API calls 48774->48775 48775->48769 48776->48338 48777->48341 48779 7ff7f6791b0f 48778->48779 48780 7ff7f6791b39 48778->48780 48781 7ff7f6791b14 _errno 48779->48781 48789 7ff7f6791b27 48779->48789 48782 7ff7f67697c0 13 API calls 48780->48782 48781->48724 48783 7ff7f6791ba8 48782->48783 48784 7ff7f6791bf4 _errno 48783->48784 48785 7ff7f6791bc7 48783->48785 48784->48785 48786 7ff7f679ff40 8 API calls 48785->48786 48787 7ff7f6791c0f 48786->48787 48787->48724 48788 7ff7f67697c0 13 API calls 48788->48789 48789->48788 48790 7ff7f6791e9a 48789->48790 48792 7ff7f6791e20 48789->48792 48813 7ff7f6791b50 14 API calls 48790->48813 48793 7ff7f6791eb3 _errno 48792->48793 48794 7ff7f6791e49 48792->48794 48793->48794 48795 7ff7f679ff40 8 API calls 48794->48795 48796 7ff7f6791e87 48795->48796 48796->48724 48797->48751 48798->48720 48799->48740 48800->48756 48802 7ff7f6766f25 48801->48802 48803 7ff7f6766f50 closesocket 48801->48803 48804 7ff7f6766f41 48802->48804 48806 7ff7f6766f66 48802->48806 48803->48763 48814 7ff7f6756440 free 48804->48814 48815 7ff7f6756440 free 48806->48815 48808 7ff7f6766f6e 48808->48763 48809->48761 48810->48772 48811->48723 48812->48727 48813->48792 48814->48803 48815->48808 48816->48357 48817->48364 48818->48358 48819->48364 48820->48359 48821->48367 48822->48364 48823->48368 48824->48372 48825->48364 48826 7ff7f6758738 48827 7ff7f6758751 48826->48827 48828 7ff7f67587df 48827->48828 48831 7ff7f67589b4 48827->48831 48867 7ff7f676ce50 48828->48867 48911 7ff7f6756130 17 API calls 48831->48911 48834 7ff7f6758804 48835 7ff7f67588a0 48834->48835 48837 7ff7f675880e 48834->48837 48842 7ff7f6758835 48834->48842 48836 7ff7f6758951 48835->48836 48841 7ff7f67588a8 48835->48841 48866 7ff7f6757bbb 48836->48866 48910 7ff7f6756130 17 API calls 48836->48910 48839 7ff7f6757640 292 API calls 48837->48839 48839->48866 48841->48842 48843 7ff7f675892b free 48841->48843 48844 7ff7f67588be 48841->48844 48845 7ff7f6757640 292 API calls 48842->48845 48843->48842 48847 7ff7f67588cb free 48844->48847 48844->48866 48849 7ff7f6758853 48845->48849 48846 7ff7f6758c53 48914 7ff7f67662b0 19 API calls 48846->48914 48909 7ff7f676c710 28 API calls 48847->48909 48848 7ff7f6758c62 48908 7ff7f676c710 28 API calls 48849->48908 48851 7ff7f6758de0 17 API calls 48851->48866 48854 7ff7f67588f3 free 48856 7ff7f6758909 48854->48856 48854->48866 48855 7ff7f6758884 free 48855->48866 48859 7ff7f6757640 292 API calls 48856->48859 48857 7ff7f6761d70 90 API calls 48857->48866 48859->48866 48860 7ff7f6767b30 10 API calls 48860->48866 48861 7ff7f6758862 48861->48855 48862 7ff7f67662b0 19 API calls 48863 7ff7f6757c5e 48862->48863 48863->48862 48863->48866 48865 7ff7f6757640 292 API calls 48865->48866 48866->48846 48866->48848 48866->48851 48866->48857 48866->48860 48866->48863 48866->48865 48906 7ff7f67662b0 19 API calls 48866->48906 48912 7ff7f6756360 15 API calls 48866->48912 48913 7ff7f6775b20 22 API calls 48866->48913 48868 7ff7f676cea1 48867->48868 48869 7ff7f676ceef 48868->48869 48872 7ff7f6776920 19 API calls 48868->48872 48870 7ff7f676cf0d 48869->48870 48871 7ff7f676cef6 48869->48871 48874 7ff7f676cf39 48870->48874 48915 7ff7f676d560 48870->48915 48948 7ff7f67662b0 19 API calls 48871->48948 48872->48869 48875 7ff7f676cf6e 48874->48875 48876 7ff7f676cf56 48874->48876 48884 7ff7f67587f3 48874->48884 48879 7ff7f676e0f0 2 API calls 48875->48879 48949 7ff7f676dcb0 90 API calls 48876->48949 48887 7ff7f676cf78 48879->48887 48880 7ff7f676cf66 48880->48875 48880->48884 48881 7ff7f676cfe8 48950 7ff7f6775b20 22 API calls 48881->48950 48883 7ff7f676cff0 48883->48884 48951 7ff7f6776c90 23 API calls 48883->48951 48884->48834 48907 7ff7f676d150 24 API calls 48884->48907 48886 7ff7f676d00e 48886->48884 48888 7ff7f676d022 48886->48888 48896 7ff7f676d0a2 48886->48896 48887->48881 48889 7ff7f6766430 15 API calls 48887->48889 48890 7ff7f6767b30 10 API calls 48888->48890 48889->48881 48892 7ff7f676d031 48890->48892 48891 7ff7f676d109 48956 7ff7f6775b20 22 API calls 48891->48956 48892->48884 48895 7ff7f676d03a 48892->48895 48894 7ff7f676d0e0 48894->48891 48898 7ff7f676d0f3 48894->48898 48902 7ff7f676d08c 48895->48902 48903 7ff7f676d071 48895->48903 48896->48891 48896->48894 48897 7ff7f676d0c7 48896->48897 48954 7ff7f67662b0 19 API calls 48897->48954 48955 7ff7f67662b0 19 API calls 48898->48955 48901 7ff7f676cf05 48901->48884 48953 7ff7f67662b0 19 API calls 48902->48953 48952 7ff7f67662b0 19 API calls 48903->48952 48906->48866 48907->48834 48908->48861 48909->48854 48910->48866 48911->48866 48912->48866 48913->48866 48914->48848 48918 7ff7f676d5b0 48915->48918 48917 7ff7f67759d0 2 API calls 48917->48918 48918->48917 48919 7ff7f676daea 48918->48919 48920 7ff7f676e0f0 2 API calls 48918->48920 48923 7ff7f676dac7 48918->48923 48924 7ff7f676d840 48918->48924 48929 7ff7f676db81 48918->48929 48933 7ff7f676daef 48918->48933 48935 7ff7f6766430 15 API calls 48918->48935 48941 7ff7f676d81c 48918->48941 48944 7ff7f67661d0 23 API calls 48918->48944 48947 7ff7f676db03 48918->48947 48957 7ff7f67665a0 48918->48957 48960 7ff7f67731d0 192 API calls 48918->48960 48963 7ff7f6792ed0 23 API calls 48918->48963 48964 7ff7f677f9f0 23 API calls 48918->48964 48922 7ff7f6766430 15 API calls 48919->48922 48919->48947 48920->48918 48922->48947 48923->48919 48925 7ff7f6766430 15 API calls 48923->48925 48924->48918 48961 7ff7f67661f0 fwrite fwrite 48924->48961 48962 7ff7f67661f0 fwrite fwrite 48924->48962 48925->48919 48930 7ff7f676db9d 48929->48930 48931 7ff7f676db86 48929->48931 48967 7ff7f67662b0 19 API calls 48930->48967 48966 7ff7f67662b0 19 API calls 48931->48966 48936 7ff7f676daf7 48933->48936 48937 7ff7f676db23 48933->48937 48934 7ff7f676db2f 48934->48947 48935->48918 48940 7ff7f6766430 15 API calls 48936->48940 48965 7ff7f67662b0 19 API calls 48937->48965 48940->48947 48942 7ff7f6766430 15 API calls 48941->48942 48943 7ff7f676db48 48942->48943 48946 7ff7f6766430 15 API calls 48943->48946 48944->48918 48946->48947 48947->48874 48948->48901 48949->48880 48950->48883 48951->48886 48952->48901 48953->48901 48954->48901 48955->48901 48956->48884 48968 7ff7f677bf00 48957->48968 48960->48918 48961->48924 48962->48918 48963->48918 48964->48918 48965->48934 48966->48934 48967->48934 48969 7ff7f677bf9e 48968->48969 48970 7ff7f677bf7f 48968->48970 48971 7ff7f677bfa5 48969->48971 48972 7ff7f677bfc2 48969->48972 48970->48969 48973 7ff7f677bf85 48970->48973 48975 7ff7f6766430 15 API calls 48971->48975 48976 7ff7f677bfc8 48972->48976 48978 7ff7f677bfe1 48972->48978 48974 7ff7f6766430 15 API calls 48973->48974 48980 7ff7f677bf94 48974->48980 48975->48980 48977 7ff7f6766430 15 API calls 48976->48977 48977->48980 48979 7ff7f677c010 realloc 48978->48979 48981 7ff7f677c05e 48978->48981 49005 7ff7f677c0d9 48978->49005 48979->48981 48982 7ff7f677c03d 48979->48982 48986 7ff7f677c436 48980->48986 48988 7ff7f6769140 14 API calls 48980->48988 48985 7ff7f6766630 2 API calls 48981->48985 49014 7ff7f67662b0 19 API calls 48982->49014 48983 7ff7f677c535 memcpy memcpy 48989 7ff7f677c57b 48983->48989 48990 7ff7f677c0a7 48985->48990 48986->48983 48986->48989 48987 7ff7f677c054 48987->48980 48992 7ff7f677c426 48988->48992 48991 7ff7f679ff40 8 API calls 48989->48991 48994 7ff7f677c29e 48990->48994 48995 7ff7f677c0cd 48990->48995 48990->49005 48993 7ff7f67665fb 48991->48993 48992->48986 48996 7ff7f6766430 15 API calls 48992->48996 48993->48918 48997 7ff7f6766430 15 API calls 48994->48997 48998 7ff7f6766430 15 API calls 48995->48998 48996->48986 48997->49005 48998->49005 48999 7ff7f6766430 15 API calls 48999->48980 49000 7ff7f677a3c0 255 API calls 49000->49005 49001 7ff7f6766430 15 API calls 49001->49005 49002 7ff7f677c447 49006 7ff7f677c476 49002->49006 49007 7ff7f677c3be 49002->49007 49003 7ff7f677c1e0 realloc 49004 7ff7f677c4a6 49003->49004 49003->49005 49016 7ff7f67662b0 19 API calls 49004->49016 49005->48980 49005->49000 49005->49001 49005->49002 49005->49003 49005->49007 49009 7ff7f677c27b memcpy 49005->49009 49011 7ff7f677c22b memcpy 49005->49011 49015 7ff7f6752650 22 API calls 49006->49015 49007->48980 49007->48999 49009->49005 49011->49005 49012 7ff7f677c48f 49013 7ff7f6766430 15 API calls 49012->49013 49013->48980 49014->48987 49015->49012 49016->48987 49017 7ff7f677a945 49051 7ff7f677a949 49017->49051 49018 7ff7f677aa17 49019 7ff7f677aa36 strchr 49018->49019 49020 7ff7f677aed5 calloc 49018->49020 49021 7ff7f677ab9b 49019->49021 49022 7ff7f677aa4f strncmp 49019->49022 49023 7ff7f677aefc 49020->49023 49024 7ff7f677af78 49020->49024 49028 7ff7f677acae fopen 49021->49028 49029 7ff7f677af5b 49021->49029 49025 7ff7f677aa6c 49022->49025 49026 7ff7f677aa90 strncmp 49022->49026 49129 7ff7f67662b0 19 API calls 49023->49129 49038 7ff7f677afda 49024->49038 49039 7ff7f677afd4 CertFreeCertificateContext 49024->49039 49030 7ff7f677ab69 strchr 49025->49030 49026->49025 49032 7ff7f677aab2 strncmp 49026->49032 49028->49029 49033 7ff7f677acc7 fseek 49028->49033 49131 7ff7f67662b0 19 API calls 49029->49131 49030->49021 49034 7ff7f677ab83 _strdup 49030->49034 49031 7ff7f677af0b 49035 7ff7f677af19 CertFreeCertificateContext 49031->49035 49121 7ff7f677b196 49031->49121 49032->49025 49037 7ff7f677aad4 strncmp 49032->49037 49042 7ff7f677acfd 49033->49042 49043 7ff7f677acf1 ftell 49033->49043 49034->49021 49044 7ff7f677aba3 49034->49044 49035->49121 49037->49025 49046 7ff7f677aaf3 strncmp 49037->49046 49040 7ff7f677afde 49038->49040 49041 7ff7f677b043 49038->49041 49039->49038 49132 7ff7f6752650 22 API calls 49040->49132 49057 7ff7f6778240 13 API calls 49041->49057 49048 7ff7f677ad0e fseek 49042->49048 49049 7ff7f677af29 fclose 49042->49049 49043->49042 49044->49021 49066 7ff7f677abc4 CertOpenStore 49044->49066 49045 7ff7f677a9d0 strtol 49050 7ff7f677a9f2 strchr 49045->49050 49045->49051 49046->49030 49053 7ff7f677ab0a strncmp 49046->49053 49048->49049 49056 7ff7f677ad2b malloc 49048->49056 49130 7ff7f67662b0 19 API calls 49049->49130 49050->49018 49050->49051 49051->49018 49051->49045 49051->49050 49072 7ff7f677aa77 49051->49072 49123 7ff7f6779d70 62 API calls 49051->49123 49052 7ff7f679ff40 8 API calls 49059 7ff7f677b34c 49052->49059 49053->49025 49060 7ff7f677ab29 strncmp 49053->49060 49054 7ff7f677aff2 49133 7ff7f67662b0 19 API calls 49054->49133 49056->49049 49064 7ff7f677ad44 fread 49056->49064 49065 7ff7f677b05c 49057->49065 49060->49025 49061 7ff7f677ab48 strncmp 49060->49061 49061->49021 49061->49025 49063 7ff7f677af48 free 49063->49121 49064->49049 49068 7ff7f677ad62 fclose 49064->49068 49069 7ff7f677b06f 49065->49069 49076 7ff7f6778240 13 API calls 49065->49076 49070 7ff7f677ac17 free CryptStringToBinaryA 49066->49070 49071 7ff7f677abe7 GetLastError 49066->49071 49067 7ff7f677b004 free 49102 7ff7f677aa86 49067->49102 49067->49121 49074 7ff7f677ad8f malloc 49068->49074 49075 7ff7f677ad7f 49068->49075 49078 7ff7f6766430 15 API calls 49069->49078 49081 7ff7f677b082 49069->49081 49079 7ff7f677ac62 CertFindCertificateInStore 49070->49079 49080 7ff7f677aea1 CertCloseStore 49070->49080 49125 7ff7f67662b0 19 API calls 49071->49125 49124 7ff7f67662b0 19 API calls 49072->49124 49085 7ff7f677add3 PFXImportCertStore free free 49074->49085 49086 7ff7f677ada9 MultiByteToWideChar 49074->49086 49075->49074 49076->49069 49078->49081 49082 7ff7f677aeba CertCloseStore 49079->49082 49083 7ff7f677ac94 49079->49083 49080->49121 49088 7ff7f6766430 15 API calls 49081->49088 49099 7ff7f677b0cb 49081->49099 49082->49020 49083->49080 49084 7ff7f677ac06 free 49084->49121 49090 7ff7f677ae5a CertFindCertificateInStore 49085->49090 49091 7ff7f677ae04 GetLastError 49085->49091 49086->49085 49088->49099 49089 7ff7f677b12d calloc 49092 7ff7f677b187 49089->49092 49103 7ff7f677b1a0 49089->49103 49096 7ff7f677aeb6 49090->49096 49097 7ff7f677ae82 GetLastError 49090->49097 49093 7ff7f677ae19 49091->49093 49094 7ff7f677ae41 49091->49094 49134 7ff7f67662b0 19 API calls 49092->49134 49126 7ff7f67662b0 19 API calls 49093->49126 49127 7ff7f67662b0 19 API calls 49094->49127 49096->49082 49128 7ff7f67662b0 19 API calls 49097->49128 49099->49089 49102->49121 49104 7ff7f677b2ac 49103->49104 49105 7ff7f677b209 free 49103->49105 49103->49121 49108 7ff7f6766b70 48 API calls 49104->49108 49106 7ff7f677b23a 49105->49106 49107 7ff7f677b286 49105->49107 49110 7ff7f677b242 49106->49110 49111 7ff7f677b260 49106->49111 49139 7ff7f6752650 22 API calls 49107->49139 49112 7ff7f677b2cd 49108->49112 49135 7ff7f6752650 22 API calls 49110->49135 49137 7ff7f6752650 22 API calls 49111->49137 49112->49121 49141 7ff7f67662b0 19 API calls 49112->49141 49114 7ff7f677b290 49140 7ff7f67662b0 19 API calls 49114->49140 49116 7ff7f677b249 49136 7ff7f67662b0 19 API calls 49116->49136 49117 7ff7f677b26a 49138 7ff7f67662b0 19 API calls 49117->49138 49121->49052 49123->49051 49124->49102 49125->49084 49126->49102 49127->49102 49128->49080 49129->49031 49130->49063 49131->49102 49132->49054 49133->49067 49134->49121 49135->49116 49136->49102 49137->49117 49138->49102 49139->49114 49140->49102 49141->49121 49142 7ff7f675bae0 49143 7ff7f67697c0 13 API calls 49142->49143 49144 7ff7f675bb1f 49143->49144 49161 7ff7f6779010 getaddrinfo 49144->49161 49147 7ff7f675bb3b WSAGetLastError 49149 7ff7f675bb5a 49147->49149 49150 7ff7f675bb45 WSAGetLastError 49147->49150 49148 7ff7f675bb5d EnterCriticalSection 49151 7ff7f675bb6c LeaveCriticalSection 49148->49151 49152 7ff7f675bb88 49148->49152 49149->49148 49150->49148 49179 7ff7f675ba70 7 API calls 49151->49179 49153 7ff7f675bbb6 LeaveCriticalSection 49152->49153 49154 7ff7f675bb92 send 49152->49154 49158 7ff7f675bbc6 49153->49158 49154->49153 49157 7ff7f675bbad WSAGetLastError 49154->49157 49156 7ff7f675bb7d free 49156->49158 49157->49153 49159 7ff7f679ff40 8 API calls 49158->49159 49160 7ff7f675bbd5 49159->49160 49162 7ff7f675bb35 49161->49162 49164 7ff7f6779043 49161->49164 49162->49147 49162->49148 49163 7ff7f67791b4 WSASetLastError 49163->49162 49164->49163 49165 7ff7f677912e 49164->49165 49166 7ff7f6779099 malloc 49164->49166 49167 7ff7f6779177 49165->49167 49168 7ff7f6779171 freeaddrinfo 49165->49168 49171 7ff7f677915c 49166->49171 49172 7ff7f67790b0 malloc 49166->49172 49169 7ff7f677917c 49167->49169 49170 7ff7f67791af 49167->49170 49168->49167 49169->49162 49173 7ff7f6779181 free free free 49169->49173 49170->49162 49170->49163 49171->49165 49174 7ff7f677914b free 49172->49174 49175 7ff7f67790e7 memcpy 49172->49175 49173->49162 49173->49173 49174->49165 49176 7ff7f677910e 49175->49176 49177 7ff7f67790ff _strdup 49175->49177 49176->49164 49177->49176 49178 7ff7f6779130 free free 49177->49178 49178->49165 49179->49156 49180 7ff7f67a021c 49181 7ff7f67a0235 49180->49181 49182 7ff7f67a0373 49181->49182 49183 7ff7f67a023d __scrt_acquire_startup_lock 49181->49183 49262 7ff7f67a06ac 9 API calls 49182->49262 49185 7ff7f67a037d 49183->49185 49190 7ff7f67a025b __scrt_release_startup_lock 49183->49190 49263 7ff7f67a06ac 9 API calls 49185->49263 49187 7ff7f67a0388 49189 7ff7f67a0390 _exit 49187->49189 49188 7ff7f67a0280 49190->49188 49191 7ff7f67a0306 _get_initial_narrow_environment __p___argv __p___argc 49190->49191 49195 7ff7f67a02fe _register_thread_local_exe_atexit_callback 49190->49195 49200 7ff7f6751e70 49191->49200 49195->49191 49264 7ff7f679fb48 49200->49264 49204 7ff7f6751ee8 49206 7ff7f675238e ?_Throw_Cpp_error@std@@YAXH 49204->49206 49207 7ff7f6751ef3 _Thrd_detach 49204->49207 49205 7ff7f6752399 ?_Throw_Cpp_error@std@@YAXH 49206->49205 49207->49206 49208 7ff7f6751f10 16 API calls 49207->49208 49273 7ff7f6742ae0 49208->49273 49262->49185 49263->49187 49265 7ff7f679fb62 malloc 49264->49265 49266 7ff7f679fb53 49265->49266 49267 7ff7f6751e9f _beginthreadex 49265->49267 49266->49265 49268 7ff7f679fb72 49266->49268 49267->49204 49267->49205 49269 7ff7f679fb7d 49268->49269 49362 7ff7f67a0670 _CxxThrowException std::bad_alloc::bad_alloc 49268->49362 49363 7ff7f6741a30 49269->49363 49272 7ff7f679fb83 49366 7ff7f6742880 49273->49366 49275 7ff7f6742b2a 49276 7ff7f67430e8 49275->49276 49379 7ff7f67431a0 49275->49379 49495 7ff7f6743160 7 API calls 49276->49495 49278 7ff7f6743144 Sleep exit 49280 7ff7f6743158 49278->49280 49282 7ff7f6741a30 Concurrency::cancel_current_task __std_exception_copy 49280->49282 49281 7ff7f6742baf 49391 7ff7f6743c70 49281->49391 49284 7ff7f674315d 49282->49284 49285 7ff7f6742bbc 49398 7ff7f6743310 49285->49398 49287 7ff7f6742bec 49288 7ff7f6743c70 10 API calls 49287->49288 49289 7ff7f6742bf8 49288->49289 49406 7ff7f6743410 49289->49406 49291 7ff7f6742c2b 49292 7ff7f6743c70 10 API calls 49291->49292 49293 7ff7f6742c38 49292->49293 49294 7ff7f6742c8f 49293->49294 49297 7ff7f6742c88 _invalid_parameter_noinfo_noreturn 49293->49297 49295 7ff7f6742cdf 49294->49295 49299 7ff7f6742cd8 _invalid_parameter_noinfo_noreturn 49294->49299 49296 7ff7f6742d1e 49295->49296 49300 7ff7f6742d17 _invalid_parameter_noinfo_noreturn 49295->49300 49298 7ff7f6742d6c 49296->49298 49302 7ff7f6742d65 _invalid_parameter_noinfo_noreturn 49296->49302 49297->49294 49304 7ff7f6742da4 _invalid_parameter_noinfo_noreturn 49298->49304 49306 7ff7f6742dab 49298->49306 49299->49295 49300->49296 49301 7ff7f6742df9 49414 7ff7f6743590 49301->49414 49302->49298 49303 7ff7f6742e5f 49307 7ff7f6742e4a memcpy 49303->49307 49311 7ff7f679fb48 3 API calls 49303->49311 49304->49306 49306->49280 49306->49301 49306->49303 49310 7ff7f679fb48 3 API calls 49306->49310 49307->49301 49313 7ff7f6742e42 49310->49313 49311->49307 49313->49307 49315 7ff7f6742e58 _invalid_parameter_noinfo_noreturn 49313->49315 49315->49303 49364 7ff7f6741a3e Concurrency::cancel_current_task 49363->49364 49365 7ff7f6741a4f __std_exception_copy 49364->49365 49365->49272 49367 7ff7f67428d0 49366->49367 49367->49367 49368 7ff7f67428e0 system 49367->49368 49369 7ff7f6742940 49368->49369 49369->49369 49370 7ff7f6742950 system 49369->49370 49371 7ff7f67429a0 49370->49371 49371->49371 49372 7ff7f67429b0 system 49371->49372 49373 7ff7f67429f0 49372->49373 49373->49373 49374 7ff7f6742a00 system 49373->49374 49375 7ff7f6742a40 49374->49375 49375->49375 49376 7ff7f6742a50 system 49375->49376 49377 7ff7f6742ab0 49376->49377 49377->49377 49378 7ff7f6742ac0 system 49377->49378 49378->49275 49381 7ff7f67431be 49379->49381 49380 7ff7f6743208 49383 7ff7f6743267 49380->49383 49384 7ff7f6744350 7 API calls 49380->49384 49381->49380 49382 7ff7f6744350 7 API calls 49381->49382 49382->49380 49496 7ff7f6745e10 49383->49496 49384->49383 49387 7ff7f67432b6 49388 7ff7f67432f7 49387->49388 49390 7ff7f67432f0 _invalid_parameter_noinfo_noreturn 49387->49390 49388->49281 49389 7ff7f67432af _invalid_parameter_noinfo_noreturn 49389->49387 49390->49388 49392 7ff7f6743c8d 49391->49392 49393 7ff7f6743ce8 49392->49393 49394 7ff7f6743ca3 memcpy 49392->49394 49522 7ff7f6744ef0 9 API calls Concurrency::cancel_current_task 49393->49522 49394->49285 49397 7ff7f6743cfb 49397->49285 49400 7ff7f674332e 49398->49400 49399 7ff7f6743378 49523 7ff7f6746e10 49399->49523 49400->49399 49401 7ff7f6744350 7 API calls 49400->49401 49401->49399 49403 7ff7f6743394 49404 7ff7f67433f7 49403->49404 49405 7ff7f67433f0 _invalid_parameter_noinfo_noreturn 49403->49405 49404->49287 49405->49404 49407 7ff7f674342e 49406->49407 49408 7ff7f6743478 49407->49408 49409 7ff7f6744350 7 API calls 49407->49409 49410 7ff7f6746e10 12 API calls 49408->49410 49409->49408 49411 7ff7f6743494 49410->49411 49412 7ff7f67434f7 49411->49412 49413 7ff7f67434f0 _invalid_parameter_noinfo_noreturn 49411->49413 49412->49291 49413->49412 49415 7ff7f6742880 6 API calls 49414->49415 49416 7ff7f67435cc 49415->49416 49530 7ff7f6752410 49416->49530 49418 7ff7f67435d1 49419 7ff7f67435dd 49418->49419 49425 7ff7f6743672 49418->49425 49420 7ff7f6744350 7 API calls 49419->49420 49428 7ff7f6743601 49420->49428 49421 7ff7f679ff40 8 API calls 49422 7ff7f67437ca _invalid_parameter_noinfo_noreturn 49423 7ff7f6743634 49423->49421 49538 7ff7f67524d0 49425->49538 49427 7ff7f674374e 49427->49428 49429 7ff7f6743759 MessageBoxA 49427->49429 49428->49422 49428->49423 49429->49428 49495->49278 49497 7ff7f6745e5a 49496->49497 49498 7ff7f6745eaf 49496->49498 49497->49498 49500 7ff7f6745e5f memcpy 49497->49500 49499 7ff7f6745eb7 memcpy 49498->49499 49507 7ff7f6745f0b 49498->49507 49501 7ff7f6745ef1 49499->49501 49502 7ff7f6745ef4 memcpy 49499->49502 49504 7ff7f674327a 49500->49504 49501->49502 49502->49504 49503 7ff7f6745ff1 49521 7ff7f6741ad0 ?_Xlength_error@std@@YAXPEBD 49503->49521 49504->49387 49504->49389 49507->49503 49508 7ff7f6745f89 49507->49508 49511 7ff7f6745f67 49507->49511 49512 7ff7f6745fec 49507->49512 49510 7ff7f6745f74 memcpy 49508->49510 49513 7ff7f679fb48 3 API calls 49508->49513 49517 7ff7f6745fc0 49510->49517 49518 7ff7f6745fc3 memcpy 49510->49518 49516 7ff7f679fb48 3 API calls 49511->49516 49515 7ff7f6741a30 Concurrency::cancel_current_task __std_exception_copy 49512->49515 49513->49510 49515->49503 49519 7ff7f6745f6f 49516->49519 49517->49518 49518->49504 49519->49510 49520 7ff7f6745f82 _invalid_parameter_noinfo_noreturn 49519->49520 49520->49508 49522->49397 49524 7ff7f6746ed5 49523->49524 49527 7ff7f6746e40 memcpy memcpy memcpy 49523->49527 49529 7ff7f674c640 9 API calls Concurrency::cancel_current_task 49524->49529 49526 7ff7f6746eea 49526->49403 49527->49403 49529->49526 49531 7ff7f675241d calloc 49530->49531 49537 7ff7f6752480 49530->49537 49532 7ff7f6752472 49531->49532 49535 7ff7f67524ac 49532->49535 49559 7ff7f67692c0 49532->49559 49534 7ff7f67524a1 49534->49418 49535->49418 49537->49535 49590 7ff7f67621f0 calloc 49537->49590 49539 7ff7f67524e9 49538->49539 49540 7ff7f67524df 49538->49540 49541 7ff7f675251a 49539->49541 49542 7ff7f6752502 49539->49542 49540->49427 49547 7ff7f6752536 49541->49547 49640 7ff7f6756500 calloc 49541->49640 49688 7ff7f67662b0 19 API calls 49542->49688 49560 7ff7f67692de WSAStartup 49559->49560 49561 7ff7f6769326 49559->49561 49562 7ff7f6769309 49560->49562 49563 7ff7f67692f2 49560->49563 49609 7ff7f6792dc0 49561->49609 49566 7ff7f679ff40 8 API calls 49562->49566 49563->49561 49565 7ff7f6769303 WSACleanup 49563->49565 49565->49562 49568 7ff7f676931e 49566->49568 49568->49537 49569 7ff7f6769333 GetModuleHandleA 49572 7ff7f676936e GetProcAddress strpbrk 49569->49572 49573 7ff7f6769362 49569->49573 49570 7ff7f67695ef 49571 7ff7f679ff40 8 API calls 49570->49571 49574 7ff7f67695ff 49571->49574 49576 7ff7f67693cb 49572->49576 49574->49537 49591 7ff7f6762216 49590->49591 49592 7ff7f6762225 49590->49592 49591->49534 49635 7ff7f675b710 calloc 49592->49635 49594 7ff7f6762248 49595 7ff7f676225c malloc 49594->49595 49596 7ff7f676224e free 49594->49596 49598 7ff7f6762548 49595->49598 49599 7ff7f6762277 malloc 49595->49599 49597 7ff7f676252a 49596->49597 49597->49534 49602 7ff7f6762554 free free 49598->49602 49599->49598 49600 7ff7f6762292 __acrt_iob_func __acrt_iob_func __acrt_iob_func 49599->49600 49636 7ff7f675c6c0 memset 49600->49636 49639 7ff7f6761f50 free free free 49602->49639 49610 7ff7f6792dce 49609->49610 49616 7ff7f676932b 49609->49616 49611 7ff7f6769140 14 API calls 49610->49611 49612 7ff7f6792de1 49611->49612 49616->49569 49616->49570 49635->49594 49934 7ff7f67797a0 49935 7ff7f67797b5 49934->49935 49936 7ff7f6760d10 49934->49936 49939 7ff7f67797f0 49936->49939 49940 7ff7f677983c 49939->49940 49941 7ff7f6766430 15 API calls 49940->49941 49943 7ff7f6779880 49941->49943 49942 7ff7f67799f5 49946 7ff7f6779a0f free 49942->49946 49950 7ff7f6779a32 49942->49950 49943->49942 49947 7ff7f67798e4 49943->49947 49958 7ff7f6779907 49943->49958 49944 7ff7f6779a87 free 49945 7ff7f6779ac0 49944->49945 49948 7ff7f6779ac9 free 49945->49948 49949 7ff7f677990c 49945->49949 49946->49950 49962 7ff7f6752650 22 API calls 49947->49962 49948->49949 49954 7ff7f679ff40 8 API calls 49949->49954 49952 7ff7f6779a65 49950->49952 49955 7ff7f6779a5c free 49950->49955 49952->49944 49952->49945 49953 7ff7f67798f5 49963 7ff7f67662b0 19 API calls 49953->49963 49957 7ff7f6760d2c 49954->49957 49955->49952 49958->49942 49958->49949 49959 7ff7f6766b70 48 API calls 49958->49959 49960 7ff7f67799b4 49959->49960 49960->49942 49961 7ff7f6766430 15 API calls 49960->49961 49961->49942 49962->49953 49963->49958 49964 7ff7f6779b20 49965 7ff7f6792dc0 26 API calls 49964->49965 49966 7ff7f6779b29 49965->49966 49967 7ff7f676f520 49968 7ff7f676f56e 49967->49968 50001 7ff7f676f890 49968->50001 49971 7ff7f676f5a7 49973 7ff7f6778240 13 API calls 49971->49973 49986 7ff7f676f6f5 49971->49986 49972 7ff7f6766430 15 API calls 49972->49971 49975 7ff7f676f626 49973->49975 49974 7ff7f679ff40 8 API calls 49976 7ff7f676f722 49974->49976 49977 7ff7f676f64b 49975->49977 49978 7ff7f676f62a 49975->49978 49979 7ff7f6778240 13 API calls 49977->49979 50016 7ff7f67791f0 15 API calls 49978->50016 49981 7ff7f676f65d 49979->49981 49983 7ff7f676f661 49981->49983 49991 7ff7f676f682 49981->49991 49982 7ff7f676f63f 49982->49977 49984 7ff7f676f73a 49982->49984 50017 7ff7f67791f0 15 API calls 49983->50017 49987 7ff7f676f744 49984->49987 49986->49974 50021 7ff7f676eaa0 27 API calls 49987->50021 49989 7ff7f676f676 49989->49984 49989->49991 49990 7ff7f676f766 49992 7ff7f676f6ee 49990->49992 50022 7ff7f6778fc0 free free free 49990->50022 49991->49986 49996 7ff7f676f6b3 49991->49996 50018 7ff7f67932f0 534 API calls 49991->50018 49992->49986 49995 7ff7f676f6d0 49995->49986 49997 7ff7f676f6e9 49995->49997 49998 7ff7f676f6f0 49995->49998 49996->49984 49996->49995 50019 7ff7f67934f0 314 API calls 49997->50019 50020 7ff7f675b740 51 API calls 49998->50020 50002 7ff7f676f8d0 50001->50002 50003 7ff7f676f90b 50002->50003 50004 7ff7f676f8f6 tolower 50002->50004 50005 7ff7f67697c0 13 API calls 50003->50005 50004->50003 50004->50004 50006 7ff7f676f922 50005->50006 50007 7ff7f676f98c 50006->50007 50008 7ff7f676f968 tolower 50006->50008 50015 7ff7f676fa01 50006->50015 50009 7ff7f676f9c6 _time64 50007->50009 50007->50015 50011 7ff7f67697c0 13 API calls 50008->50011 50012 7ff7f676f9e5 50009->50012 50009->50015 50010 7ff7f679ff40 8 API calls 50013 7ff7f676f58b 50010->50013 50011->50007 50014 7ff7f6766430 15 API calls 50012->50014 50012->50015 50013->49971 50013->49972 50014->50015 50015->50010 50016->49982 50017->49989 50018->49996 50019->49992 50020->49986 50021->49990 50022->49992 50023 7ff7f675826b 50024 7ff7f67582b2 50023->50024 50025 7ff7f6758281 50023->50025 50026 7ff7f675835a 50024->50026 50030 7ff7f67582b0 50024->50030 50060 7ff7f676fed0 50025->50060 50028 7ff7f6758374 50026->50028 50033 7ff7f6758414 50026->50033 50307 7ff7f676d150 24 API calls 50028->50307 50032 7ff7f6757640 292 API calls 50030->50032 50055 7ff7f6757bbb 50030->50055 50031 7ff7f675829a 50034 7ff7f67759d0 2 API calls 50031->50034 50032->50055 50035 7ff7f6757640 292 API calls 50033->50035 50033->50055 50034->50030 50035->50055 50036 7ff7f6758381 50037 7ff7f6757640 292 API calls 50036->50037 50040 7ff7f67583a1 50037->50040 50039 7ff7f6758c62 50042 7ff7f67583aa 50040->50042 50043 7ff7f6758406 free 50040->50043 50041 7ff7f6758c53 50311 7ff7f67662b0 19 API calls 50041->50311 50046 7ff7f67583c1 50042->50046 50047 7ff7f67583b3 free 50042->50047 50043->50055 50045 7ff7f6758de0 17 API calls 50045->50055 50308 7ff7f676c710 28 API calls 50046->50308 50047->50055 50049 7ff7f6761d70 90 API calls 50049->50055 50051 7ff7f67583f7 free 50051->50055 50052 7ff7f6767b30 10 API calls 50052->50055 50053 7ff7f67583d2 50053->50051 50054 7ff7f6757c5e 50054->50055 50057 7ff7f67662b0 19 API calls 50054->50057 50055->50039 50055->50041 50055->50045 50055->50049 50055->50052 50055->50054 50058 7ff7f6757640 292 API calls 50055->50058 50306 7ff7f67662b0 19 API calls 50055->50306 50309 7ff7f6756360 15 API calls 50055->50309 50310 7ff7f6775b20 22 API calls 50055->50310 50057->50054 50058->50055 50061 7ff7f676ff68 50060->50061 50062 7ff7f676ffa1 free _strdup 50061->50062 50063 7ff7f676ff7e 50061->50063 50066 7ff7f676ffcb 50061->50066 50062->50063 50062->50066 50064 7ff7f679ff40 8 API calls 50063->50064 50065 7ff7f675828b 50064->50065 50065->50024 50065->50031 50067 7ff7f6770095 50066->50067 50068 7ff7f6770081 free 50066->50068 50069 7ff7f67700b4 50067->50069 50322 7ff7f67696f0 15 API calls 50067->50322 50068->50067 50069->50063 50071 7ff7f67700ff free 50069->50071 50072 7ff7f677015d 50069->50072 50073 7ff7f6770112 free 50071->50073 50081 7ff7f67701c1 50072->50081 50323 7ff7f6774dc0 337 API calls 50072->50323 50082 7ff7f677028a 50073->50082 50083 7ff7f6770263 50073->50083 50077 7ff7f67701a9 50078 7ff7f67701b0 free 50077->50078 50077->50081 50078->50063 50079 7ff7f67701fe free 50079->50063 50079->50073 50081->50079 50324 7ff7f6774dc0 337 API calls 50081->50324 50082->50063 50085 7ff7f6770346 free 50082->50085 50086 7ff7f677030e free 50082->50086 50083->50082 50325 7ff7f67696f0 15 API calls 50083->50325 50087 7ff7f6770335 50085->50087 50326 7ff7f67696f0 15 API calls 50086->50326 50087->50063 50089 7ff7f677037d 50087->50089 50095 7ff7f6770366 50087->50095 50327 7ff7f675c540 6 API calls 50089->50327 50091 7ff7f6770389 50328 7ff7f6794860 59 API calls 50091->50328 50093 7ff7f67703a2 50093->50063 50093->50095 50094 7ff7f67705ec free 50107 7ff7f677060f 50094->50107 50124 7ff7f677036b 50095->50124 50329 7ff7f675d4b0 free free 50095->50329 50096 7ff7f6770478 50098 7ff7f67704bf strchr 50096->50098 50116 7ff7f6770491 50096->50116 50101 7ff7f67704d4 strchr 50098->50101 50098->50116 50099 7ff7f6770410 50330 7ff7f675c740 26 API calls 50099->50330 50106 7ff7f67704e7 strchr 50101->50106 50101->50116 50102 7ff7f6770717 50111 7ff7f6770740 50102->50111 50112 7ff7f677077b 50102->50112 50103 7ff7f67705cc 50332 7ff7f67662b0 19 API calls 50103->50332 50104 7ff7f6770425 50331 7ff7f675d4b0 free free 50104->50331 50106->50116 50107->50102 50108 7ff7f6770645 50107->50108 50333 7ff7f67729d0 strchr strchr strchr malloc memcpy 50108->50333 50109 7ff7f6770545 50109->50103 50109->50116 50335 7ff7f67696f0 15 API calls 50111->50335 50336 7ff7f67696f0 15 API calls 50112->50336 50116->50094 50117 7ff7f677064d 50117->50063 50118 7ff7f677066b 50117->50118 50119 7ff7f6770660 free 50117->50119 50121 7ff7f6770696 50118->50121 50125 7ff7f6770680 memcpy 50118->50125 50120 7ff7f67706bf 50119->50120 50128 7ff7f67706e3 50120->50128 50334 7ff7f67696f0 15 API calls 50120->50334 50123 7ff7f677069b strchr 50121->50123 50122 7ff7f6770779 50122->50063 50122->50128 50152 7ff7f677099f 50122->50152 50126 7ff7f67706ab free 50123->50126 50127 7ff7f67706a8 50123->50127 50124->50063 50124->50096 50124->50109 50125->50123 50126->50120 50127->50126 50128->50122 50131 7ff7f67705db 50128->50131 50337 7ff7f678ee80 23 API calls 50128->50337 50131->50063 50132 7ff7f6770c30 calloc 50132->50063 50135 7ff7f6770c5f 50132->50135 50133 7ff7f6770992 50137 7ff7f678ee50 13 API calls 50133->50137 50134 7ff7f67709de 50141 7ff7f6770a1a free 50134->50141 50142 7ff7f6770b6e 50134->50142 50143 7ff7f6770a3a 50134->50143 50138 7ff7f67722a0 25 API calls 50135->50138 50136 7ff7f6770a98 50340 7ff7f67662b0 19 API calls 50136->50340 50137->50131 50144 7ff7f6770c73 50138->50144 50140 7ff7f67707f7 50140->50063 50140->50133 50338 7ff7f678efc0 8 API calls 50140->50338 50339 7ff7f67696f0 15 API calls 50141->50339 50142->50143 50147 7ff7f6770b92 free 50142->50147 50143->50063 50143->50132 50144->50063 50153 7ff7f6770ce0 50144->50153 50157 7ff7f6770ca7 50144->50157 50150 7ff7f6770bbd 50147->50150 50151 7ff7f6770bb0 50147->50151 50148 7ff7f6770ab1 50154 7ff7f6770b52 50148->50154 50163 7ff7f6770b0f 50148->50163 50149 7ff7f67708a2 50149->50133 50155 7ff7f67708aa 50149->50155 50150->50151 50156 7ff7f6770bd0 50150->50156 50344 7ff7f67696f0 15 API calls 50151->50344 50152->50134 50152->50136 50152->50148 50152->50163 50158 7ff7f6770d0e 50153->50158 50159 7ff7f6770ce5 50153->50159 50342 7ff7f67662b0 19 API calls 50154->50342 50161 7ff7f678ee50 13 API calls 50155->50161 50343 7ff7f67696f0 15 API calls 50156->50343 50345 7ff7f6771ee0 7 API calls 50157->50345 50346 7ff7f6771ee0 7 API calls 50158->50346 50160 7ff7f67722a0 25 API calls 50159->50160 50180 7ff7f6770d0c 50160->50180 50174 7ff7f67708b2 50161->50174 50163->50134 50169 7ff7f6770b39 50163->50169 50341 7ff7f67662b0 19 API calls 50169->50341 50171 7ff7f6770d2b 50171->50063 50177 7ff7f67722a0 25 API calls 50171->50177 50171->50180 50173 7ff7f6770cc8 free 50173->50180 50174->50152 50175 7ff7f67708da strstr 50174->50175 50176 7ff7f677096f 50174->50176 50178 7ff7f67708f2 50175->50178 50176->50152 50177->50180 50178->50176 50179 7ff7f67697c0 13 API calls 50178->50179 50179->50176 50180->50063 50181 7ff7f67722a0 25 API calls 50180->50181 50182 7ff7f6770f20 free free free 50181->50182 50182->50063 50184 7ff7f6770f5e 50182->50184 50183 7ff7f677111b 50183->50063 50186 7ff7f6771261 50183->50186 50350 7ff7f67785b0 _gmtime64 50183->50350 50184->50063 50184->50183 50185 7ff7f6770fc1 50184->50185 50192 7ff7f67710a5 50184->50192 50347 7ff7f675a360 62 API calls 50185->50347 50312 7ff7f6772340 50186->50312 50187 7ff7f67710f0 50187->50063 50187->50183 50190 7ff7f6771104 50187->50190 50349 7ff7f6771ee0 7 API calls 50190->50349 50191 7ff7f677114d 50194 7ff7f6771153 50191->50194 50211 7ff7f6771169 50191->50211 50192->50187 50193 7ff7f67710c4 50192->50193 50195 7ff7f67722a0 25 API calls 50192->50195 50193->50063 50196 7ff7f67722a0 25 API calls 50193->50196 50351 7ff7f67662b0 19 API calls 50194->50351 50195->50193 50196->50187 50200 7ff7f6771118 50200->50183 50201 7ff7f677126f 50201->50063 50202 7ff7f677168c 50201->50202 50203 7ff7f67712a0 50201->50203 50214 7ff7f67722a0 25 API calls 50202->50214 50224 7ff7f67716e5 50202->50224 50205 7ff7f6771633 50203->50205 50206 7ff7f6771397 50203->50206 50207 7ff7f67712b0 50203->50207 50204 7ff7f6771008 50212 7ff7f677108e 50204->50212 50219 7ff7f67722a0 25 API calls 50204->50219 50228 7ff7f6771096 50204->50228 50361 7ff7f6771ee0 7 API calls 50205->50361 50210 7ff7f67713a0 50206->50210 50223 7ff7f6771411 50206->50223 50207->50205 50244 7ff7f67712ba 50207->50244 50209 7ff7f6771649 50209->50063 50220 7ff7f6772050 62 API calls 50209->50220 50213 7ff7f67722a0 25 API calls 50210->50213 50211->50063 50211->50186 50215 7ff7f67697c0 13 API calls 50211->50215 50348 7ff7f675a2d0 9 API calls 50212->50348 50218 7ff7f67713b0 50213->50218 50214->50224 50225 7ff7f6771235 50215->50225 50216 7ff7f67714a4 50239 7ff7f6771581 50216->50239 50257 7ff7f67714bf 50216->50257 50217 7ff7f6771711 50217->50063 50240 7ff7f6771801 50217->50240 50270 7ff7f6771734 50217->50270 50218->50063 50232 7ff7f6772050 62 API calls 50218->50232 50219->50204 50227 7ff7f677166c 50220->50227 50221 7ff7f677130b 50221->50063 50229 7ff7f677132f 50221->50229 50353 7ff7f67748d0 28 API calls 50221->50353 50236 7ff7f67722a0 25 API calls 50223->50236 50238 7ff7f6771460 50223->50238 50224->50063 50224->50217 50226 7ff7f67722a0 25 API calls 50224->50226 50352 7ff7f6771ee0 7 API calls 50225->50352 50226->50217 50233 7ff7f6771676 50227->50233 50234 7ff7f67713ef 50227->50234 50228->50192 50354 7ff7f6771ee0 7 API calls 50229->50354 50231 7ff7f67722a0 25 API calls 50231->50238 50241 7ff7f67713d3 50232->50241 50362 7ff7f67662b0 19 API calls 50233->50362 50357 7ff7f676d2e0 17 API calls 50234->50357 50236->50238 50238->50063 50238->50216 50238->50231 50272 7ff7f6771565 50239->50272 50358 7ff7f67748d0 28 API calls 50239->50358 50285 7ff7f67717ac 50240->50285 50363 7ff7f67748d0 28 API calls 50240->50363 50241->50234 50248 7ff7f67713d9 50241->50248 50244->50221 50245 7ff7f67722a0 25 API calls 50244->50245 50245->50221 50246 7ff7f6771327 50246->50063 50246->50229 50356 7ff7f67662b0 19 API calls 50248->50356 50251 7ff7f6771257 50251->50063 50251->50186 50254 7ff7f6771345 50254->50063 50259 7ff7f6772050 62 API calls 50254->50259 50255 7ff7f6771837 50264 7ff7f6771851 50255->50264 50275 7ff7f6771928 50255->50275 50256 7ff7f67719c1 50371 7ff7f6771ee0 7 API calls 50256->50371 50260 7ff7f67714ff strchr 50257->50260 50257->50272 50258 7ff7f6771408 50258->50063 50373 7ff7f6775b20 22 API calls 50258->50373 50263 7ff7f6771373 50259->50263 50265 7ff7f6771514 strchr 50260->50265 50284 7ff7f6771534 50260->50284 50261 7ff7f6771777 strchr 50266 7ff7f677178c strchr 50261->50266 50261->50285 50267 7ff7f6771379 50263->50267 50268 7ff7f677138f 50263->50268 50269 7ff7f677185e 50264->50269 50264->50275 50271 7ff7f6771527 strchr 50265->50271 50265->50284 50273 7ff7f677179f strchr 50266->50273 50266->50285 50355 7ff7f67662b0 19 API calls 50267->50355 50372 7ff7f676d2e0 17 API calls 50268->50372 50364 7ff7f6771ee0 7 API calls 50269->50364 50270->50261 50270->50285 50271->50284 50359 7ff7f6771ee0 7 API calls 50272->50359 50273->50285 50275->50063 50293 7ff7f6771898 50275->50293 50369 7ff7f6771ee0 7 API calls 50275->50369 50276 7ff7f67715c0 50276->50063 50281 7ff7f6772050 62 API calls 50276->50281 50279 7ff7f6771a95 50279->50063 50288 7ff7f6766430 15 API calls 50279->50288 50287 7ff7f6771613 50281->50287 50282 7ff7f6771874 50282->50063 50291 7ff7f677189d 50282->50291 50292 7ff7f6771885 50282->50292 50283 7ff7f6771983 50289 7ff7f6772050 62 API calls 50283->50289 50284->50063 50284->50272 50285->50063 50285->50255 50285->50256 50287->50268 50290 7ff7f677161d 50287->50290 50288->50063 50294 7ff7f67719a1 50289->50294 50360 7ff7f67662b0 19 API calls 50290->50360 50297 7ff7f67718e4 50291->50297 50299 7ff7f67722a0 25 API calls 50291->50299 50365 7ff7f6771ee0 7 API calls 50292->50365 50293->50063 50293->50283 50294->50268 50298 7ff7f67719ab 50294->50298 50297->50293 50368 7ff7f6771ee0 7 API calls 50297->50368 50370 7ff7f67662b0 19 API calls 50298->50370 50302 7ff7f67718b5 50299->50302 50302->50293 50366 7ff7f6771ee0 7 API calls 50302->50366 50304 7ff7f67718cc 50304->50297 50367 7ff7f6771ee0 7 API calls 50304->50367 50306->50055 50307->50036 50308->50053 50309->50055 50310->50055 50311->50039 50313 7ff7f677236b 50312->50313 50314 7ff7f67723f0 strchr 50313->50314 50316 7ff7f6772458 _strdup 50313->50316 50319 7ff7f6772624 free 50313->50319 50320 7ff7f677264a 50313->50320 50321 7ff7f67722a0 25 API calls 50313->50321 50314->50313 50315 7ff7f6772409 strchr 50314->50315 50315->50313 50316->50313 50317 7ff7f6772669 50316->50317 50318 7ff7f6772673 free free 50317->50318 50317->50320 50318->50320 50319->50313 50320->50201 50321->50313 50322->50069 50323->50077 50324->50079 50325->50082 50326->50087 50327->50091 50328->50093 50329->50099 50330->50104 50331->50124 50332->50131 50333->50117 50334->50128 50335->50122 50336->50122 50337->50140 50338->50149 50339->50143 50340->50131 50341->50131 50342->50131 50343->50143 50344->50143 50345->50173 50346->50171 50347->50204 50348->50228 50349->50200 50350->50191 50351->50131 50352->50251 50353->50246 50354->50254 50355->50063 50356->50131 50357->50258 50358->50284 50359->50276 50360->50131 50361->50209 50362->50131 50363->50285 50364->50282 50365->50293 50366->50304 50367->50297 50368->50293 50369->50293 50370->50131 50371->50275 50372->50258 50373->50279 50374 7ff7f67589f5 50375 7ff7f6758a04 50374->50375 50379 7ff7f6758a23 50374->50379 50376 7ff7f6758a15 50375->50376 50377 7ff7f6758de0 17 API calls 50375->50377 50378 7ff7f6757640 292 API calls 50376->50378 50377->50376 50378->50379 50392 7ff7f6757bbb 50379->50392 50395 7ff7f6756360 15 API calls 50379->50395 50382 7ff7f6758c53 50398 7ff7f67662b0 19 API calls 50382->50398 50384 7ff7f6758de0 17 API calls 50384->50392 50385 7ff7f6758c62 50386 7ff7f6761d70 90 API calls 50386->50392 50388 7ff7f6767b30 10 API calls 50388->50392 50389 7ff7f67662b0 19 API calls 50390 7ff7f6757c5e 50389->50390 50390->50389 50390->50392 50392->50382 50392->50384 50392->50385 50392->50386 50392->50388 50392->50390 50393 7ff7f6757640 292 API calls 50392->50393 50394 7ff7f67662b0 19 API calls 50392->50394 50396 7ff7f6756360 15 API calls 50392->50396 50397 7ff7f6775b20 22 API calls 50392->50397 50393->50392 50394->50392 50395->50392 50396->50392 50397->50392 50398->50385 50399 7ff7f675b550 50400 7ff7f675b594 50399->50400 50401 7ff7f675b5a4 50399->50401 50403 7ff7f676ea30 3 API calls 50400->50403 50402 7ff7f676e0f0 2 API calls 50401->50402 50404 7ff7f675b5e6 50402->50404 50403->50401 50410 7ff7f675bbf0 calloc 50404->50410 50407 7ff7f675b60e 50444 7ff7f67662b0 19 API calls 50407->50444 50408 7ff7f675b605 50411 7ff7f675bd7e _errno 50410->50411 50412 7ff7f675bc41 malloc 50410->50412 50437 7ff7f675b601 50411->50437 50413 7ff7f675bccc InitializeCriticalSectionEx 50412->50413 50414 7ff7f675bcf7 50412->50414 50417 7ff7f67753a0 29 API calls 50413->50417 50415 7ff7f675bd20 free 50414->50415 50416 7ff7f675bd10 DeleteCriticalSection free 50414->50416 50418 7ff7f675bd38 50415->50418 50419 7ff7f675bd33 50415->50419 50416->50415 50420 7ff7f675bcef 50417->50420 50422 7ff7f675bd48 free 50418->50422 50423 7ff7f675bd42 closesocket 50418->50423 50446 7ff7f6778fc0 free free free 50419->50446 50420->50414 50424 7ff7f675bda6 _strdup 50420->50424 50422->50411 50423->50422 50424->50414 50425 7ff7f675bdc0 free _strdup 50424->50425 50426 7ff7f675be0e 50425->50426 50427 7ff7f675bde2 50425->50427 50428 7ff7f675be1a EnterCriticalSection LeaveCriticalSection 50426->50428 50429 7ff7f675be91 free 50426->50429 50445 7ff7f6779690 _beginthreadex 50427->50445 50431 7ff7f675be44 CloseHandle 50428->50431 50432 7ff7f675be55 50428->50432 50429->50411 50434 7ff7f675be78 50431->50434 50435 7ff7f675be5a 50432->50435 50436 7ff7f675be62 50432->50436 50433 7ff7f675bdf6 50433->50437 50438 7ff7f675bdfe _errno 50433->50438 50441 7ff7f675be88 closesocket 50434->50441 50449 7ff7f6756440 free 50434->50449 50447 7ff7f67796e0 WaitForSingleObjectEx CloseHandle 50435->50447 50448 7ff7f675ba70 7 API calls 50436->50448 50437->50407 50437->50408 50438->50426 50441->50429 50442 7ff7f675be6b free 50442->50434 50444->50408 50445->50433 50446->50418 50447->50436 50448->50442 50449->50441 50450 7ff7f6757eb0 50451 7ff7f6757ec1 50450->50451 50478 7ff7f676ed60 50451->50478 50453 7ff7f6757ef5 50454 7ff7f6757f27 50453->50454 50455 7ff7f6766430 15 API calls 50453->50455 50506 7ff7f676f7b0 314 API calls 50454->50506 50457 7ff7f6757f21 50455->50457 50457->50454 50459 7ff7f6757f37 50457->50459 50458 7ff7f6757f34 50458->50459 50482 7ff7f6758e60 50459->50482 50464 7ff7f6758de0 17 API calls 50467 7ff7f6757bbb 50464->50467 50467->50464 50468 7ff7f6758c53 50467->50468 50470 7ff7f6758c62 50467->50470 50471 7ff7f6761d70 90 API calls 50467->50471 50473 7ff7f6767b30 10 API calls 50467->50473 50474 7ff7f6757c5e 50467->50474 50477 7ff7f6757640 292 API calls 50467->50477 50504 7ff7f67662b0 19 API calls 50467->50504 50507 7ff7f6756360 15 API calls 50467->50507 50508 7ff7f6775b20 22 API calls 50467->50508 50509 7ff7f67662b0 19 API calls 50468->50509 50471->50467 50473->50467 50474->50467 50476 7ff7f67662b0 19 API calls 50474->50476 50476->50474 50477->50467 50479 7ff7f676ed8a 50478->50479 50480 7ff7f676f890 18 API calls 50479->50480 50481 7ff7f676eda9 50480->50481 50481->50453 50489 7ff7f6758ec6 50482->50489 50483 7ff7f6759248 memcpy memcpy 50484 7ff7f6759130 50483->50484 50486 7ff7f679ff40 8 API calls 50484->50486 50485 7ff7f675913a 50485->50483 50490 7ff7f6759244 50485->50490 50511 7ff7f676e710 free 50485->50511 50487 7ff7f6757f42 50486->50487 50487->50467 50498 7ff7f676f480 50487->50498 50488 7ff7f675900e calloc 50488->50484 50491 7ff7f6759028 50488->50491 50489->50485 50489->50488 50489->50491 50490->50483 50491->50484 50491->50489 50492 7ff7f676e780 malloc 50491->50492 50493 7ff7f676e440 malloc memcpy 50491->50493 50494 7ff7f6759127 free 50491->50494 50495 7ff7f675911f 50491->50495 50492->50491 50493->50491 50494->50484 50510 7ff7f676e710 free 50495->50510 50499 7ff7f676f499 50498->50499 50512 7ff7f67627d0 50499->50512 50501 7ff7f676f4b0 50502 7ff7f6757e4c 50501->50502 50503 7ff7f6761d70 90 API calls 50501->50503 50502->50467 50505 7ff7f676bec0 free 50502->50505 50503->50502 50504->50467 50505->50467 50506->50458 50507->50467 50508->50467 50509->50470 50510->50494 50511->50485 50513 7ff7f67759d0 2 API calls 50512->50513 50514 7ff7f67627f5 50513->50514 50515 7ff7f6762805 50514->50515 50516 7ff7f676282e free 50514->50516 50517 7ff7f6762859 50514->50517 50515->50501 50536 7ff7f67696f0 15 API calls 50516->50536 50518 7ff7f676e0f0 2 API calls 50517->50518 50523 7ff7f6762865 50517->50523 50520 7ff7f676288f 50518->50520 50521 7ff7f67628a3 50520->50521 50522 7ff7f67628d1 50520->50522 50524 7ff7f67670c0 616 API calls 50521->50524 50525 7ff7f67759d0 2 API calls 50522->50525 50523->50501 50526 7ff7f67628b9 50524->50526 50527 7ff7f67628de 50525->50527 50528 7ff7f67628c1 50526->50528 50529 7ff7f676e0f0 2 API calls 50526->50529 50530 7ff7f6762901 50527->50530 50531 7ff7f67759d0 2 API calls 50527->50531 50528->50501 50532 7ff7f6762994 50529->50532 50533 7ff7f6767c40 47 API calls 50530->50533 50531->50530 50532->50501 50534 7ff7f676291a 50533->50534 50534->50526 50535 7ff7f6766430 15 API calls 50534->50535 50535->50526 50536->50517 50537 7ff7f67829f0 50538 7ff7f6782a19 50537->50538 50539 7ff7f6782a80 50537->50539 50541 7ff7f6782a2a 50538->50541 50542 7ff7f6782a40 50538->50542 50540 7ff7f676c010 407 API calls 50539->50540 50545 7ff7f6782a8d 50540->50545 50611 7ff7f676bf10 405 API calls 50541->50611 50572 7ff7f67672c0 50542->50572 50552 7ff7f6782af1 50545->50552 50558 7ff7f6782b6a 50545->50558 50613 7ff7f679b3c0 35 API calls 50545->50613 50546 7ff7f6782a35 50548 7ff7f6782a51 50548->50558 50612 7ff7f6783670 65 API calls 50548->50612 50550 7ff7f6782c1e 50621 7ff7f676d2e0 17 API calls 50550->50621 50551 7ff7f6782b22 50553 7ff7f6782b7e 50551->50553 50554 7ff7f6782b2e 50551->50554 50552->50550 50552->50551 50552->50558 50566 7ff7f6782b87 50553->50566 50617 7ff7f679d450 _errno strtoll _errno 50553->50617 50614 7ff7f6783380 271 API calls 50554->50614 50559 7ff7f6782a75 50561 7ff7f6782b38 50561->50558 50615 7ff7f6782ed0 26 API calls 50561->50615 50563 7ff7f6782bde 50563->50558 50620 7ff7f679b3c0 35 API calls 50563->50620 50566->50563 50619 7ff7f6783710 72 API calls 50566->50619 50567 7ff7f6782ba3 50567->50563 50567->50566 50569 7ff7f6782bc9 50567->50569 50568 7ff7f6782b53 50568->50558 50616 7ff7f67832c0 32 API calls 50568->50616 50618 7ff7f6783710 72 API calls 50569->50618 50573 7ff7f6767318 50572->50573 50588 7ff7f676730f 50572->50588 50574 7ff7f676e0f0 2 API calls 50573->50574 50577 7ff7f6767332 50574->50577 50575 7ff7f679ff40 8 API calls 50576 7ff7f6767845 50575->50576 50576->50539 50576->50548 50578 7ff7f67673a9 50577->50578 50579 7ff7f67673c2 50577->50579 50643 7ff7f67662b0 19 API calls 50578->50643 50581 7ff7f67673cc 50579->50581 50587 7ff7f67673f9 50579->50587 50583 7ff7f6768490 611 API calls 50581->50583 50582 7ff7f67673b8 50582->50588 50584 7ff7f67673da 50583->50584 50584->50588 50589 7ff7f67685a0 51 API calls 50584->50589 50585 7ff7f6776920 19 API calls 50585->50587 50586 7ff7f67676d5 50586->50588 50645 7ff7f6768bc0 616 API calls 50586->50645 50587->50585 50587->50586 50590 7ff7f6767644 SleepEx getsockopt 50587->50590 50594 7ff7f67675e6 SleepEx getsockopt 50587->50594 50595 7ff7f67674f7 WSASetLastError 50587->50595 50596 7ff7f6766430 15 API calls 50587->50596 50599 7ff7f6767713 50587->50599 50610 7ff7f6768bc0 616 API calls 50587->50610 50644 7ff7f6752e40 27 API calls 50587->50644 50588->50575 50589->50588 50590->50587 50593 7ff7f676768c WSAGetLastError 50590->50593 50592 7ff7f67676ee 50592->50588 50598 7ff7f6767707 50592->50598 50593->50587 50594->50587 50597 7ff7f676762e WSAGetLastError 50594->50597 50595->50587 50596->50587 50597->50587 50646 7ff7f6752e40 27 API calls 50598->50646 50600 7ff7f676776b 50599->50600 50602 7ff7f6766f10 2 API calls 50599->50602 50622 7ff7f6768490 50600->50622 50602->50600 50604 7ff7f67677e7 50647 7ff7f67662b0 19 API calls 50604->50647 50605 7ff7f6767789 50605->50588 50635 7ff7f67685a0 50605->50635 50608 7ff7f6767805 50608->50588 50610->50587 50611->50546 50612->50559 50613->50552 50614->50561 50615->50568 50616->50558 50617->50567 50618->50563 50619->50563 50620->50558 50621->50558 50623 7ff7f6768595 50622->50623 50627 7ff7f67684a7 50622->50627 50623->50605 50624 7ff7f6768577 50650 7ff7f6776d80 583 API calls 50624->50650 50626 7ff7f676854a 50649 7ff7f67773d0 610 API calls 50626->50649 50627->50624 50627->50626 50630 7ff7f676852c 50627->50630 50629 7ff7f6768590 50629->50605 50630->50626 50632 7ff7f6768531 50630->50632 50631 7ff7f6768572 50631->50605 50648 7ff7f67662b0 19 API calls 50632->50648 50634 7ff7f6768540 50634->50605 50636 7ff7f67685cd 50635->50636 50637 7ff7f67685c0 50635->50637 50639 7ff7f6767c40 47 API calls 50636->50639 50638 7ff7f67759d0 2 API calls 50637->50638 50638->50636 50640 7ff7f67685dd 50639->50640 50651 7ff7f67629e0 15 API calls 50640->50651 50642 7ff7f67685e5 50642->50588 50643->50582 50644->50587 50645->50592 50646->50604 50647->50608 50648->50634 50649->50631 50650->50629 50651->50642 50652 7ff7f6771dd0 50653 7ff7f67604b0 255 API calls 50652->50653 50654 7ff7f6771de7 50653->50654
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$strchr$_strdup$callocmemcpystrstr
                                        • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                        • API String ID: 2045874074-4264080130
                                        • Opcode ID: df388712e8186f415a9c3d512b14d34def9028130db4415460419967b26806f6
                                        • Instruction ID: 6015c82488ed26e0c02c9ecd598b83bfc06efffe64fa18365ff6845e785d6315
                                        • Opcode Fuzzy Hash: df388712e8186f415a9c3d512b14d34def9028130db4415460419967b26806f6
                                        • Instruction Fuzzy Hash: 9603A161A2868285FB54EB259C603BBA7A8AF49B88F844035CE3D576D5DF3CF541C3B0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 689 7ff7f6751e70-7ff7f6751ea2 call 7ff7f679fb48 692 7ff7f6751ea4-7ff7f6751eae 689->692 693 7ff7f6751eb0 689->693 694 7ff7f6751eb3-7ff7f6751ee2 _beginthreadex 692->694 693->694 695 7ff7f6751ee8-7ff7f6751eed 694->695 696 7ff7f6752399-7ff7f67523a7 ?_Throw_Cpp_error@std@@YAXH@Z 694->696 697 7ff7f675238e-7ff7f6752398 ?_Throw_Cpp_error@std@@YAXH@Z 695->697 698 7ff7f6751ef3-7ff7f6751f0a _Thrd_detach 695->698 697->696 698->697 699 7ff7f6751f10-7ff7f6752260 GetStdHandle GetConsoleMode SetConsoleMode GetStdHandle GetConsoleScreenBufferInfoEx SetConsoleScreenBufferInfoEx GetConsoleMode SetConsoleMode GetConsoleWindow GetWindowLongA SetWindowLongA GetConsoleWindow GetWindowRect MoveWindow GetStdHandle SetConsoleTextAttribute call 7ff7f6742ae0 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 GetStdHandle SetConsoleTextAttribute call 7ff7f67523b0 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 698->699 734 7ff7f67522dd-7ff7f67522e0 699->734 735 7ff7f6752262-7ff7f67522dc call 7ff7f6743d70 * 2 call 7ff7f6743b50 * 2 URLDownloadToFileA system * 2 Sleep exit 699->735 736 7ff7f675235d-7ff7f6752362 734->736 737 7ff7f67522e2-7ff7f675235c call 7ff7f6743d70 * 2 call 7ff7f6743b50 * 2 URLDownloadToFileA system * 2 Sleep exit 734->737 735->734 741 7ff7f675236b-7ff7f675238d call 7ff7f679ff40 736->741 742 7ff7f6752364-7ff7f675236a terminate 736->742 737->736 742->741
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: Console$Handle$AttributeText$Window$Modesystem$BufferCpp_error@std@@DownloadFileInfoLongScreenSleepThrow_exit$??5?$basic_istream@D@std@@@std@@MoveRectThrd_detachU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintf_beginthreadexmallocterminate
                                        • String ID: Iniciar Valorant Aim (HVCI DESLIGADO): $ Iniciar Valorant Aim (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$C:\Windows\System32\config\SeiebingsHosDialog.exe$C:\Windows\System32\config\SerceubetisHostDialog.exe$[ Selecione uma opcao: ]$cd C:\$http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exe$http://167.114.85.75/aimhvcionattprivatestore674.exe$start C:\Windows\System32\config\SeiebingsHosDialog.exe$start C:\Windows\System32\config\SerceubetisHostDialog.exe
                                        • API String ID: 3379756739-3340239426
                                        • Opcode ID: c0970c032c7a6ab2f92a157549982e831c8b625684b59effcca0a25a6cd551d2
                                        • Instruction ID: 3b78bf92c258974f8c3eb4a0ead45af4db64e8354ed2d6e731dd5ee2acf620be
                                        • Opcode Fuzzy Hash: c0970c032c7a6ab2f92a157549982e831c8b625684b59effcca0a25a6cd551d2
                                        • Instruction Fuzzy Hash: 6FD12C21A18A4282EB04FF70ED241BAB369EF89751F840235D53E46AF5DE3CE94597B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupstrncmpstrtol
                                        • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                        • API String ID: 707411602-3372543188
                                        • Opcode ID: 3b907009211ff7cb2198ef5d328b79b85d72c5b5477c74e40b21cd7e234a9625
                                        • Instruction ID: 20b0068a33dad69317b8ea210cb65430f17fb6ecc4390ce3fdbf861d8138668c
                                        • Opcode Fuzzy Hash: 3b907009211ff7cb2198ef5d328b79b85d72c5b5477c74e40b21cd7e234a9625
                                        • Instruction Fuzzy Hash: 28428F21A18A4285FB14AF25DC606BBA3A8FB4DB84F844135DA6D477E4EF3CE544C7B0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 939 7ff7f67692c0-7ff7f67692dc 940 7ff7f67692de-7ff7f67692f0 WSAStartup 939->940 941 7ff7f6769326-7ff7f676932d call 7ff7f6792dc0 939->941 942 7ff7f6769309-7ff7f6769325 call 7ff7f679ff40 940->942 943 7ff7f67692f2-7ff7f67692f9 940->943 950 7ff7f6769333-7ff7f6769360 GetModuleHandleA 941->950 951 7ff7f67695ef-7ff7f6769606 call 7ff7f679ff40 941->951 945 7ff7f67692fb-7ff7f6769301 943->945 946 7ff7f6769303 WSACleanup 943->946 945->941 945->946 946->942 953 7ff7f676936e-7ff7f67693a3 GetProcAddress strpbrk 950->953 954 7ff7f6769362-7ff7f6769369 950->954 957 7ff7f67693cb-7ff7f67693ce 953->957 958 7ff7f67693a5-7ff7f67693ab 953->958 956 7ff7f67694f3-7ff7f67695e7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 954->956 956->951 959 7ff7f67693fa-7ff7f6769411 GetSystemDirectoryA 957->959 960 7ff7f67693d0-7ff7f67693e3 GetProcAddress 957->960 961 7ff7f67693bd-7ff7f67693c6 LoadLibraryA 958->961 962 7ff7f67693ad-7ff7f67693b8 958->962 965 7ff7f6769417-7ff7f676942a malloc 959->965 966 7ff7f67694b2 959->966 960->959 964 7ff7f67693e5-7ff7f67693f5 LoadLibraryExA 960->964 963 7ff7f67694ba-7ff7f67694cc 961->963 962->963 963->956 968 7ff7f67694ce-7ff7f67694ec GetProcAddress 963->968 964->963 969 7ff7f676942c-7ff7f676943a GetSystemDirectoryA 965->969 970 7ff7f67694a9-7ff7f67694ac free 965->970 966->963 968->956 969->970 971 7ff7f676943c-7ff7f6769446 969->971 970->966 972 7ff7f6769450-7ff7f6769459 971->972 972->972 973 7ff7f676945b-7ff7f6769460 972->973 974 7ff7f6769464-7ff7f676946b 973->974 974->974 975 7ff7f676946d-7ff7f6769476 974->975 976 7ff7f6769480-7ff7f676948c 975->976 976->976 977 7ff7f676948e-7ff7f6769494 976->977 978 7ff7f6769496-7ff7f676949e 977->978 979 7ff7f67694a0 LoadLibraryA 977->979 980 7ff7f67694a6 978->980 979->980 980->970
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                        • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                        • API String ID: 2612373469-2794540096
                                        • Opcode ID: eeb22dd33ee6f1824ceccbff02a487c861c0f39535903402c4be651aa8da3d3c
                                        • Instruction ID: b85e64196979b83f8973434de6eacc602046c95e839cce5b4a7d61a0421fe0c9
                                        • Opcode Fuzzy Hash: eeb22dd33ee6f1824ceccbff02a487c861c0f39535903402c4be651aa8da3d3c
                                        • Instruction Fuzzy Hash: B8919521A0878281E760AB21ED643BBB395FF8DB44F884135D97D067E5EF2DE44587B0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1236 7ff7f6768600-7ff7f676866d 1237 7ff7f6768672-7ff7f6768682 1236->1237 1238 7ff7f676866f 1236->1238 1239 7ff7f6768684-7ff7f676868c 1237->1239 1240 7ff7f6768691-7ff7f67686a9 memcpy 1237->1240 1238->1237 1239->1240 1241 7ff7f67686ab-7ff7f67686d6 call 7ff7f6756bd0 * 2 1240->1241 1242 7ff7f67686d8-7ff7f67686eb socket 1240->1242 1244 7ff7f67686ee-7ff7f67686fa 1241->1244 1242->1244 1245 7ff7f6768b8f 1244->1245 1246 7ff7f6768700-7ff7f6768708 1244->1246 1250 7ff7f6768b94-7ff7f6768bbd call 7ff7f679ff40 1245->1250 1248 7ff7f676870a-7ff7f6768712 call 7ff7f67755d0 1246->1248 1249 7ff7f6768717-7ff7f6768720 1246->1249 1248->1249 1252 7ff7f6768722-7ff7f676872d 1249->1252 1253 7ff7f6768730-7ff7f6768739 1249->1253 1252->1253 1256 7ff7f676873b-7ff7f676873e 1253->1256 1257 7ff7f676874c-7ff7f6768750 1253->1257 1260 7ff7f6768b3a-7ff7f6768b8d _errno * 3 call 7ff7f6752e40 call 7ff7f67662b0 call 7ff7f6766f10 1256->1260 1261 7ff7f6768744-7ff7f676874a 1256->1261 1262 7ff7f6768755-7ff7f6768767 call 7ff7f6791b00 1257->1262 1260->1250 1261->1262 1262->1260 1269 7ff7f676876d-7ff7f6768795 htons call 7ff7f6766430 1262->1269 1275 7ff7f676879c-7ff7f67687a1 1269->1275 1276 7ff7f6768797-7ff7f676879a 1269->1276 1277 7ff7f676880e 1275->1277 1278 7ff7f67687a3-7ff7f67687ad 1275->1278 1276->1275 1276->1277 1279 7ff7f6768811-7ff7f676882d 1277->1279 1278->1279 1280 7ff7f67687af-7ff7f67687db setsockopt 1278->1280 1283 7ff7f676885d-7ff7f6768860 1279->1283 1284 7ff7f676882f-7ff7f6768843 call 7ff7f6769140 1279->1284 1281 7ff7f67687dd-7ff7f6768804 WSAGetLastError call 7ff7f6752e40 call 7ff7f6766430 1280->1281 1282 7ff7f6768809-7ff7f676880c 1280->1282 1281->1282 1282->1279 1285 7ff7f67688b4-7ff7f67688b7 1283->1285 1286 7ff7f6768862-7ff7f6768887 getsockopt 1283->1286 1299 7ff7f6768845-7ff7f676884f 1284->1299 1300 7ff7f6768851-7ff7f676885b 1284->1300 1291 7ff7f67688bd-7ff7f67688c4 1285->1291 1292 7ff7f676899f-7ff7f67689a6 1285->1292 1289 7ff7f6768889-7ff7f6768891 1286->1289 1290 7ff7f6768893-7ff7f67688ae setsockopt 1286->1290 1289->1285 1289->1290 1290->1285 1291->1292 1297 7ff7f67688ca-7ff7f67688f5 setsockopt 1291->1297 1295 7ff7f67689da-7ff7f67689e1 1292->1295 1296 7ff7f67689a8-7ff7f67689d5 call 7ff7f6756bd0 * 2 1292->1296 1304 7ff7f67689e8-7ff7f6768a08 call 7ff7f6791a70 call 7ff7f6767f70 1295->1304 1305 7ff7f67689e3-7ff7f67689e6 1295->1305 1328 7ff7f67689d7 1296->1328 1329 7ff7f6768a25-7ff7f6768a27 1296->1329 1302 7ff7f676890e-7ff7f6768982 call 7ff7f6768cb0 * 2 WSAIoctl 1297->1302 1303 7ff7f67688f7-7ff7f6768909 call 7ff7f6766430 1297->1303 1299->1285 1300->1286 1302->1292 1326 7ff7f6768984-7ff7f676899a WSAGetLastError call 7ff7f6766430 1302->1326 1303->1292 1309 7ff7f6768a3e-7ff7f6768a68 call 7ff7f67755d0 call 7ff7f676e0f0 1304->1309 1323 7ff7f6768a0a-7ff7f6768a18 call 7ff7f6766f10 1304->1323 1305->1304 1305->1309 1330 7ff7f6768a6a-7ff7f6768a7a call 7ff7f6756130 1309->1330 1331 7ff7f6768a7f-7ff7f6768a82 1309->1331 1323->1245 1339 7ff7f6768a1e-7ff7f6768a20 1323->1339 1326->1292 1328->1295 1329->1295 1336 7ff7f6768a29-7ff7f6768a39 call 7ff7f6766f10 1329->1336 1330->1331 1333 7ff7f6768a88-7ff7f6768a90 1331->1333 1334 7ff7f6768b2f-7ff7f6768b38 1331->1334 1333->1334 1338 7ff7f6768a96-7ff7f6768a9d 1333->1338 1334->1250 1336->1250 1341 7ff7f6768ac8-7ff7f6768ad3 WSAGetLastError 1338->1341 1342 7ff7f6768a9f-7ff7f6768ab4 connect 1338->1342 1339->1250 1345 7ff7f6768ad5-7ff7f6768ade 1341->1345 1346 7ff7f6768b22-7ff7f6768b24 1341->1346 1342->1341 1344 7ff7f6768ab6-7ff7f6768ab8 1342->1344 1347 7ff7f6768b2b-7ff7f6768b2d 1344->1347 1348 7ff7f6768aba-7ff7f6768ac3 1344->1348 1345->1346 1349 7ff7f6768ae0-7ff7f6768b20 call 7ff7f6752e40 call 7ff7f6766430 call 7ff7f6766f10 1345->1349 1346->1347 1347->1250 1348->1250 1349->1250
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                        • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                        • API String ID: 3453287622-3868455274
                                        • Opcode ID: 4225695b9fea57ff8dac61cf89d2bc8e46375c83ee33fe930edfb22793d2201d
                                        • Instruction ID: 487712eb0fb39a9a62625eeeb151a62d648c357644aacbf1369f72fc84b7ae16
                                        • Opcode Fuzzy Hash: 4225695b9fea57ff8dac61cf89d2bc8e46375c83ee33fe930edfb22793d2201d
                                        • Instruction Fuzzy Hash: 9AF1B271A08242C6E750AB25D8642BBE3A8FB48788F804135DA6D47BD4DF7DE945CBB0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1894 7ff7f67753a0-7ff7f67753ee socket 1895 7ff7f67753f5-7ff7f677544e htonl setsockopt 1894->1895 1896 7ff7f67753f0 1894->1896 1898 7ff7f677557b-7ff7f6775597 closesocket * 3 1895->1898 1899 7ff7f6775454-7ff7f6775469 bind 1895->1899 1897 7ff7f67755a4-7ff7f67755c2 call 7ff7f679ff40 1896->1897 1900 7ff7f677559c 1898->1900 1899->1898 1902 7ff7f677546f-7ff7f6775485 getsockname 1899->1902 1900->1897 1902->1898 1904 7ff7f677548b-7ff7f677549a listen 1902->1904 1904->1898 1905 7ff7f67754a0-7ff7f67754b5 socket 1904->1905 1905->1898 1906 7ff7f67754bb-7ff7f67754d0 connect 1905->1906 1906->1898 1907 7ff7f67754d6-7ff7f67754ec accept 1906->1907 1907->1898 1908 7ff7f67754f2-7ff7f677550e call 7ff7f67697c0 1907->1908 1911 7ff7f6775515-7ff7f677551c 1908->1911 1911->1911 1912 7ff7f677551e-7ff7f6775538 send 1911->1912 1912->1898 1913 7ff7f677553a-7ff7f6775556 recv 1912->1913 1913->1898 1914 7ff7f6775558-7ff7f677556c memcmp 1913->1914 1914->1898 1915 7ff7f677556e-7ff7f6775579 closesocket 1914->1915 1915->1900
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                        • String ID:
                                        • API String ID: 3699910901-0
                                        • Opcode ID: 18acca75b82256b36fd27439601572a11a61d7d3643b22be5c7afa3228a250b6
                                        • Instruction ID: 3163610f5ade35b0d3879e4b42529b4a72c43631e31c46539fef0d8a2966574e
                                        • Opcode Fuzzy Hash: 18acca75b82256b36fd27439601572a11a61d7d3643b22be5c7afa3228a250b6
                                        • Instruction Fuzzy Hash: 2951A531618A4181E714AF25E96416AB366FB487B4F944730EA7E43AF4DF3CD885C760

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1916 7ff7f67672c0-7ff7f676730d 1917 7ff7f6767318-7ff7f6767353 call 7ff7f676e0f0 1916->1917 1918 7ff7f676730f-7ff7f6767313 1916->1918 1924 7ff7f6767358-7ff7f676735b 1917->1924 1925 7ff7f6767355 1917->1925 1919 7ff7f6767836-7ff7f6767854 call 7ff7f679ff40 1918->1919 1926 7ff7f676735d-7ff7f6767360 1924->1926 1927 7ff7f6767378 1924->1927 1925->1924 1928 7ff7f6767373-7ff7f6767376 1926->1928 1929 7ff7f6767362-7ff7f6767365 1926->1929 1930 7ff7f676737b-7ff7f67673a7 call 7ff7f676e180 1927->1930 1928->1930 1929->1930 1932 7ff7f6767367-7ff7f6767371 1929->1932 1934 7ff7f67673a9-7ff7f67673bd call 7ff7f67662b0 1930->1934 1935 7ff7f67673c2-7ff7f67673ca 1930->1935 1932->1930 1942 7ff7f6767826-7ff7f676782e 1934->1942 1937 7ff7f67673cc-7ff7f67673de call 7ff7f6768490 1935->1937 1938 7ff7f67673f9-7ff7f6767417 1935->1938 1948 7ff7f67673e0-7ff7f67673e2 1937->1948 1949 7ff7f67673f2-7ff7f67673f4 1937->1949 1941 7ff7f6767420-7ff7f6767435 1938->1941 1944 7ff7f676743b-7ff7f676744f call 7ff7f6776920 1941->1944 1945 7ff7f67676ba 1941->1945 1942->1919 1953 7ff7f6767455-7ff7f6767480 call 7ff7f676e180 1944->1953 1954 7ff7f67675d0-7ff7f67675d3 1944->1954 1947 7ff7f67676be-7ff7f67676cf 1945->1947 1947->1941 1951 7ff7f67676d5-7ff7f67676d7 1947->1951 1948->1949 1952 7ff7f67673e4-7ff7f67673ed call 7ff7f67685a0 1948->1952 1949->1942 1955 7ff7f676781c 1951->1955 1956 7ff7f67676dd-7ff7f67676f4 call 7ff7f6768bc0 1951->1956 1952->1949 1968 7ff7f6767499-7ff7f676749c 1953->1968 1969 7ff7f6767482-7ff7f6767494 call 7ff7f6766430 1953->1969 1959 7ff7f6767644-7ff7f676768a SleepEx getsockopt 1954->1959 1960 7ff7f67675d5-7ff7f67675dc 1954->1960 1962 7ff7f676781e 1955->1962 1972 7ff7f67677a7-7ff7f67677a9 1956->1972 1973 7ff7f67676fa-7ff7f6767701 1956->1973 1966 7ff7f676768c-7ff7f6767694 WSAGetLastError 1959->1966 1967 7ff7f6767696 1959->1967 1960->1959 1964 7ff7f67675de-7ff7f67675e0 1960->1964 1962->1942 1970 7ff7f67675e6-7ff7f676762c SleepEx getsockopt 1964->1970 1971 7ff7f67674ef-7ff7f67674f1 1964->1971 1974 7ff7f676769a-7ff7f676769c 1966->1974 1967->1974 1981 7ff7f67674eb 1968->1981 1982 7ff7f676749e-7ff7f67674a5 1968->1982 1969->1968 1977 7ff7f676763b-7ff7f676763f 1970->1977 1978 7ff7f676762e-7ff7f6767636 WSAGetLastError 1970->1978 1971->1945 1975 7ff7f67674f7-7ff7f676750c WSASetLastError 1971->1975 1972->1962 1979 7ff7f67677ab-7ff7f67677b2 1973->1979 1980 7ff7f6767707-7ff7f676770e 1973->1980 1983 7ff7f676769e-7ff7f67676a4 1974->1983 1984 7ff7f6767713-7ff7f6767761 1974->1984 1975->1945 1985 7ff7f6767512-7ff7f676757c call 7ff7f676f4e0 call 7ff7f6752e40 call 7ff7f6766430 1975->1985 1977->1971 1978->1971 1986 7ff7f67677bd-7ff7f67677c4 1979->1986 1987 7ff7f67677b4-7ff7f67677bb 1979->1987 1989 7ff7f67677d6-7ff7f6767819 call 7ff7f6752e40 call 7ff7f67662b0 1980->1989 1981->1971 1982->1981 1990 7ff7f67674a7-7ff7f67674d3 call 7ff7f676e180 1982->1990 1983->1984 1993 7ff7f67676a6-7ff7f67676b5 call 7ff7f6766430 1983->1993 1991 7ff7f6767763-7ff7f676776b call 7ff7f6766f10 1984->1991 1992 7ff7f6767776-7ff7f676778b call 7ff7f6768490 1984->1992 2019 7ff7f676759e-7ff7f67675b4 call 7ff7f6768bc0 1985->2019 2020 7ff7f676757e-7ff7f6767585 1985->2020 1995 7ff7f67677c6-7ff7f67677cd 1986->1995 1996 7ff7f67677cf 1986->1996 1987->1989 1989->1955 1990->1981 2011 7ff7f67674d5-7ff7f67674e6 call 7ff7f6768bc0 1990->2011 1991->1992 1992->1962 2008 7ff7f6767791-7ff7f6767793 1992->2008 1993->1945 1995->1989 1996->1989 2008->1962 2012 7ff7f6767799-7ff7f67677a2 call 7ff7f67685a0 2008->2012 2011->1981 2012->1972 2025 7ff7f67675c7-7ff7f67675cb 2019->2025 2026 7ff7f67675b6-7ff7f67675c1 2019->2026 2020->2019 2021 7ff7f6767587-7ff7f676758e 2020->2021 2023 7ff7f6767590-7ff7f6767593 2021->2023 2023->2019 2027 7ff7f6767595-7ff7f676759c 2023->2027 2025->1947 2026->1945 2026->2025 2027->2019 2027->2023
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                        • API String ID: 0-3307081561
                                        • Opcode ID: c46a26357da5376d3779cb4f8916858d5a4d6c7b13c8843079734bc1f7a32b76
                                        • Instruction ID: b8d8fd01a3e0b68a67735fa91f85c6fa61495a60cb3dbb3752acb0f793d18796
                                        • Opcode Fuzzy Hash: c46a26357da5376d3779cb4f8916858d5a4d6c7b13c8843079734bc1f7a32b76
                                        • Instruction Fuzzy Hash: 0CE1F121A086C2C2EB24AB25D9642BFA7A9FB4C794F840235DA6D077D5DF3DE441C7B0
                                        APIs
                                          • Part of subcall function 00007FF7F6750920: memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7F67411FC), ref: 00007FF7F6750958
                                        • SleepEx.KERNELBASE ref: 00007FF7F6751C8F
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6751D03
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6751D44
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6751D7C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Sleepmemcpy
                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$PRIVATE STORE -
                                        • API String ID: 18138616-2486835083
                                        • Opcode ID: f62d194c9a5506e1bc40a120267c7f5705a5248675cb0b804e02d88154972be3
                                        • Instruction ID: 12971431c7ec086708b9f4a8e13013a0a716bf60e85b4cf389d7117a014ffc1c
                                        • Opcode Fuzzy Hash: f62d194c9a5506e1bc40a120267c7f5705a5248675cb0b804e02d88154972be3
                                        • Instruction Fuzzy Hash: B481D932B1868186EB10EB24E8602AEA359FB8D794F905331EA7D07ADDDF7CD441C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLastmallocrecvsend
                                        • String ID: Send failure: %s
                                        • API String ID: 25851408-857917747
                                        • Opcode ID: ca5470411c4258048ad1888871490ee961161da3555aa0fa121fecf83c034f7d
                                        • Instruction ID: 24585736e107b5302c636d93d139083c33b4c81e375778658966726a742238a1
                                        • Opcode Fuzzy Hash: ca5470411c4258048ad1888871490ee961161da3555aa0fa121fecf83c034f7d
                                        • Instruction Fuzzy Hash: 9241B172705B8185EB61AB25E82077BA298BB0CBA8F940139CE7C473D4DE3DE440C7A0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 982 7ff7f6742ae0-7ff7f6742b2f call 7ff7f6742880 985 7ff7f67430e8-7ff7f6743157 call 7ff7f6743160 Sleep exit 982->985 986 7ff7f6742b35-7ff7f6742b3a 982->986 991 7ff7f6743158-7ff7f674315f call 7ff7f6741a30 985->991 986->985 988 7ff7f6742b40-7ff7f6742c5e call 7ff7f67431a0 call 7ff7f6743c70 call 7ff7f6743310 call 7ff7f6743c70 call 7ff7f6743410 call 7ff7f6743c70 986->988 1005 7ff7f6742c60-7ff7f6742c71 988->1005 1006 7ff7f6742c94-7ff7f6742cad 988->1006 1007 7ff7f6742c8f call 7ff7f679fb84 1005->1007 1008 7ff7f6742c73-7ff7f6742c86 1005->1008 1009 7ff7f6742caf-7ff7f6742cc1 1006->1009 1010 7ff7f6742ce5-7ff7f6742ced 1006->1010 1007->1006 1008->1007 1013 7ff7f6742c88-7ff7f6742c8e _invalid_parameter_noinfo_noreturn 1008->1013 1015 7ff7f6742cdf-7ff7f6742ce4 call 7ff7f679fb84 1009->1015 1016 7ff7f6742cc3-7ff7f6742cd6 1009->1016 1011 7ff7f6742cef-7ff7f6742d00 1010->1011 1012 7ff7f6742d23-7ff7f6742d3b 1010->1012 1017 7ff7f6742d1e call 7ff7f679fb84 1011->1017 1018 7ff7f6742d02-7ff7f6742d15 1011->1018 1019 7ff7f6742d3d-7ff7f6742d4e 1012->1019 1020 7ff7f6742d72-7ff7f6742d7a 1012->1020 1013->1007 1015->1010 1016->1015 1021 7ff7f6742cd8-7ff7f6742cde _invalid_parameter_noinfo_noreturn 1016->1021 1017->1012 1018->1017 1023 7ff7f6742d17-7ff7f6742d1d _invalid_parameter_noinfo_noreturn 1018->1023 1025 7ff7f6742d6c-7ff7f6742d71 call 7ff7f679fb84 1019->1025 1026 7ff7f6742d50-7ff7f6742d63 1019->1026 1027 7ff7f6742d7c-7ff7f6742d8d 1020->1027 1028 7ff7f6742db0-7ff7f6742df7 1020->1028 1021->1015 1023->1017 1025->1020 1026->1025 1032 7ff7f6742d65-7ff7f6742d6b _invalid_parameter_noinfo_noreturn 1026->1032 1034 7ff7f6742dab call 7ff7f679fb84 1027->1034 1035 7ff7f6742d8f-7ff7f6742da2 1027->1035 1030 7ff7f6742df9-7ff7f6742e06 1028->1030 1031 7ff7f6742e08-7ff7f6742e2b 1028->1031 1037 7ff7f6742e82-7ff7f6742ed8 call 7ff7f6743590 call 7ff7f6742880 call 7ff7f6744c10 call 7ff7f6744900 1030->1037 1038 7ff7f6742e2d-7ff7f6742e34 1031->1038 1039 7ff7f6742e5f-7ff7f6742e62 1031->1039 1032->1025 1034->1028 1035->1034 1041 7ff7f6742da4-7ff7f6742daa _invalid_parameter_noinfo_noreturn 1035->1041 1060 7ff7f6742ede-7ff7f6742eed call 7ff7f6744900 1037->1060 1061 7ff7f6742fe3-7ff7f6743053 call 7ff7f6744900 call 7ff7f679fb48 call 7ff7f6744350 call 7ff7f6745a40 call 7ff7f6743e90 1037->1061 1038->991 1043 7ff7f6742e3a-7ff7f6742e48 call 7ff7f679fb48 1038->1043 1044 7ff7f6742e6b 1039->1044 1045 7ff7f6742e64-7ff7f6742e69 call 7ff7f679fb48 1039->1045 1041->1034 1054 7ff7f6742e4a-7ff7f6742e56 1043->1054 1055 7ff7f6742e58-7ff7f6742e5e _invalid_parameter_noinfo_noreturn 1043->1055 1046 7ff7f6742e6e-7ff7f6742e7d memcpy 1044->1046 1045->1046 1046->1037 1054->1046 1055->1039 1067 7ff7f6742eef-7ff7f6742ef3 1060->1067 1068 7ff7f6742ef5 1060->1068 1089 7ff7f67430a1-7ff7f67430e7 call 7ff7f6744900 call 7ff7f6744d40 call 7ff7f6743b50 MessageBoxA call 7ff7f6743d10 exit 1061->1089 1090 7ff7f6743055-7ff7f67430a0 call 7ff7f6744900 call 7ff7f67449e0 call 7ff7f6743b50 ShellExecuteA exit 1061->1090 1070 7ff7f6742ef8-7ff7f6742f01 1067->1070 1068->1070 1071 7ff7f6742f06-7ff7f6742f29 call 7ff7f6744350 call 7ff7f6743e90 1070->1071 1072 7ff7f6742f03 1070->1072 1082 7ff7f6742f2b-7ff7f6742f3c 1071->1082 1083 7ff7f6742f5f-7ff7f6742f73 1071->1083 1072->1071 1085 7ff7f6742f5a call 7ff7f679fb84 1082->1085 1086 7ff7f6742f3e-7ff7f6742f51 1082->1086 1087 7ff7f6742fa9-7ff7f6742fe2 call 7ff7f679ff40 1083->1087 1088 7ff7f6742f75-7ff7f6742f83 1083->1088 1085->1083 1086->1085 1094 7ff7f6742f53-7ff7f6742f59 _invalid_parameter_noinfo_noreturn 1086->1094 1096 7ff7f6742fa1-7ff7f6742fa4 call 7ff7f679fb84 1088->1096 1097 7ff7f6742f85-7ff7f6742f98 1088->1097 1089->985 1090->1089 1094->1085 1096->1087 1097->1096 1102 7ff7f6742f9a-7ff7f6742fa0 _invalid_parameter_noinfo_noreturn 1097->1102 1102->1096
                                        APIs
                                          • Part of subcall function 00007FF7F6742880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67428E7
                                          • Part of subcall function 00007FF7F6742880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742957
                                          • Part of subcall function 00007FF7F6742880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67429B7
                                          • Part of subcall function 00007FF7F6742880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742A07
                                          • Part of subcall function 00007FF7F6742880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742A57
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742C88
                                          • Part of subcall function 00007FF7F6744900: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67449C0
                                          • Part of subcall function 00007FF7F679FB48: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7F674442E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F679FB62
                                          • Part of subcall function 00007FF7F6744350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F6744381
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742CD8
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742D17
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742D65
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742DA4
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742E58
                                        • memcpy.VCRUNTIME140 ref: 00007FF7F6742E7D
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742F53
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742F9A
                                        • ShellExecuteA.SHELL32 ref: 00007FF7F6743092
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674309A
                                        • MessageBoxA.USER32 ref: 00007FF7F67430D0
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67430E1
                                        • Sleep.KERNEL32 ref: 00007FF7F6743149
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6743151
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7F6743158
                                          • Part of subcall function 00007FF7F67431A0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67432AF
                                          • Part of subcall function 00007FF7F67431A0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67432F0
                                          • Part of subcall function 00007FF7F6743C70: memcpy.VCRUNTIME140 ref: 00007FF7F6743CC3
                                          • Part of subcall function 00007FF7F6743310: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67433F0
                                          • Part of subcall function 00007FF7F6743410: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67434F0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                        • String ID: Failure$download$invalidver$message$open$sessionid$success
                                        • API String ID: 3283070336-3881042241
                                        • Opcode ID: 4321e6376f8cf166e1d68dd626c12fd4ce9c40b345431646f079e2283c4281c8
                                        • Instruction ID: e17b80e672a77287ab6ace3a1653487938e137b09c0b93daaf213a4efa265a1e
                                        • Opcode Fuzzy Hash: 4321e6376f8cf166e1d68dd626c12fd4ce9c40b345431646f079e2283c4281c8
                                        • Instruction Fuzzy Hash: 4A02E962A0C782C1EB00EB34D9583AEA765EF497A4F905235DA7D07AD9DF7DD084C3A0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1113 7ff7f677bf00-7ff7f677bf7d 1114 7ff7f677bf9e-7ff7f677bfa3 1113->1114 1115 7ff7f677bf7f-7ff7f677bf83 1113->1115 1116 7ff7f677bfa5-7ff7f677bfbd call 7ff7f6766430 1114->1116 1117 7ff7f677bfc2-7ff7f677bfc6 1114->1117 1115->1114 1118 7ff7f677bf85-7ff7f677bf99 call 7ff7f6766430 1115->1118 1129 7ff7f677c3e3-7ff7f677c3e6 1116->1129 1121 7ff7f677bfc8-7ff7f677bfdc call 7ff7f6766430 1117->1121 1122 7ff7f677bfe1-7ff7f677bfe4 1117->1122 1128 7ff7f677c3ec-7ff7f677c3f9 1118->1128 1121->1129 1126 7ff7f677c2fa 1122->1126 1127 7ff7f677bfea-7ff7f677bfee 1122->1127 1134 7ff7f677c302-7ff7f677c30a 1126->1134 1127->1126 1131 7ff7f677bff4-7ff7f677c009 1127->1131 1132 7ff7f677c505-7ff7f677c50b 1128->1132 1133 7ff7f677c3ff-7ff7f677c403 1128->1133 1129->1128 1129->1132 1135 7ff7f677c00b-7ff7f677c00e 1131->1135 1136 7ff7f677c010-7ff7f677c03b realloc 1131->1136 1138 7ff7f677c51d-7ff7f677c533 1132->1138 1139 7ff7f677c50d-7ff7f677c510 1132->1139 1133->1132 1137 7ff7f677c409-7ff7f677c40d 1133->1137 1140 7ff7f677c30e 1134->1140 1135->1136 1141 7ff7f677c08d-7ff7f677c0a2 call 7ff7f6766630 1135->1141 1142 7ff7f677c05e-7ff7f677c08b 1136->1142 1143 7ff7f677c03d-7ff7f677c059 call 7ff7f67662b0 1136->1143 1137->1132 1148 7ff7f677c413-7ff7f677c428 call 7ff7f6769140 1137->1148 1144 7ff7f677c57b-7ff7f677c581 1138->1144 1145 7ff7f677c535-7ff7f677c579 memcpy * 2 1138->1145 1139->1138 1149 7ff7f677c512-7ff7f677c51a 1139->1149 1150 7ff7f677c316-7ff7f677c31c 1140->1150 1155 7ff7f677c0a7-7ff7f677c0ad 1141->1155 1142->1141 1143->1128 1153 7ff7f677c595-7ff7f677c598 1144->1153 1154 7ff7f677c583-7ff7f677c586 1144->1154 1151 7ff7f677c5a5-7ff7f677c5c7 call 7ff7f679ff40 1145->1151 1175 7ff7f677c4ee-7ff7f677c500 call 7ff7f6766430 1148->1175 1176 7ff7f677c42e-7ff7f677c430 1148->1176 1149->1138 1157 7ff7f677c3b2-7ff7f677c3b8 1150->1157 1158 7ff7f677c322-7ff7f677c337 call 7ff7f6766430 1150->1158 1161 7ff7f677c59a-7ff7f677c59e 1153->1161 1162 7ff7f677c5a0-7ff7f677c5a2 1153->1162 1154->1153 1160 7ff7f677c588-7ff7f677c590 1154->1160 1163 7ff7f677c0b3-7ff7f677c0bf 1155->1163 1164 7ff7f677c2b2-7ff7f677c2ba 1155->1164 1167 7ff7f677c3be-7ff7f677c3ce 1157->1167 1168 7ff7f677c0e0-7ff7f677c0ef 1157->1168 1179 7ff7f677c339-7ff7f677c33c 1158->1179 1180 7ff7f677c342-7ff7f677c352 1158->1180 1160->1153 1161->1162 1162->1151 1170 7ff7f677c0d9-7ff7f677c0de 1163->1170 1171 7ff7f677c0c1-7ff7f677c0c7 1163->1171 1172 7ff7f677c2bc-7ff7f677c2cd 1164->1172 1173 7ff7f677c2d2 1164->1173 1167->1129 1178 7ff7f677c3d0-7ff7f677c3d4 1167->1178 1168->1129 1177 7ff7f677c0f5-7ff7f677c0f7 1168->1177 1170->1168 1181 7ff7f677c29e-7ff7f677c2ad call 7ff7f6766430 1171->1181 1182 7ff7f677c0cd-7ff7f677c0d4 call 7ff7f6766430 1171->1182 1172->1168 1173->1170 1183 7ff7f677c2d8-7ff7f677c2f5 1173->1183 1175->1132 1176->1175 1184 7ff7f677c436-7ff7f677c442 1176->1184 1177->1129 1186 7ff7f677c0fd-7ff7f677c100 1177->1186 1187 7ff7f677c3db 1178->1187 1179->1180 1189 7ff7f677c4c2-7ff7f677c4c9 1179->1189 1190 7ff7f677c4da-7ff7f677c4e9 1180->1190 1191 7ff7f677c358-7ff7f677c399 call 7ff7f6766430 call 7ff7f677a3c0 1180->1191 1181->1170 1182->1170 1183->1168 1184->1132 1194 7ff7f677c112-7ff7f677c190 call 7ff7f6768d00 1186->1194 1195 7ff7f677c102-7ff7f677c106 1186->1195 1188 7ff7f677c3de call 7ff7f6766430 1187->1188 1188->1129 1189->1187 1190->1188 1208 7ff7f677c4ce-7ff7f677c4d5 1191->1208 1209 7ff7f677c39f-7ff7f677c3ad call 7ff7f6766430 1191->1209 1206 7ff7f677c1a4-7ff7f677c1a9 1194->1206 1207 7ff7f677c192-7ff7f677c197 1194->1207 1195->1194 1200 7ff7f677c108-7ff7f677c10c 1195->1200 1200->1129 1200->1194 1211 7ff7f677c24e-7ff7f677c252 1206->1211 1212 7ff7f677c1af-7ff7f677c1d9 1206->1212 1207->1206 1210 7ff7f677c199-7ff7f677c19e 1207->1210 1208->1188 1209->1168 1210->1206 1215 7ff7f677c447-7ff7f677c44d 1210->1215 1211->1134 1214 7ff7f677c258-7ff7f677c25d 1211->1214 1216 7ff7f677c1db-7ff7f677c1de 1212->1216 1217 7ff7f677c1e0-7ff7f677c1fb realloc 1212->1217 1214->1134 1219 7ff7f677c263-7ff7f677c275 1214->1219 1223 7ff7f677c476-7ff7f677c4a1 call 7ff7f6752650 call 7ff7f6766430 1215->1223 1224 7ff7f677c44f-7ff7f677c460 1215->1224 1216->1217 1220 7ff7f677c225-7ff7f677c229 1216->1220 1221 7ff7f677c4a6-7ff7f677c4bd call 7ff7f67662b0 1217->1221 1222 7ff7f677c201-7ff7f677c221 1217->1222 1219->1150 1226 7ff7f677c27b-7ff7f677c29c memcpy 1219->1226 1228 7ff7f677c24c 1220->1228 1229 7ff7f677c22b-7ff7f677c248 memcpy 1220->1229 1221->1129 1222->1220 1223->1129 1230 7ff7f677c46a-7ff7f677c471 1224->1230 1231 7ff7f677c462 1224->1231 1226->1140 1228->1211 1229->1228 1230->1187 1231->1230
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memcpy
                                        • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                        • API String ID: 3510742995-857957974
                                        • Opcode ID: 7b61faefabedc63db52135566a2b887fadd191366a05a4e082bc5cfa9fef71ad
                                        • Instruction ID: af4acba5657d9261103e2b18915d997c21fad3a83214f888b4000563bf3d97e3
                                        • Opcode Fuzzy Hash: 7b61faefabedc63db52135566a2b887fadd191366a05a4e082bc5cfa9fef71ad
                                        • Instruction Fuzzy Hash: 0D020472A28B4589EB50EB15DC6437BA7A8FB4CB94FA00135DA6D873E0DF79D440C7A0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1356 7ff7f677b390-7ff7f677b3fe 1357 7ff7f677b420 1356->1357 1358 7ff7f677b400-7ff7f677b415 1356->1358 1360 7ff7f677b427-7ff7f677b441 1357->1360 1358->1357 1359 7ff7f677b417-7ff7f677b41e 1358->1359 1359->1360 1361 7ff7f677bb0b 1360->1361 1362 7ff7f677b447-7ff7f677b44c 1360->1362 1362->1361 1363 7ff7f677b452-7ff7f677b460 1362->1363 1364 7ff7f677b4a2-7ff7f677b4a6 1363->1364 1365 7ff7f677b462-7ff7f677b49c malloc 1363->1365 1367 7ff7f677b4a8-7ff7f677b4ed malloc 1364->1367 1368 7ff7f677b4f3-7ff7f677b504 1364->1368 1365->1364 1366 7ff7f677baff 1365->1366 1366->1361 1367->1366 1367->1368 1369 7ff7f677b578-7ff7f677b57a 1368->1369 1370 7ff7f677b506-7ff7f677b520 realloc 1368->1370 1373 7ff7f677b57c-7ff7f677b5a0 call 7ff7f6766630 1369->1373 1374 7ff7f677b5da-7ff7f677b681 call 7ff7f6768d00 malloc 1369->1374 1371 7ff7f677b522-7ff7f677b52c call 7ff7f67662b0 1370->1371 1372 7ff7f677b560-7ff7f677b576 1370->1372 1379 7ff7f677b531 1371->1379 1372->1369 1380 7ff7f677b5a5-7ff7f677b5a8 1373->1380 1374->1366 1381 7ff7f677b687-7ff7f677b6a1 memcpy 1374->1381 1382 7ff7f677b536-7ff7f677b55f call 7ff7f679ff40 1379->1382 1383 7ff7f677b5ae-7ff7f677b5b0 1380->1383 1384 7ff7f677b81f-7ff7f677b826 1380->1384 1381->1379 1385 7ff7f677b6a7-7ff7f677b713 free 1381->1385 1387 7ff7f677b806-7ff7f677b81a call 7ff7f67662b0 1383->1387 1388 7ff7f677b5b6-7ff7f677b5be 1383->1388 1389 7ff7f677b82c-7ff7f677b838 1384->1389 1390 7ff7f677baf8-7ff7f677bafa 1384->1390 1396 7ff7f677b719-7ff7f677b720 1385->1396 1397 7ff7f677bae3-7ff7f677baea 1385->1397 1387->1382 1388->1387 1393 7ff7f677b5c4-7ff7f677b5d6 1388->1393 1389->1382 1390->1382 1393->1374 1399 7ff7f677ba8c-7ff7f677ba98 1396->1399 1400 7ff7f677b726-7ff7f677b72d 1396->1400 1398 7ff7f677baee 1397->1398 1398->1390 1403 7ff7f677bacb-7ff7f677bade 1399->1403 1404 7ff7f677ba9a-7ff7f677bac6 call 7ff7f6752650 call 7ff7f67662b0 1399->1404 1401 7ff7f677b738-7ff7f677b73f 1400->1401 1402 7ff7f677b72f-7ff7f677b732 1400->1402 1406 7ff7f677b740-7ff7f677b744 1401->1406 1402->1401 1405 7ff7f677b83d-7ff7f677b844 1402->1405 1403->1382 1404->1382 1408 7ff7f677b846-7ff7f677b84d 1405->1408 1409 7ff7f677b884-7ff7f677b8ad call 7ff7f6752650 call 7ff7f67662b0 1405->1409 1410 7ff7f677b746-7ff7f677b74a 1406->1410 1411 7ff7f677b783-7ff7f677b78a 1406->1411 1408->1404 1413 7ff7f677b853-7ff7f677b87f call 7ff7f6752650 call 7ff7f67662b0 1408->1413 1409->1379 1410->1411 1417 7ff7f677b74c-7ff7f677b767 call 7ff7f6766b70 1410->1417 1414 7ff7f677b78c 1411->1414 1415 7ff7f677b799-7ff7f677b7a2 1411->1415 1413->1382 1414->1415 1415->1406 1421 7ff7f677b7a4-7ff7f677b7a8 1415->1421 1428 7ff7f677b76c-7ff7f677b772 1417->1428 1425 7ff7f677b7ae-7ff7f677b7b3 1421->1425 1426 7ff7f677b8d8-7ff7f677b8df 1421->1426 1425->1426 1430 7ff7f677b7b9-7ff7f677b7ca 1425->1430 1432 7ff7f677b8e7-7ff7f677b8ee 1426->1432 1433 7ff7f677b778-7ff7f677b77d 1428->1433 1434 7ff7f677b8b2-7ff7f677b8d3 call 7ff7f67662b0 1428->1434 1430->1432 1437 7ff7f677b7d0-7ff7f677b7f4 memcpy 1430->1437 1432->1398 1435 7ff7f677b8f4-7ff7f677b8f7 1432->1435 1433->1411 1433->1434 1434->1382 1439 7ff7f677b8f9 1435->1439 1440 7ff7f677b903-7ff7f677b90b 1435->1440 1437->1435 1441 7ff7f677b7fa-7ff7f677b7ff 1437->1441 1439->1440 1443 7ff7f677b90d-7ff7f677b927 1440->1443 1444 7ff7f677b933 1440->1444 1441->1387 1443->1444 1445 7ff7f677b929-7ff7f677b931 1443->1445 1446 7ff7f677b93b-7ff7f677b93e 1444->1446 1445->1446 1447 7ff7f677b944-7ff7f677b975 1446->1447 1448 7ff7f677ba60-7ff7f677ba68 1446->1448 1453 7ff7f677b97b-7ff7f677b983 1447->1453 1454 7ff7f677ba33-7ff7f677ba5e call 7ff7f6752650 call 7ff7f67662b0 1447->1454 1448->1390 1449 7ff7f677ba6e-7ff7f677ba79 1448->1449 1449->1390 1450 7ff7f677ba7b-7ff7f677ba87 call 7ff7f6796410 1449->1450 1450->1382 1453->1454 1457 7ff7f677b989-7ff7f677b98c 1453->1457 1460 7ff7f677ba05-7ff7f677ba08 1454->1460 1459 7ff7f677b98e-7ff7f677b995 1457->1459 1457->1460 1464 7ff7f677b997-7ff7f677b9be memset call 7ff7f6798df0 1459->1464 1465 7ff7f677ba00 1459->1465 1462 7ff7f677ba0a CertFreeCertificateContext 1460->1462 1463 7ff7f677ba10-7ff7f677ba12 1460->1463 1462->1463 1463->1448 1467 7ff7f677ba14-7ff7f677ba25 call 7ff7f67662b0 1463->1467 1471 7ff7f677b9fb 1464->1471 1472 7ff7f677b9c0-7ff7f677b9ca 1464->1472 1465->1460 1467->1382 1471->1465 1474 7ff7f677b9cc-7ff7f677b9d6 1472->1474 1475 7ff7f677ba2a-7ff7f677ba31 1472->1475 1474->1475 1477 7ff7f677b9d8-7ff7f677b9ea call 7ff7f675fa20 1474->1477 1476 7ff7f677b9f3-7ff7f677b9f6 call 7ff7f67662b0 1475->1476 1476->1471 1477->1471 1481 7ff7f677b9ec 1477->1481 1481->1476
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                        • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                        • API String ID: 860210379-3059304359
                                        • Opcode ID: 33083d5a4ab3fab8abe531587ed7af61f0cfc09a19abb5bdc5bef848adb27145
                                        • Instruction ID: f881caa1cee9111426febe2a1cb6720069148e01ae7beb55a6a9bd9aeda7825e
                                        • Opcode Fuzzy Hash: 33083d5a4ab3fab8abe531587ed7af61f0cfc09a19abb5bdc5bef848adb27145
                                        • Instruction Fuzzy Hash: F2127332A18B8185E760EF29DC643ABA7A8FB49B84F900136DA6D477D4DF38D445C7A0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1482 7ff7f677a5b0-7ff7f677a620 1483 7ff7f677a622-7ff7f677a634 1482->1483 1484 7ff7f677a63f 1482->1484 1483->1484 1485 7ff7f677a636-7ff7f677a63d 1483->1485 1486 7ff7f677a646-7ff7f677a660 call 7ff7f6769140 1484->1486 1485->1486 1489 7ff7f677a662-7ff7f677a66c call 7ff7f6766430 1486->1489 1490 7ff7f677a671-7ff7f677a678 1486->1490 1489->1490 1492 7ff7f677a67a-7ff7f677a69a GetModuleHandleA GetProcAddress 1490->1492 1493 7ff7f677a6b8 1490->1493 1492->1493 1494 7ff7f677a69c-7ff7f677a6b2 call 7ff7f6769140 1492->1494 1495 7ff7f677a6ba-7ff7f677a6cb 1493->1495 1494->1493 1504 7ff7f677a6b4-7ff7f677a6b6 1494->1504 1497 7ff7f677a6cd-7ff7f677a6e5 1495->1497 1498 7ff7f677a6f0 1495->1498 1497->1498 1500 7ff7f677a6e7-7ff7f677a6ee 1497->1500 1501 7ff7f677a6f7-7ff7f677a6fa 1498->1501 1500->1501 1502 7ff7f677a6fc-7ff7f677a713 call 7ff7f6769140 1501->1502 1503 7ff7f677a73b-7ff7f677a742 1501->1503 1510 7ff7f677a715-7ff7f677a720 1502->1510 1511 7ff7f677a722-7ff7f677a736 call 7ff7f67662b0 1502->1511 1506 7ff7f677a746-7ff7f677a757 1503->1506 1504->1495 1508 7ff7f677a77c 1506->1508 1509 7ff7f677a759-7ff7f677a771 1506->1509 1513 7ff7f677a783-7ff7f677a785 1508->1513 1509->1508 1512 7ff7f677a773-7ff7f677a77a 1509->1512 1510->1506 1521 7ff7f677b33d-7ff7f677b366 call 7ff7f679ff40 1511->1521 1512->1513 1515 7ff7f677a7c8-7ff7f677a7d2 1513->1515 1516 7ff7f677a787-7ff7f677a7a3 call 7ff7f6760ca0 call 7ff7f67606c0 1513->1516 1518 7ff7f677a7d8-7ff7f677a803 1515->1518 1519 7ff7f677b047-7ff7f677b05e call 7ff7f6778240 1515->1519 1542 7ff7f677a7a5-7ff7f677a7bd 1516->1542 1543 7ff7f677a7c0-7ff7f677a7c3 call 7ff7f6760cd0 1516->1543 1522 7ff7f677a83b 1518->1522 1523 7ff7f677a805-7ff7f677a81c 1518->1523 1535 7ff7f677b073-7ff7f677b07d call 7ff7f6766430 1519->1535 1536 7ff7f677b060-7ff7f677b071 call 7ff7f6778240 1519->1536 1531 7ff7f677a840-7ff7f677a84a 1522->1531 1527 7ff7f677a81e-7ff7f677a823 1523->1527 1528 7ff7f677a825-7ff7f677a82c 1523->1528 1527->1531 1533 7ff7f677a82e-7ff7f677a833 1528->1533 1534 7ff7f677a835-7ff7f677a839 1528->1534 1538 7ff7f677a84c-7ff7f677a84f 1531->1538 1539 7ff7f677a852-7ff7f677a85d 1531->1539 1533->1531 1534->1531 1546 7ff7f677b082-7ff7f677b08d 1535->1546 1536->1535 1536->1546 1538->1539 1540 7ff7f677a863-7ff7f677a878 1539->1540 1541 7ff7f677b02f-7ff7f677b03e call 7ff7f67662b0 1539->1541 1540->1541 1541->1519 1555 7ff7f677b338 1541->1555 1542->1543 1543->1515 1550 7ff7f677b116-7ff7f677b128 1546->1550 1551 7ff7f677b093-7ff7f677b114 call 7ff7f6766430 call 7ff7f6768cc0 1546->1551 1554 7ff7f677b12d-7ff7f677b185 calloc 1550->1554 1551->1554 1557 7ff7f677b187-7ff7f677b191 call 7ff7f67662b0 1554->1557 1558 7ff7f677b1a0-7ff7f677b1a3 1554->1558 1555->1521 1561 7ff7f677b196-7ff7f677b19b 1557->1561 1558->1561 1562 7ff7f677b1a5-7ff7f677b203 1558->1562 1561->1521 1565 7ff7f677b2ac-7ff7f677b2c8 call 7ff7f6766b70 1562->1565 1566 7ff7f677b209-7ff7f677b238 free 1562->1566 1573 7ff7f677b2cd-7ff7f677b2ea 1565->1573 1567 7ff7f677b23a-7ff7f677b240 1566->1567 1568 7ff7f677b286-7ff7f677b2a7 call 7ff7f6752650 call 7ff7f67662b0 1566->1568 1571 7ff7f677b242-7ff7f677b25b call 7ff7f6752650 call 7ff7f67662b0 1567->1571 1572 7ff7f677b260-7ff7f677b281 call 7ff7f6752650 call 7ff7f67662b0 1567->1572 1568->1521 1571->1555 1572->1521 1582 7ff7f677b2ec-7ff7f677b2ef 1573->1582 1583 7ff7f677b329-7ff7f677b330 1573->1583 1582->1583 1587 7ff7f677b2f1-7ff7f677b327 1582->1587 1583->1555 1588 7ff7f677b333 call 7ff7f67662b0 1583->1588 1587->1521 1588->1555
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                        • API String ID: 1646373207-2477831187
                                        • Opcode ID: 600a2d6ef8a24b98ff0e21a09ed65c441c72a1fdbf57e51a75a25158795c13ca
                                        • Instruction ID: 213d34c834def7dd56b4ec206c0b7b86d27020993bca822d2a90ba92eff958bb
                                        • Opcode Fuzzy Hash: 600a2d6ef8a24b98ff0e21a09ed65c441c72a1fdbf57e51a75a25158795c13ca
                                        • Instruction Fuzzy Hash: BF02B232A18B818AE710AF25D8602EFB7A8FB49B88F804135DA6D477D5DF3CD545C7A0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1590 7ff7f675bbf0-7ff7f675bc3b calloc 1591 7ff7f675bd7e-7ff7f675bd87 _errno 1590->1591 1592 7ff7f675bc41-7ff7f675bcca malloc 1590->1592 1593 7ff7f675bd89-7ff7f675bda5 1591->1593 1594 7ff7f675bccc-7ff7f675bcf1 InitializeCriticalSectionEx call 7ff7f67753a0 1592->1594 1595 7ff7f675bd07-7ff7f675bd0e 1592->1595 1605 7ff7f675bcf7-7ff7f675bcff 1594->1605 1606 7ff7f675bda6-7ff7f675bdba _strdup 1594->1606 1596 7ff7f675bd20-7ff7f675bd31 free 1595->1596 1597 7ff7f675bd10-7ff7f675bd1a DeleteCriticalSection free 1595->1597 1599 7ff7f675bd38-7ff7f675bd40 1596->1599 1600 7ff7f675bd33 call 7ff7f6778fc0 1596->1600 1597->1596 1603 7ff7f675bd48-7ff7f675bd78 free 1599->1603 1604 7ff7f675bd42 closesocket 1599->1604 1600->1599 1603->1591 1604->1603 1605->1595 1606->1595 1607 7ff7f675bdc0-7ff7f675bde0 free _strdup 1606->1607 1608 7ff7f675be0e-7ff7f675be18 1607->1608 1609 7ff7f675bde2-7ff7f675bdf1 call 7ff7f6779690 1607->1609 1610 7ff7f675be1a-7ff7f675be42 EnterCriticalSection LeaveCriticalSection 1608->1610 1611 7ff7f675be91-7ff7f675beac free 1608->1611 1615 7ff7f675bdf6-7ff7f675bdfc 1609->1615 1613 7ff7f675be44-7ff7f675be4c CloseHandle 1610->1613 1614 7ff7f675be55-7ff7f675be58 1610->1614 1611->1591 1616 7ff7f675be78-7ff7f675be7b 1613->1616 1617 7ff7f675be5a-7ff7f675be5d call 7ff7f67796e0 1614->1617 1618 7ff7f675be62-7ff7f675be72 call 7ff7f675ba70 free 1614->1618 1619 7ff7f675be4e-7ff7f675be50 1615->1619 1620 7ff7f675bdfe-7ff7f675be0b _errno 1615->1620 1623 7ff7f675be7d-7ff7f675be83 call 7ff7f6756440 1616->1623 1624 7ff7f675be88-7ff7f675be8b closesocket 1616->1624 1617->1618 1618->1616 1619->1593 1620->1608 1623->1624 1624->1611
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                        • String ID:
                                        • API String ID: 259767416-0
                                        • Opcode ID: 9946771ebfa93f8112a25e13f28b7c82d86f9117cef022ce9e19fa975779aa41
                                        • Instruction ID: 472e5b42fdbb052e3b291c48892ee4aa3c6ab940fd21272c77174bbcd7df61c3
                                        • Opcode Fuzzy Hash: 9946771ebfa93f8112a25e13f28b7c82d86f9117cef022ce9e19fa975779aa41
                                        • Instruction Fuzzy Hash: C1817122D15B8182E724EF11E96027AB364FB99B54F445235DBAE037A6DF38E4D4C360
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                        • API String ID: 0-760484938
                                        • Opcode ID: 5cb594704e5a14a3a99ff94c5cd79eddc6f9554907c6ec994f531ed743c6ce03
                                        • Instruction ID: a81e61e9c9ffe5eaadc44652aa4af2e4d55db5e9926bbce6425d2343bf1bd3bf
                                        • Opcode Fuzzy Hash: 5cb594704e5a14a3a99ff94c5cd79eddc6f9554907c6ec994f531ed743c6ce03
                                        • Instruction Fuzzy Hash: A942DA21A08BC2D1EB58AB2199603BAE798FB49B94F841135DE6D473C5DF3DE460C3B0

                                        Control-flow Graph

                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67524A1,?,?,?,?,00007FF7F67435D1), ref: 00007FF7F6762208
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F6762251
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: callocfree
                                        • String ID: <$<$<$`$v
                                        • API String ID: 306872129-2056843887
                                        • Opcode ID: 96fc72d4107bc01bf252997c18d8b870d50ec99ce162ed03cf5650f0768a792d
                                        • Instruction ID: 13ea348ba39edd2586e5f49c36f855918e7d980da0889f91477e65798b283e0d
                                        • Opcode Fuzzy Hash: 96fc72d4107bc01bf252997c18d8b870d50ec99ce162ed03cf5650f0768a792d
                                        • Instruction Fuzzy Hash: 6E915B32908BC185E3109F24D9143E977A4FB59B5CF485238DFA80A3DADFBA9195C760

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,?,?,00007FF7F6792DFA,?,?,?,?,00007FF7F676932B), ref: 00007FF7F6768FB4
                                        • GetProcAddress.KERNEL32(?,?,00007FF7F6792DFA,?,?,?,?,00007FF7F676932B), ref: 00007FF7F6768FD9
                                        • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF7F6792DFA,?,?,?,?,00007FF7F676932B), ref: 00007FF7F6768FEC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProcstrpbrk
                                        • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                        • API String ID: 27745253-3327535076
                                        • Opcode ID: ed8c58319feda3e2ef0bf4467202deb353ecfa3ac03bdd26cde5824d9b1eb468
                                        • Instruction ID: e78f195efdb2dd7c0300290c5608e70c97b671c29900575d3dad146db70a6209
                                        • Opcode Fuzzy Hash: ed8c58319feda3e2ef0bf4467202deb353ecfa3ac03bdd26cde5824d9b1eb468
                                        • Instruction Fuzzy Hash: 06419452B0964385EB15AF16AD2017AA795AF4AF91F8C4130CE7D037E1EE3ED486C770

                                        Control-flow Graph

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_errnogetpeernamegetsockname
                                        • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                        • API String ID: 2911674258-670633250
                                        • Opcode ID: 1d68d23901f2bc99712f764ecee20f1df52790d8a263a8a7c26a230ac7d5d946
                                        • Instruction ID: 8f4f630cf10661a5f685bf698b340bcbba21966d3d7d27d4768465c25ae53617
                                        • Opcode Fuzzy Hash: 1d68d23901f2bc99712f764ecee20f1df52790d8a263a8a7c26a230ac7d5d946
                                        • Instruction Fuzzy Hash: 9591A332A18BC182D710DF25D9642EA73A4FB8CB88F885235DF5C47669DF39D185CB60

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2063 7ff7f6779010-7ff7f677903d getaddrinfo 2064 7ff7f67791d4-7ff7f67791e1 2063->2064 2065 7ff7f6779043-7ff7f6779055 2063->2065 2066 7ff7f677905b 2065->2066 2067 7ff7f67791b4-7ff7f67791bd WSASetLastError 2065->2067 2069 7ff7f6779060-7ff7f6779066 2066->2069 2068 7ff7f67791c3-7ff7f67791d0 2067->2068 2068->2064 2070 7ff7f677906d-7ff7f6779070 2069->2070 2071 7ff7f6779068-7ff7f677906b 2069->2071 2073 7ff7f6779076 2070->2073 2074 7ff7f6779121-7ff7f6779128 2070->2074 2072 7ff7f6779079-7ff7f677907d 2071->2072 2072->2074 2076 7ff7f6779083-7ff7f677908a 2072->2076 2073->2072 2074->2069 2075 7ff7f677912e 2074->2075 2078 7ff7f6779162-7ff7f677916f 2075->2078 2076->2074 2077 7ff7f6779090-7ff7f6779093 2076->2077 2077->2074 2079 7ff7f6779099-7ff7f67790aa malloc 2077->2079 2080 7ff7f6779177-7ff7f677917a 2078->2080 2081 7ff7f6779171 freeaddrinfo 2078->2081 2084 7ff7f677915c 2079->2084 2085 7ff7f67790b0-7ff7f67790e5 malloc 2079->2085 2082 7ff7f677917c-7ff7f677917f 2080->2082 2083 7ff7f67791af-7ff7f67791b2 2080->2083 2081->2080 2086 7ff7f67791aa-7ff7f67791ad 2082->2086 2087 7ff7f6779181-7ff7f67791a8 free * 3 2082->2087 2083->2067 2083->2068 2084->2078 2088 7ff7f677914b-7ff7f677915a free 2085->2088 2089 7ff7f67790e7-7ff7f67790fd memcpy 2085->2089 2086->2068 2087->2086 2087->2087 2088->2078 2090 7ff7f677910e-7ff7f6779118 2089->2090 2091 7ff7f67790ff-7ff7f677910c _strdup 2089->2091 2093 7ff7f677911e 2090->2093 2094 7ff7f677911a 2090->2094 2091->2090 2092 7ff7f6779130-7ff7f6779149 free * 2 2091->2092 2092->2078 2093->2074 2094->2093
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                        • String ID:
                                        • API String ID: 2364279375-0
                                        • Opcode ID: 1fb9b7d07c9e8a83ca4e6813051c7f37d9c67e9dd09fc361b0a1b938884a6115
                                        • Instruction ID: 68bdc13c299837ac1090660d521807330a8f84fdef09b44f3675354f4a570d56
                                        • Opcode Fuzzy Hash: 1fb9b7d07c9e8a83ca4e6813051c7f37d9c67e9dd09fc361b0a1b938884a6115
                                        • Instruction Fuzzy Hash: 80513D35A1A74282EB64AF11AD2413AA7A8FB59B90F444035DEAE03795DF3CE854C7B0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2095 7ff7f6776920-7ff7f6776965 2096 7ff7f677699b-7ff7f67769b5 2095->2096 2097 7ff7f6776967-7ff7f677696a 2095->2097 2099 7ff7f67769cc-7ff7f67769e7 2096->2099 2100 7ff7f67769b7-7ff7f67769c7 2096->2100 2097->2096 2098 7ff7f677696c-7ff7f677696f 2097->2098 2098->2096 2101 7ff7f6776971-7ff7f6776974 2098->2101 2102 7ff7f67769ed-7ff7f67769f2 2099->2102 2103 7ff7f6776a77-7ff7f6776a83 2099->2103 2100->2099 2104 7ff7f6776976 2101->2104 2105 7ff7f6776994-7ff7f6776996 2101->2105 2108 7ff7f6776a07-7ff7f6776a0a 2102->2108 2109 7ff7f67769f4-7ff7f67769fe 2102->2109 2106 7ff7f6776a85-7ff7f6776a99 2103->2106 2107 7ff7f6776ad0-7ff7f6776ada 2103->2107 2115 7ff7f677698b-7ff7f677698e Sleep 2104->2115 2116 7ff7f6776978-7ff7f6776986 WSASetLastError 2104->2116 2117 7ff7f6776c3d 2105->2117 2118 7ff7f6776a9b 2106->2118 2119 7ff7f6776aaf-7ff7f6776ab1 2106->2119 2113 7ff7f6776adc-7ff7f6776adf 2107->2113 2114 7ff7f6776b13-7ff7f6776b1b 2107->2114 2111 7ff7f6776a2d-7ff7f6776a32 2108->2111 2112 7ff7f6776a0c-7ff7f6776a10 2108->2112 2109->2108 2110 7ff7f6776a00-7ff7f6776a05 2109->2110 2110->2108 2110->2109 2123 7ff7f6776a44-7ff7f6776a4e 2111->2123 2124 7ff7f6776a34-7ff7f6776a3b 2111->2124 2112->2111 2122 7ff7f6776a12-7ff7f6776a26 2112->2122 2113->2114 2126 7ff7f6776ae1-7ff7f6776ae3 2113->2126 2127 7ff7f6776b1d-7ff7f6776b20 2114->2127 2128 7ff7f6776b22 2114->2128 2115->2105 2116->2117 2125 7ff7f6776c3f-7ff7f6776c5f call 7ff7f679ff40 2117->2125 2129 7ff7f6776aa0-7ff7f6776aa7 2118->2129 2120 7ff7f6776ac9-7ff7f6776acc 2119->2120 2121 7ff7f6776ab3-7ff7f6776ab6 2119->2121 2120->2107 2121->2120 2130 7ff7f6776ab8-7ff7f6776ac5 2121->2130 2122->2111 2134 7ff7f6776a6b-7ff7f6776a73 2123->2134 2135 7ff7f6776a50-7ff7f6776a58 2123->2135 2124->2123 2131 7ff7f6776a3d-7ff7f6776a42 2124->2131 2126->2114 2133 7ff7f6776ae5-7ff7f6776ae8 2126->2133 2136 7ff7f6776b5a-7ff7f6776b8a select 2127->2136 2137 7ff7f6776b24-7ff7f6776b4e 2128->2137 2138 7ff7f6776b50-7ff7f6776b53 2128->2138 2129->2119 2139 7ff7f6776aa9-7ff7f6776aad 2129->2139 2130->2120 2131->2123 2131->2124 2143 7ff7f6776aea-7ff7f6776aec 2133->2143 2144 7ff7f6776af1 2133->2144 2134->2103 2135->2134 2145 7ff7f6776a5a-7ff7f6776a67 2135->2145 2141 7ff7f6776b90-7ff7f6776b9a 2136->2141 2137->2136 2138->2136 2140 7ff7f6776b55 2138->2140 2139->2119 2139->2129 2140->2136 2146 7ff7f6776b9c-7ff7f6776b9f 2141->2146 2147 7ff7f6776ba4 2141->2147 2143->2141 2148 7ff7f6776b06-7ff7f6776b11 Sleep 2144->2148 2149 7ff7f6776af3-7ff7f6776b01 WSASetLastError 2144->2149 2145->2134 2146->2125 2150 7ff7f6776bad-7ff7f6776bb0 2147->2150 2151 7ff7f6776ba6-7ff7f6776ba8 2147->2151 2148->2141 2149->2141 2152 7ff7f6776bb2-7ff7f6776bda __WSAFDIsSet * 2 2150->2152 2153 7ff7f6776bdf-7ff7f6776be2 2150->2153 2151->2125 2152->2153 2154 7ff7f6776bdc 2152->2154 2155 7ff7f6776c0e-7ff7f6776c11 2153->2155 2156 7ff7f6776be4-7ff7f6776bf5 __WSAFDIsSet 2153->2156 2154->2153 2155->2117 2157 7ff7f6776c13-7ff7f6776c24 __WSAFDIsSet 2155->2157 2158 7ff7f6776bfa-7ff7f6776c09 __WSAFDIsSet 2156->2158 2159 7ff7f6776bf7 2156->2159 2160 7ff7f6776c29-7ff7f6776c38 __WSAFDIsSet 2157->2160 2161 7ff7f6776c26 2157->2161 2158->2155 2162 7ff7f6776c0b 2158->2162 2159->2158 2160->2117 2163 7ff7f6776c3a 2160->2163 2161->2160 2162->2155 2163->2117
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleep
                                        • String ID:
                                        • API String ID: 1458359878-0
                                        • Opcode ID: 7e3a5c8391cbd2fe5a66151918e3f45155f736d235638181fdd996934fd2847e
                                        • Instruction ID: 82648dcd39d278b9e14c8fca6b09318306f2751303bd9a923a672e61b237e249
                                        • Opcode Fuzzy Hash: 7e3a5c8391cbd2fe5a66151918e3f45155f736d235638181fdd996934fd2847e
                                        • Instruction Fuzzy Hash: 4A911C21B2C68286EF646E159C602BBE299FB4D354F944134E93E86BCCDE3CF9049670
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: calloc
                                        • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                        • API String ID: 2635317215-3812100122
                                        • Opcode ID: eff8b956742bb68419ca025f1cdfc5da50cfc823b85c2868b4250ee5da627a45
                                        • Instruction ID: 55ed381e3f84dbea154a0e9b377db486a298a9624fbd242f057d6ee90ff90c73
                                        • Opcode Fuzzy Hash: eff8b956742bb68419ca025f1cdfc5da50cfc823b85c2868b4250ee5da627a45
                                        • Instruction Fuzzy Hash: 3751D721A0CB82C6F719AB25D8A037AA798EB48794F940031DFAD437D5DF3EE45197B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: system
                                        • String ID: .8$h%49
                                        • API String ID: 3377271179-4206735779
                                        • Opcode ID: 23d25a257ec8e6a06825ac2238ab2d79f1aaa4dbc3fa61955fb06a3204d1439f
                                        • Instruction ID: 5171ce72734fbcf15097e085791a77fd9bca270f98e6d681416ac13f3f4895d1
                                        • Opcode Fuzzy Hash: 23d25a257ec8e6a06825ac2238ab2d79f1aaa4dbc3fa61955fb06a3204d1439f
                                        • Instruction Fuzzy Hash: 38618C22E187D688F301DB7CEC151BCB774BB9D708F845328CE9925E59EBA86148C3A4
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                        • String ID:
                                        • API String ID: 1133592946-0
                                        • Opcode ID: 53dfa699f0e776e93b8434ed3c0ad4270c14bc29c46198c7798260165ce92bd4
                                        • Instruction ID: 53ae35764e2a41b93819ce2f428673e5f236888ba4a523cc4555930315a2e434
                                        • Opcode Fuzzy Hash: 53dfa699f0e776e93b8434ed3c0ad4270c14bc29c46198c7798260165ce92bd4
                                        • Instruction Fuzzy Hash: 8B31FA21A0824382FB14BB659D712BB9299AF4D788FC44839E56D476F7DE2CF84482F1
                                        APIs
                                          • Part of subcall function 00007FF7F6779010: getaddrinfo.WS2_32 ref: 00007FF7F6779032
                                          • Part of subcall function 00007FF7F6779010: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F675BB35), ref: 00007FF7F677909E
                                          • Part of subcall function 00007FF7F6779010: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F675BB35), ref: 00007FF7F67790D8
                                          • Part of subcall function 00007FF7F6779010: memcpy.VCRUNTIME140(?,?,?,00007FF7F675BB35), ref: 00007FF7F67790F1
                                          • Part of subcall function 00007FF7F6779010: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F675BB35), ref: 00007FF7F67790FF
                                          • Part of subcall function 00007FF7F6779010: freeaddrinfo.WS2_32(?,?,?,00007FF7F675BB35), ref: 00007FF7F6779171
                                          • Part of subcall function 00007FF7F6779010: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F675BB35), ref: 00007FF7F6779185
                                          • Part of subcall function 00007FF7F6779010: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F675BB35), ref: 00007FF7F677918F
                                          • Part of subcall function 00007FF7F6779010: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F675BB35), ref: 00007FF7F677919C
                                        • WSAGetLastError.WS2_32 ref: 00007FF7F675BB3B
                                        • WSAGetLastError.WS2_32 ref: 00007FF7F675BB45
                                        • EnterCriticalSection.KERNEL32 ref: 00007FF7F675BB60
                                        • LeaveCriticalSection.KERNEL32 ref: 00007FF7F675BB6F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F675BB80
                                        • send.WS2_32 ref: 00007FF7F675BBA3
                                        • WSAGetLastError.WS2_32 ref: 00007FF7F675BBAD
                                        • LeaveCriticalSection.KERNEL32 ref: 00007FF7F675BBC0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                        • String ID:
                                        • API String ID: 506363382-0
                                        • Opcode ID: 2cc453d08f745c6a3c59f832767adf90c4defb3494f8eef72683afc19a1c4f9f
                                        • Instruction ID: d37d86a4ee3e709a5470fc5e196c5b27f0a7801e3bf1eb9f1c59565a5f8a001e
                                        • Opcode Fuzzy Hash: 2cc453d08f745c6a3c59f832767adf90c4defb3494f8eef72683afc19a1c4f9f
                                        • Instruction Fuzzy Hash: 3D311021608642C6EB50AF25D8B026AA3A4FB49F94F840171D56E836E8DF7CD885C7B1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleep
                                        • String ID:
                                        • API String ID: 1458359878-0
                                        • Opcode ID: 8a5b4f1b789db9ccb89845b8f97dcc9209c77af34dde97e523798634a5c91cdc
                                        • Instruction ID: 8590717b3589c31b823157e24dd08009b305e6c1c4f21f8035a3c5748074b9be
                                        • Opcode Fuzzy Hash: 8a5b4f1b789db9ccb89845b8f97dcc9209c77af34dde97e523798634a5c91cdc
                                        • Instruction Fuzzy Hash: CCA10B21A3865286EF696E15DC2027BA29DFF49B94F944234DA3E467CCDF3DD90093B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                        • API String ID: 1294909896-116363806
                                        • Opcode ID: c3b4f57cf65ba70a8d264e738fe77378482dafe256b561fec5b44b1c6e9d6791
                                        • Instruction ID: 3739d16f2cf79574bf23aa2b8456c4147578db69c19ecf1fe661eef58d5858da
                                        • Opcode Fuzzy Hash: c3b4f57cf65ba70a8d264e738fe77378482dafe256b561fec5b44b1c6e9d6791
                                        • Instruction Fuzzy Hash: EC917C32615F8185EB109F2AD8606AEB7B8F789B84F840135CE6D477A9DF38D445CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                        • API String ID: 3056473165-3891197721
                                        • Opcode ID: 027ddc12495d3bc9130bb9d065d1a08c5876b868ffb2f9c7ad1546824842d674
                                        • Instruction ID: 8b45e7be0ff8a3383401ad3800da2791670098f15aae12db9a3bdc82d5b26b80
                                        • Opcode Fuzzy Hash: 027ddc12495d3bc9130bb9d065d1a08c5876b868ffb2f9c7ad1546824842d674
                                        • Instruction Fuzzy Hash: 13715E72B14B418AE710DB65D8606AE73B9BB4CBA8F404235DE3D477D4EE38E505C7A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s$Connection #%ld to host %s left intact
                                        • API String ID: 1294909896-118628944
                                        • Opcode ID: 7bbbfc9fc39b892fe47f4d760995b619898a2bed64aad6e52c5ec38839e87b67
                                        • Instruction ID: f1ef3fc961d42e42d93953a75afc3f87ab310c47531c0c5b5d4287697a5d2b7b
                                        • Opcode Fuzzy Hash: 7bbbfc9fc39b892fe47f4d760995b619898a2bed64aad6e52c5ec38839e87b67
                                        • Instruction Fuzzy Hash: 45918731B0868182E758BB259D643BBA399FB49B84F844471DE6D076D9CF39E860C7F0
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F6761AFB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F6761B11
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F676192D
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F676194A
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F676195E
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F676197A
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761997
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F67619BA
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F67619CE
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F67619E2
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761A08
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761A1C
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761A30
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761A7F
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761A8C
                                          • Part of subcall function 00007FF7F67618B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761AB5
                                        • memset.VCRUNTIME140 ref: 00007FF7F6761B45
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$memset
                                        • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                        • API String ID: 2717317152-3248832348
                                        • Opcode ID: 0b5af3561c7f0beabbbfc97a2aecd37f8a35a6766f80842a6e57c91dfd642cc5
                                        • Instruction ID: 6cb7b8abca0ac30633a0b1184c192a5c37d48fbfe05f54d9c8a52209683d76b5
                                        • Opcode Fuzzy Hash: 0b5af3561c7f0beabbbfc97a2aecd37f8a35a6766f80842a6e57c91dfd642cc5
                                        • Instruction Fuzzy Hash: 2371836290CBC2C1E751EF3998243BEA754EB59B94F984231DE6D0B2D5DF3AE45083B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$memcpy
                                        • String ID: 1.1
                                        • API String ID: 4107583993-2150719395
                                        • Opcode ID: 9c93a6a937aa17bde0d74d21f4712d5c5711554ab9829be0d6950b6c6c408ace
                                        • Instruction ID: df1e74874cd4801c716792de2f3614d1c3af61947026f7bd4705546db676a966
                                        • Opcode Fuzzy Hash: 9c93a6a937aa17bde0d74d21f4712d5c5711554ab9829be0d6950b6c6c408ace
                                        • Instruction Fuzzy Hash: 99516E72618A81C6D7649B26E9603AAA3A4FB49B84F844031DFBD47795DF3CE051C3A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Resolving timed out after %I64d milliseconds
                                        • API String ID: 1294909896-3343404259
                                        • Opcode ID: 09adf2ee5de9c113138e5bdaa025590f3709708e40e62865b75a7a1d270c404f
                                        • Instruction ID: 68143d991b40f8b7e20b395544aaa9eac727100f7c6af52750e46b3d960a93c6
                                        • Opcode Fuzzy Hash: 09adf2ee5de9c113138e5bdaa025590f3709708e40e62865b75a7a1d270c404f
                                        • Instruction Fuzzy Hash: DED1B861A0865686FB14AF2598603BAE3A9FF49B88F845571CD2D072DDDF39E840C3F0
                                        APIs
                                          • Part of subcall function 00007FF7F6742880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67428E7
                                          • Part of subcall function 00007FF7F6742880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742957
                                          • Part of subcall function 00007FF7F6742880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67429B7
                                          • Part of subcall function 00007FF7F6742880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742A07
                                          • Part of subcall function 00007FF7F6742880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742A57
                                        • MessageBoxA.USER32 ref: 00007FF7F6743767
                                          • Part of subcall function 00007FF7F6744350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F6744381
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67437CA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                        • String ID: keyauth.win$null
                                        • API String ID: 3545939226-2841560827
                                        • Opcode ID: ce61b5d2d3cd7e7a6b303e8ebb867933d344e954f3b112cff01f36256831fc2a
                                        • Instruction ID: 64bc3725c9692b984026e4a5037ca0e945e749751a081a758bf7b921d332f777
                                        • Opcode Fuzzy Hash: ce61b5d2d3cd7e7a6b303e8ebb867933d344e954f3b112cff01f36256831fc2a
                                        • Instruction Fuzzy Hash: 5C51F922B1879185FB04EB75D8643AE6329EB48B94F804135DE6C17BDADF3C9551C3A0
                                        APIs
                                          • Part of subcall function 00007FF7F6768FA0: GetModuleHandleA.KERNEL32(?,?,?,00007FF7F6792DFA,?,?,?,?,00007FF7F676932B), ref: 00007FF7F6768FB4
                                        • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF7F676932B), ref: 00007FF7F6792E10
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: AddressCallerHandleModuleProc
                                        • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                        • API String ID: 2084706301-3788156360
                                        • Opcode ID: 5e3a6711635448fff0480283db2dd73f071ee0026d5417c64c4451555ff8fb5c
                                        • Instruction ID: aa3554c9b1adb64b94ce4aede6e8f1bd73193e132824891b1cf98558ef4fc585
                                        • Opcode Fuzzy Hash: 5e3a6711635448fff0480283db2dd73f071ee0026d5417c64c4451555ff8fb5c
                                        • Instruction Fuzzy Hash: CCF0FB64E1960381FF49BB25ADA57B293D8AF6D744FC41134C43C466E1FE6CE14582B0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Resolving timed out after %I64d milliseconds
                                        • API String ID: 0-3343404259
                                        • Opcode ID: 7163487e0e08904306f2315dbf6caa09e5d06ad51b43a8eb750352c4f908bad4
                                        • Instruction ID: 27ba919f2b968e8b838df2ddbbdc09e87e1d53a57b5e51ccc940f916366810a3
                                        • Opcode Fuzzy Hash: 7163487e0e08904306f2315dbf6caa09e5d06ad51b43a8eb750352c4f908bad4
                                        • Instruction Fuzzy Hash: 07B19461A08652C6FB64BE25987437EE2A9EF49B48F941571C92E072D9DF39EC40C3F0
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F6771D10
                                          • Part of subcall function 00007FF7F67722A0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F67722FA
                                          • Part of subcall function 00007FF7F6772050: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F67720E8
                                          • Part of subcall function 00007FF7F6772050: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F67720F1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$calloc
                                        • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                        • API String ID: 3095843317-1242256665
                                        • Opcode ID: 12a3b756e3a1d393b36be2a69d81cf88d7aceeae8688892eb10545e4adfc044c
                                        • Instruction ID: 3d6b6c82e84dfdb372523524f576ba5c5a80a468ecbf37bbc0f0623f15de9da7
                                        • Opcode Fuzzy Hash: 12a3b756e3a1d393b36be2a69d81cf88d7aceeae8688892eb10545e4adfc044c
                                        • Instruction Fuzzy Hash: CA41BC31A1C68245E750EF25AC203BBA7A9EB49784F984031DA6D476D5EE3DD444CBB0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: closesocket$calloc
                                        • String ID:
                                        • API String ID: 2958813939-0
                                        • Opcode ID: e28c916339dedfe44fd95df593345c4999c6d8e87ebf0f6fd9375ee375a5f3fe
                                        • Instruction ID: 3d73a4ab6315ed20fe701045f272070f8cf50c8f855235b0c539d95b5ff71ed4
                                        • Opcode Fuzzy Hash: e28c916339dedfe44fd95df593345c4999c6d8e87ebf0f6fd9375ee375a5f3fe
                                        • Instruction Fuzzy Hash: 7B413F31608B4281E750FF35D8602EAA369EB9C724FC84635DE6D462DAEF39D54583B0
                                        APIs
                                        • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7F67411FC), ref: 00007FF7F6750958
                                        • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7F67411FC), ref: 00007FF7F67509F9
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7F6750A17
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task
                                        • String ID:
                                        • API String ID: 326894585-0
                                        • Opcode ID: b53f007d235b3f06568d166cbfc5e17c10bef2aa46fa8e4ff4674de9681ddfa7
                                        • Instruction ID: 650c8ed7399b3cf87901d24c93fa6fa9430257936307e68588e6733313fae95d
                                        • Opcode Fuzzy Hash: b53f007d235b3f06568d166cbfc5e17c10bef2aa46fa8e4ff4674de9681ddfa7
                                        • Instruction Fuzzy Hash: 3B31DD52B0964681FB157B61AD2437E92589F0CBA4F940670DE7D07BC9DF3CB89283B0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                        • API String ID: 0-3791222319
                                        • Opcode ID: 74baeda4dae7d99788308fae891779589567f69d9637ea5b15e34d4b19c0cf18
                                        • Instruction ID: 18a2c2572349a878746417cb32473a24e00b41e695dfa201c67c4fae45b2ea28
                                        • Opcode Fuzzy Hash: 74baeda4dae7d99788308fae891779589567f69d9637ea5b15e34d4b19c0cf18
                                        • Instruction Fuzzy Hash: 5D51D821A1868285FB54AB25996427BA398EB4C7A8F944231DE3D473D5DE3DE081C7B0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freerecv
                                        • String ID:
                                        • API String ID: 2032557106-0
                                        • Opcode ID: 9fb7283d3b3fe2a32a5a4308ef32750d50e53da8e2d5037518f41ed1d519b0cc
                                        • Instruction ID: 877ed3323a386dcd58bccb6e94ce7cc268568026ced541ab89117e33fb9d1db6
                                        • Opcode Fuzzy Hash: 9fb7283d3b3fe2a32a5a4308ef32750d50e53da8e2d5037518f41ed1d519b0cc
                                        • Instruction Fuzzy Hash: 08C1093260868285EB25AB2598603BBA3A4FB487A4F944275DE7D437D8DF3CEC41D760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                        • API String ID: 1294909896-3248832348
                                        • Opcode ID: f606bcd2038c5ef08dcce9581c18184adf0bd88fa452844af4fc4b9c61b2a22f
                                        • Instruction ID: f9b7bfa1b84bbdb08f7518fd31b77a8fc8a0f3452cec8c25a1c6a322248a4ab3
                                        • Opcode Fuzzy Hash: f606bcd2038c5ef08dcce9581c18184adf0bd88fa452844af4fc4b9c61b2a22f
                                        • Instruction Fuzzy Hash: A351A262A0C7C1C1E7819F24D9603AAA754E788B98F8C4131DEAC1B3DADF79D490C370
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ConsoleSleepTitle_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 4275364305-0
                                        • Opcode ID: d93b49df8ad4e5ec2ae08ef71ace1e26886ffdca7d49e109a83afd150722af17
                                        • Instruction ID: 7ecfe8d7b9bde9637377561787d920a988d715e1cc2f80c14d05ce7771b00449
                                        • Opcode Fuzzy Hash: d93b49df8ad4e5ec2ae08ef71ace1e26886ffdca7d49e109a83afd150722af17
                                        • Instruction Fuzzy Hash: 26117361E1858681EB10FB24EC7436AA364FB8E795FC04235E5BD06AEDDE2CE440C770
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: calloc
                                        • String ID: HTTP/3 requested for non-HTTPS URL
                                        • API String ID: 2635317215-2596823961
                                        • Opcode ID: c5c85e1a956d13f6fd0069bca0f306340e2efd00978a76907ad6a57b28f2a682
                                        • Instruction ID: a034b486bab0a90b9386b73d3d2ca5aaa34a33d5b49048b3ab96fccc38d8f4f5
                                        • Opcode Fuzzy Hash: c5c85e1a956d13f6fd0069bca0f306340e2efd00978a76907ad6a57b28f2a682
                                        • Instruction Fuzzy Hash: 9A119E22B18A8082EB55DB16E4503AEA364E78CB84F885135EF5D07B99DF38D5918B60
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLastrecv
                                        • String ID:
                                        • API String ID: 2514157807-0
                                        • Opcode ID: cd326ec70821d1c6bd3ccd5998ab6033c7b5e388acd7fa64615cf810a5de8fbd
                                        • Instruction ID: 728656ef0f767c015c2e80a65beb2ae9760b4d998ceb0688406f2d1f04a4e8db
                                        • Opcode Fuzzy Hash: cd326ec70821d1c6bd3ccd5998ab6033c7b5e388acd7fa64615cf810a5de8fbd
                                        • Instruction Fuzzy Hash: 15E0DF21F0460982FF286771B87433A1298AB48731F884774CA3A867D0EA2C84D65761
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_func__stdio_common_vfprintf
                                        • String ID:
                                        • API String ID: 2168557111-0
                                        • Opcode ID: 0899256543c42a584bb2c1203292e23dbc0e11d5bfc7daf5769558ae29ecc1bd
                                        • Instruction ID: 6abaa1875163955079aaea99ce80c8b1638edd268ed4a1ca23b7de188f677ecc
                                        • Opcode Fuzzy Hash: 0899256543c42a584bb2c1203292e23dbc0e11d5bfc7daf5769558ae29ecc1bd
                                        • Instruction Fuzzy Hash: 4DE03932A08B8182D700AB50FD1446AF3A8FB987C4F844135EB9C47A68CF7CC1A5CB90
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: closesocket
                                        • String ID:
                                        • API String ID: 2781271927-0
                                        • Opcode ID: 28d1a3e97e11a378cd7bab388fd231acb8ccc8f46742947f7eb31e0aaede86b5
                                        • Instruction ID: cf47ba8011f61a908288edd589cb0cb11a4f3d8db2da313fbf53d325a0ac1eb9
                                        • Opcode Fuzzy Hash: 28d1a3e97e11a378cd7bab388fd231acb8ccc8f46742947f7eb31e0aaede86b5
                                        • Instruction Fuzzy Hash: 3501BE11B05541C1EB44EB2AD5683BFA350EF4CB84F984071D72D472D9CF2DD49587A1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: socket
                                        • String ID:
                                        • API String ID: 98920635-0
                                        • Opcode ID: 9e121afd51efe3525e7e93993d230028a9956c294c58347a9c52cac5dba89217
                                        • Instruction ID: 25588e9752d274729a49d5e0d7e5a0ccd01913cfa0ca6d8bf9480b3328168bfd
                                        • Opcode Fuzzy Hash: 9e121afd51efe3525e7e93993d230028a9956c294c58347a9c52cac5dba89217
                                        • Instruction Fuzzy Hash: 97E02B35E06101C1CF08772188611B623607B44734FC44370C53C033D0CE2DD2569B70
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _beginthreadex
                                        • String ID:
                                        • API String ID: 3014514943-0
                                        • Opcode ID: a2f10a116a4385fa7276dd3863204c228892657fe7e053c5a7e9772d6e2cbb02
                                        • Instruction ID: 5ea0db11d0e67f8e96495117c346bab8e976d2c5b0ec5c7f553d7666b71fcf6f
                                        • Opcode Fuzzy Hash: a2f10a116a4385fa7276dd3863204c228892657fe7e053c5a7e9772d6e2cbb02
                                        • Instruction Fuzzy Hash: D9D0C263718A00829B109F61A850029E251B788770B884738AE7D82BE0EB38D1414600
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ioctlsocket
                                        • String ID:
                                        • API String ID: 3577187118-0
                                        • Opcode ID: 590ac8b3d2ea95d7b222035a517254eae77e8f4ea7ddc23fbb583e43bf786d7b
                                        • Instruction ID: 5552a6664fe284972b6fe86d77f45ac192745fea20609b4a1a82ae498344e579
                                        • Opcode Fuzzy Hash: 590ac8b3d2ea95d7b222035a517254eae77e8f4ea7ddc23fbb583e43bf786d7b
                                        • Instruction Fuzzy Hash: 9DC08056F15581C2C3446F615885087A771BBC4304FD56435D10742534DD3CC6E59B50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                        • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                        • API String ID: 3939785054-690044944
                                        • Opcode ID: 02b158a5d06cb4d669ca7a5a0a1d934c2b7e1cd1307387fd3b949a54989a76ae
                                        • Instruction ID: faca259194a4946294458c6af45f9ae32d256b99359e6ad95479431e66072183
                                        • Opcode Fuzzy Hash: 02b158a5d06cb4d669ca7a5a0a1d934c2b7e1cd1307387fd3b949a54989a76ae
                                        • Instruction Fuzzy Hash: BFC2B771A1868285FB50AB259C243FBA799EF49B98F884135CE2D473D9DE3DE440C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                                        • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                        • API String ID: 2059720140-3844637060
                                        • Opcode ID: e3f99c3e3755d2d6c1980cd8f88d78ae643bc3364991d747844ef04f6e2ddb54
                                        • Instruction ID: 05bc62b5d3bff11c43f1cd623d3ebd37dfeb96d60766c32a0bb5062bd79cc82a
                                        • Opcode Fuzzy Hash: e3f99c3e3755d2d6c1980cd8f88d78ae643bc3364991d747844ef04f6e2ddb54
                                        • Instruction Fuzzy Hash: D8728521A087C685FB61AB25DC6037BA7A8EF5D744F844171DA7D026DADF2CE844C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                        • String ID: array$number overflow parsing '$object$object key$object separator
                                        • API String ID: 1664669839-85532522
                                        • Opcode ID: 6bad89433c570a47db82fdfe098d3b7112479f4ef1bdb9ba293033d34251bd8a
                                        • Instruction ID: cbd337bdf619787d72d29c6ccbef919b573d0c85f5fb2e4605029f9654c1ed12
                                        • Opcode Fuzzy Hash: 6bad89433c570a47db82fdfe098d3b7112479f4ef1bdb9ba293033d34251bd8a
                                        • Instruction Fuzzy Hash: E8A2E762A1CB86C5EB00EB78D8543AEA365FB49794F900235DA7D03AD9DF7CD085D3A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateNameOpenString
                                        • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                        • API String ID: 561913010-2037819326
                                        • Opcode ID: 8fe9d2f109287e050480a03d61a4f1592479ca31c33be7afb087222c66a7d160
                                        • Instruction ID: ea034ed646a29695ff2e402cd190b69aff4aaf570bf224b5d2c1f3ac5f6c6c9b
                                        • Opcode Fuzzy Hash: 8fe9d2f109287e050480a03d61a4f1592479ca31c33be7afb087222c66a7d160
                                        • Instruction Fuzzy Hash: 2342A431A08B4285FB10AB25D8602BBA3A9FB4DB94F944235D96D077D4EF3CE544E7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLastcallocfreegetsockname
                                        • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                        • API String ID: 2454324209-2383553807
                                        • Opcode ID: 27752254a2b98af5a327733a83d12af13c9a39782593a03f8ff59690da20c5f1
                                        • Instruction ID: 107491ebb09795e2e63f0da8df6b10e8af81a77e53d0827c7204770bfbd5aac7
                                        • Opcode Fuzzy Hash: 27752254a2b98af5a327733a83d12af13c9a39782593a03f8ff59690da20c5f1
                                        • Instruction Fuzzy Hash: 2022C861A0878281FB90AB31DC602BBA799FB4DB84FD44031EA6D476D5DE3CE944C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CreateFile_errnofree
                                        • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                        • API String ID: 1377488173-902404565
                                        • Opcode ID: b60ae0a3e11252f255f745c7d8c5013fc966c3bf32b0f57156b27088207e8443
                                        • Instruction ID: 7c37a2926c604743365579f73ca3d9784a0c57305fe822e8315a7fc5fa90ee3e
                                        • Opcode Fuzzy Hash: b60ae0a3e11252f255f745c7d8c5013fc966c3bf32b0f57156b27088207e8443
                                        • Instruction Fuzzy Hash: A7B19321B1874282F711AB25EC206ABA6A9BB4D784FD00135DE6D477D4EE3DE504DBF0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$realm
                                        • API String ID: 2190258309-2223379150
                                        • Opcode ID: 00054798b3ee31d4ec5c4e2b6474e5fe0190e5e25ecd9c171ea297b6566ac7c2
                                        • Instruction ID: 48d00b2c80331fa3c3ba388d736c039641cbcf6ea488433122155bc7445efcfb
                                        • Opcode Fuzzy Hash: 00054798b3ee31d4ec5c4e2b6474e5fe0190e5e25ecd9c171ea297b6566ac7c2
                                        • Instruction Fuzzy Hash: CE127F32A18B4685E710EF25E9642AAB7E8FB49B84F900135DE6D43B94EF38D505C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strncmp$memset
                                        • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                                        • API String ID: 3268688168-2769131373
                                        • Opcode ID: 542789331aea4744b241b9653c3e388fd6f0a648ef1bcf93e0f4917bb3758312
                                        • Instruction ID: c5abb9cb9e798367fe939cea1310b18a6d22f381314939fa2c051b8ce096b9a0
                                        • Opcode Fuzzy Hash: 542789331aea4744b241b9653c3e388fd6f0a648ef1bcf93e0f4917bb3758312
                                        • Instruction Fuzzy Hash: 17E1D222A1868285E710EB21DC202BBE768FB9DB88F805135DE6E437D5DF7DD58487B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$Xbad_function_call@std@@
                                        • String ID: array$number overflow parsing '$object
                                        • API String ID: 958247072-579821726
                                        • Opcode ID: cc42e23da44563c21996daa89caf7799f9ff30c9e3c015dcccd6dd62b989381a
                                        • Instruction ID: 976883b22ad274d2f5bec39ea06a4fcb818b78371423bbfbe6f40bc2156f8fa4
                                        • Opcode Fuzzy Hash: cc42e23da44563c21996daa89caf7799f9ff30c9e3c015dcccd6dd62b989381a
                                        • Instruction Fuzzy Hash: 9D32D462A18B86C5EB10DB78D8583EEA325FB49794F904235DA6D07AD9DF7CD080D3A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdup$fclosefgetsfopen
                                        • String ID: $default$login$machine$password
                                        • API String ID: 431015889-155862542
                                        • Opcode ID: 3b9ab05d245bb638eb372d7337051c70e5ccafd0718b603233c0295b21409033
                                        • Instruction ID: ac96f0563f23f4ca43e6825d52fa1ce6f02feaefa648439c51a2a9cd000abc23
                                        • Opcode Fuzzy Hash: 3b9ab05d245bb638eb372d7337051c70e5ccafd0718b603233c0295b21409033
                                        • Instruction Fuzzy Hash: C8A1C422A1D68295FB61AB359D3037BE6E8AF5D784F884031DE6D026D4FE3DE45086B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _errno$strtol
                                        • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                        • API String ID: 3596500743-988243589
                                        • Opcode ID: 630c3f7c29af7cc51b7054100824388b0dc4b27b1364d234017239c35fcdbd3b
                                        • Instruction ID: fe74a8b5736532029c9c12bf9f04048b36cb5435c289c36b49505cf09712eff2
                                        • Opcode Fuzzy Hash: 630c3f7c29af7cc51b7054100824388b0dc4b27b1364d234017239c35fcdbd3b
                                        • Instruction Fuzzy Hash: B4F1FA72F245118AEB24AB64C8201BEFBA9BB58758F904235DE3E577D4DE38E40587F0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                        • API String ID: 600764987-1965992168
                                        • Opcode ID: 829df8a539cfc324d627f26e87fab25fce76e1812c0feca66b179d4148e9b6fe
                                        • Instruction ID: fd9ecdbabb28db53791cf10216125e6106d6589a00287bf0e8cc6e3ff928646a
                                        • Opcode Fuzzy Hash: 829df8a539cfc324d627f26e87fab25fce76e1812c0feca66b179d4148e9b6fe
                                        • Instruction Fuzzy Hash: 2031432260D6C185E761BF20AD243ABB3A8FB88744F840575DABD02AD9DF3CD544CBB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Can not multiplex, even if we wanted to!$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to!$Found bundle for host %s: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found!$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                                        • API String ID: 0-2774518510
                                        • Opcode ID: 463185ac01c37561fe25943f588e72614978ff5e74e0f5d87f8adfd4293e2094
                                        • Instruction ID: 678f73f62596f11851353d8dc3a2433fe6a11447e4e1cde615b7ae8f825097a2
                                        • Opcode Fuzzy Hash: 463185ac01c37561fe25943f588e72614978ff5e74e0f5d87f8adfd4293e2094
                                        • Instruction Fuzzy Hash: CB42F825A0C2C2C5EB95AA39C9343FBB7D8EB49785F884035CA6D476C5DF2EA450C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                        • String ID: @
                                        • API String ID: 3606780921-2766056989
                                        • Opcode ID: 2faf0608d56b9c58672882d9ff8660f1ea1e60fa0df29c845616acc5bcf4b34a
                                        • Instruction ID: 0c4b56bbe0087471dd79d91f8dd28f772f8ba3ae2b9295fefa505ce9708568b6
                                        • Opcode Fuzzy Hash: 2faf0608d56b9c58672882d9ff8660f1ea1e60fa0df29c845616acc5bcf4b34a
                                        • Instruction Fuzzy Hash: F021823262868186E760AF21E86466BF365FBCDB84F845135EB9E43E58DF3CD405CB60
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                        • String ID:
                                        • API String ID: 313767242-0
                                        • Opcode ID: 1a54c212ee74d5254ce934133b79b156ec1c6a6db0b5f5b7bb79e8dd12b40982
                                        • Instruction ID: 07415d3c51f290dd1b47abf57683c0dfd78af54d90079443204759b14fc5c1af
                                        • Opcode Fuzzy Hash: 1a54c212ee74d5254ce934133b79b156ec1c6a6db0b5f5b7bb79e8dd12b40982
                                        • Instruction Fuzzy Hash: 1B312172609B8286EB60AF60EC503EE7364FB88748F844439DB5D47BA4EF38D548C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                        • String ID: @
                                        • API String ID: 3016261861-2766056989
                                        • Opcode ID: 6c2ab8d22f959655aa670125644ca85f2505b009f973729a6368826819c2f17d
                                        • Instruction ID: e371ee3615575fd6bbe926152601fc8654068fb8633962ae042a64183365ca6a
                                        • Opcode Fuzzy Hash: 6c2ab8d22f959655aa670125644ca85f2505b009f973729a6368826819c2f17d
                                        • Instruction Fuzzy Hash: 1141B222B086908EF7109B75D8607EE7BB5F74A348F444025DEAD17A9ACB3CD11AD760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: calloc$ErrorLastbind
                                        • String ID: bind() failed; %s
                                        • API String ID: 2604820300-1141498939
                                        • Opcode ID: 517eae6072fed6fd1dfaa199e013888d39c7c5739371c6c61649afd4258ac5ae
                                        • Instruction ID: 808849b3ff2a55d6202f5f57197c9dec2bf90f03252040d6f70bcc2d68ebcd30
                                        • Opcode Fuzzy Hash: 517eae6072fed6fd1dfaa199e013888d39c7c5739371c6c61649afd4258ac5ae
                                        • Instruction Fuzzy Hash: 74519C71A0878282EB15AB35C9603BAB2A8FB4CF84F944035CA6D477D5DF3CE85187B0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                        • API String ID: 0-2102732564
                                        • Opcode ID: 68db513a4d4b7ba3db95311676e70f7e987f09789aa417ec7d3a490e4e8e7615
                                        • Instruction ID: 90e76d2a75ec7cdc45e6a70db30cf9ba91f9422e9e2f01c82721073827158248
                                        • Opcode Fuzzy Hash: 68db513a4d4b7ba3db95311676e70f7e987f09789aa417ec7d3a490e4e8e7615
                                        • Instruction Fuzzy Hash: 5A217755E2D94A47FF14EB95AC307F683195B4C780FD00432E92E0A7E19FACA542C2F0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                        • API String ID: 0-1379995092
                                        • Opcode ID: 0c1808b9c04dba6c0537016bc3371ffc92631462d09866dd86f1be3741a9d0a2
                                        • Instruction ID: 41ccf5e5a0dc0e672c56c57e9a146b23dc34fd3a62bca9e8a7a1b16f18dcec3f
                                        • Opcode Fuzzy Hash: 0c1808b9c04dba6c0537016bc3371ffc92631462d09866dd86f1be3741a9d0a2
                                        • Instruction Fuzzy Hash: D4424A3290CA83C5E721AA189D2437BE795FF48798FD44231DA7E476D4DE3EE84186B0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 2.6$3ee9e40d39e383d059f410c5d176cbefa3865cab68dfcd7cde49bcebd7424293$9WIvTVJa9m$Loader Principal | Private Store$https://keyauth.win/api/1.2/
                                        • API String ID: 0-1941432435
                                        • Opcode ID: 8fa17baa35698e9081550046c7c0ccd4169360e85c10b5ede3bbec3f9531fe95
                                        • Instruction ID: baa219910a44eb65de207f0102fb2c354550064325f597cea64ff43cb0fd000a
                                        • Opcode Fuzzy Hash: 8fa17baa35698e9081550046c7c0ccd4169360e85c10b5ede3bbec3f9531fe95
                                        • Instruction Fuzzy Hash: DC124A22D2D7824AF703A739DC111A5E75C9FA7781F90D336ED6431CA7EF29A282C254
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                        • String ID:
                                        • API String ID: 2933794660-0
                                        • Opcode ID: 2d4f7db5757917a2a277bb3a7b4c4408b8485e3dabffe06df6407e9d8fc6ad37
                                        • Instruction ID: 6b2eb62fbeb3a1ba9b6665788eefb4d6d3fdef8ea2fe9ca22d1a7c3e8dca39dd
                                        • Opcode Fuzzy Hash: 2d4f7db5757917a2a277bb3a7b4c4408b8485e3dabffe06df6407e9d8fc6ad37
                                        • Instruction Fuzzy Hash: 2A111C26B14B0289EB00DF64EC642B973B8F75D758F840E31DA7D86BA8DF78D15483A0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _getpidhtons
                                        • String ID:
                                        • API String ID: 3416910171-0
                                        • Opcode ID: 09a5b7d0a19d5a5080428c22b692b7231929b54e28db978406f224c4a795607f
                                        • Instruction ID: 4d1467cc50c3f111559ade2c02d468b9460c135d0ce886a7e12143fe82886090
                                        • Opcode Fuzzy Hash: 09a5b7d0a19d5a5080428c22b692b7231929b54e28db978406f224c4a795607f
                                        • Instruction Fuzzy Hash: C2117C22A247D0CAD304CF35E5001AE77B0FB5CB84B44962AFB9987B58EB78C6D0C744
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: Xbad_function_call@std@@
                                        • String ID:
                                        • API String ID: 1029415015-0
                                        • Opcode ID: 0999894a38dc5b9fcd466583d64232a7d4a04029503bfc054329bfa97a126675
                                        • Instruction ID: 816b78e9aad528d093b6eaf90d3d9856f85fb45c6dbd8ef402ff2cee32b91cf8
                                        • Opcode Fuzzy Hash: 0999894a38dc5b9fcd466583d64232a7d4a04029503bfc054329bfa97a126675
                                        • Instruction Fuzzy Hash: 3B81CF22B19B99C8EB00DB69D8A83AD77B4E719B48F944026DFAD47795DF39D040C3A0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                        • Instruction ID: c2921cb7022b75fc0b23bd77ffe6542abd1b8da74d08888210de5d2dcf1742aa
                                        • Opcode Fuzzy Hash: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                        • Instruction Fuzzy Hash: 2F61F372B0DB4482DB10DB29E85827AA2A5E7597D4F518335DEAD47BC8EF3CE181C360
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                        • Instruction ID: 3f8e9ccb06875a50519bc27fb295e2f912d5206b2477ff6e8efb59e580553656
                                        • Opcode Fuzzy Hash: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                        • Instruction Fuzzy Hash: BA418233B1155487E78CCE2AC8256AE73E6F39D304F85C239EA1A87389DA399905CB40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                        • Instruction ID: b1be0640d988e434ace12c8ad06931d41b5d71802ec6a1437ca12effe976ac23
                                        • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                        • Instruction Fuzzy Hash: 90F08C25325B67BEFE84853B4A24FBD5E809BC0700FA369748C80020CB96AE5493D724
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9c8db9603258850444462101a3ae1cdcc35cbb873210dfaf0ec72ac43398cd4d
                                        • Instruction ID: 4555b75df71d6793e67c09cd34a9f4c7027910979c7e76b4d8bfa61864ac9d93
                                        • Opcode Fuzzy Hash: 9c8db9603258850444462101a3ae1cdcc35cbb873210dfaf0ec72ac43398cd4d
                                        • Instruction Fuzzy Hash: 3EA0012591C90690E748AB01EE60036A2A9AB58708F8A1431C12D414B0AE3DE50092B5
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strcmp$strncpy$strchr
                                        • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER
                                        • API String ID: 1395212091-3550120021
                                        • Opcode ID: 1476ea0ef0adb97c11199459e1c21d3f1b1baaf42e53f88caec01919b2fcf727
                                        • Instruction ID: a4caf216c530d6032fe5e127dc49bb60325cfb8ed49797c183223e546c74c1e1
                                        • Opcode Fuzzy Hash: 1476ea0ef0adb97c11199459e1c21d3f1b1baaf42e53f88caec01919b2fcf727
                                        • Instruction Fuzzy Hash: B202F811B3C91391FB50FB24DD605BB926DAF5938CFC04532E92E8A5EAEE1CE51583B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$CounterPerformanceQuery
                                        • String ID: Closing connection %ld
                                        • API String ID: 3490100708-2599090834
                                        • Opcode ID: de2c1edf53598d592dc1581178fbfc545894e5021b0248a3bd883db2142b5919
                                        • Instruction ID: acccf0e6fe742c3d58e6b87623e2d3cb06a7123787c71242912911262acca48a
                                        • Opcode Fuzzy Hash: de2c1edf53598d592dc1581178fbfc545894e5021b0248a3bd883db2142b5919
                                        • Instruction Fuzzy Hash: 84C15275508B92C2E750AF25D8612AE7368FB8AF98F480131EEBD07799DF389155C370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                                        • API String ID: 1294909896-2200874227
                                        • Opcode ID: 8e4fe92576e85a1649832a746bfe2ac2763d99e700bc8479731e5c23ff789ab4
                                        • Instruction ID: 487db180b3f39b23d8828bbb2a43180e3ccf47e23c4b4b66d8f81355c3e6f427
                                        • Opcode Fuzzy Hash: 8e4fe92576e85a1649832a746bfe2ac2763d99e700bc8479731e5c23ff789ab4
                                        • Instruction Fuzzy Hash: 1E02542160978285EB50EB259C603BBA399FF48B84FD40035CE6E467D5EF3CE94587B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfree$strpbrk
                                        • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                        • API String ID: 2737852498-2994854565
                                        • Opcode ID: b3c887b8b654f7e6ab9bd426e25545138578bed1ec83a85998221e109ef5ae0e
                                        • Instruction ID: 4da0ac67c8fb23e98ebf73ea639723268c1d3e2a7fef0fb8b968f1eca67cc982
                                        • Opcode Fuzzy Hash: b3c887b8b654f7e6ab9bd426e25545138578bed1ec83a85998221e109ef5ae0e
                                        • Instruction Fuzzy Hash: 4DD18E21B09B5381FB51EB259C206BAA3A8BF4AB84F944531DD6D077D5EF2CE845C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc$memcpy$htonl
                                        • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                        • API String ID: 82385936-242323837
                                        • Opcode ID: b5ce5a9e2a0b33df0e939376c1fe06cecc69fbaa3637c0c0980714c72d35468e
                                        • Instruction ID: 8b268ff0803993b2bdeec43b61660bcdbe00cd1c4edca5dfd78df660bc99bc3d
                                        • Opcode Fuzzy Hash: b5ce5a9e2a0b33df0e939376c1fe06cecc69fbaa3637c0c0980714c72d35468e
                                        • Instruction Fuzzy Hash: A3C15E31A18B5286E710AF65E8606AEB7B8FF49B84F804135EE6D43B99DF3CD444C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: calloc$_strdupfreehtonsmemset
                                        • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                        • API String ID: 130798683-4053692942
                                        • Opcode ID: b7ea18d54f0fbc825fb5669daafabcae6a8462ca2209896e4bea7f4fb4aa7d12
                                        • Instruction ID: 6cfb362103492bec01140bca3936833ff4ac9e6f250dd1cd2388b76daf1333d6
                                        • Opcode Fuzzy Hash: b7ea18d54f0fbc825fb5669daafabcae6a8462ca2209896e4bea7f4fb4aa7d12
                                        • Instruction Fuzzy Hash: 7CE1A532A0868286E760AF25D8603AFB7A8FB4DB58F844131DA6D47795EF3CD544C7B0
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E4D6
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E4FC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E50D
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E57B
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E5AC
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E5CC
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E5DE
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E640
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E6B1
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E6C8
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E783
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E7F7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF7F678DC0F), ref: 00007FF7F678E800
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strchr$free$_strdupcalloc
                                        • String ID: LDAP$base$one$onetree$sub$subtree
                                        • API String ID: 112326314-884163498
                                        • Opcode ID: b72b3b6b8f8b35fc2830f8e4368748d3916e01b9f25a2d53a481e4d0df09ac53
                                        • Instruction ID: c59d415b78c27bf7dce41bc492369dda90998ed0a7afc00b608b8db05d214660
                                        • Opcode Fuzzy Hash: b72b3b6b8f8b35fc2830f8e4368748d3916e01b9f25a2d53a481e4d0df09ac53
                                        • Instruction Fuzzy Hash: 82B18D26A0974282EB51AB259C2027AA3A8FF4DB84F944531DE6D077D5EF3CE845C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memchrstrtol
                                        • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                        • API String ID: 1626215102-895336422
                                        • Opcode ID: 79dfef3ee0d82b343d4b81e40e272c507a7aa2e2bd38e7d364f08c563dddb735
                                        • Instruction ID: 6a90ce688935734cab70ba2153e3c5d90d12b766ff94eca6cb047e2a138bedec
                                        • Opcode Fuzzy Hash: 79dfef3ee0d82b343d4b81e40e272c507a7aa2e2bd38e7d364f08c563dddb735
                                        • Instruction Fuzzy Hash: 80619061A0C64295FB14AB21AC242BBA268BF48BD4FE44631D93D477E5DF3CE50687B0
                                        APIs
                                          • Part of subcall function 00007FF7F6756070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6760670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7F67524A1), ref: 00007FF7F6756097
                                          • Part of subcall function 00007FF7F6756070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6760670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7F67524A1), ref: 00007FF7F67560A3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F675C9D4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F675C9DC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F675CA03
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F675CA0C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F675CA90
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F675CA99
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                        • API String ID: 1294909896-1595554923
                                        • Opcode ID: 6bdb922d749ab1fe29328e538f3ef6b7cd3e7e9cfbaf12b4b060728a50306d1a
                                        • Instruction ID: 3a1d07d072921e01c0281db1c7eea83da6c4f2396b0f7c6480e27d58f3326d4f
                                        • Opcode Fuzzy Hash: 6bdb922d749ab1fe29328e538f3ef6b7cd3e7e9cfbaf12b4b060728a50306d1a
                                        • Instruction Fuzzy Hash: C3E19522A0864291FB65AB119860377A7A8FF09B84FC84479CE6D476D9DF3CEC55C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$Authorization$Authorization:$Authorization: Bearer %s$Basic$Bearer$CONNECT$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                                        • API String ID: 1294909896-115817326
                                        • Opcode ID: a6e5da47ed2030cb93ff6b52389dbce91e2e2196ec7e72e72ac32cbea4cf717e
                                        • Instruction ID: b1156bb19ec76634be0a80325bbe42ac8ba86c47861404b420ef48f31140daec
                                        • Opcode Fuzzy Hash: a6e5da47ed2030cb93ff6b52389dbce91e2e2196ec7e72e72ac32cbea4cf717e
                                        • Instruction Fuzzy Hash: B6918121A1C69781FB20AB269C203BBA79CEB49794F944136DA6C077D5EF2DE411C3F0
                                        APIs
                                          • Part of subcall function 00007FF7F6744350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F6744381
                                        • memcpy.VCRUNTIME140 ref: 00007FF7F67464C6
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7F6746558
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7F6746599
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67466E3
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6746722
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6746770
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67467B1
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674680E
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67468C8
                                          • Part of subcall function 00007FF7F679FB48: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7F674442E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F679FB62
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6746909
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67469D6
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6746A17
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7F6746A3A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                                        • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                                        • API String ID: 264867259-3075834232
                                        • Opcode ID: 5ddee20f24811701f88de3ed6b3b9c5beeb918b66c6a729a8a008020f288624f
                                        • Instruction ID: 7a37a210d6e04add4131a1a7c00d6d45b17c4ff734b52940eea2736ce5224b65
                                        • Opcode Fuzzy Hash: 5ddee20f24811701f88de3ed6b3b9c5beeb918b66c6a729a8a008020f288624f
                                        • Instruction Fuzzy Hash: 8F12D662B0CA8181FB10EB64E82436FA365EB497A8F904235DA7D137D9DF7CD084D3A0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                        • String ID:
                                        • API String ID: 1087521380-0
                                        • Opcode ID: 38ea0279ecf3060a7191ead8b4a3581ef11fd8d8a316d763dfd1daf95e724c62
                                        • Instruction ID: e384bb426fc236cea5759b1182636725b51b587a7a3d91ce2267b5150e4ac257
                                        • Opcode Fuzzy Hash: 38ea0279ecf3060a7191ead8b4a3581ef11fd8d8a316d763dfd1daf95e724c62
                                        • Instruction Fuzzy Hash: 2BB16211A0A74245EB55AB29997027AA7E8EF4DB94F880575CE7D037C9EF2CE850C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                                        • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                        • API String ID: 3103143820-2414412286
                                        • Opcode ID: b4f9b2d5e7cbae1782e3f6f8a12a44ccccba11d09565d8c439cd8e380772ba0a
                                        • Instruction ID: ceb47842dc8bd77477868aec39b3177be138d1764867546e72768cb32ce9cf33
                                        • Opcode Fuzzy Hash: b4f9b2d5e7cbae1782e3f6f8a12a44ccccba11d09565d8c439cd8e380772ba0a
                                        • Instruction Fuzzy Hash: E6D19A22B0878291EB54AB35D9602BBE7A8FB49B44F940031DB6D03AD9DF7CE550C7B1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                                        • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                                        • API String ID: 2243338858-131330169
                                        • Opcode ID: 9bb391558646337b25e735532d6e92d88ebe20401bd44c15c974a5a0c0c4ffcd
                                        • Instruction ID: f4770f94d419268a156a2446117d32c76031688bb1f14d8983f774e02ad39de9
                                        • Opcode Fuzzy Hash: 9bb391558646337b25e735532d6e92d88ebe20401bd44c15c974a5a0c0c4ffcd
                                        • Instruction Fuzzy Hash: 3091D721B0C78286EB54AB79DC6427BA3A8FB49B94FA80035DA6D037D5DF3CD8508771
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno
                                        • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                        • API String ID: 3939687465-1752685260
                                        • Opcode ID: 08efb8bee4486beec1541706793736939f3f5dfdb77aa2eae10172abc41618e9
                                        • Instruction ID: 228ca5e109b57d818df7e469898897dd3de5d6adbd95757dc3f032efea6df869
                                        • Opcode Fuzzy Hash: 08efb8bee4486beec1541706793736939f3f5dfdb77aa2eae10172abc41618e9
                                        • Instruction Fuzzy Hash: 44518321A0C68285E761BB10AD643BBB258FB4C744FC44575DA7D02AE9DF3CE904C7B0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), Unknown.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because SOCKS server cannot connect to identd on the client.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected because the client program and identd report different user-ids.$Can't complete SOCKS4 connection to %d.%d.%d.%d:%d. (%d), request rejected or failed.$Failed to resolve "%s" for SOCKS4 connect.$Failed to send SOCKS4 connect request.$SOCKS4 communication to %s:%d$SOCKS4 connect to IPv4 %s (locally resolved)$SOCKS4 connection to %s not supported$SOCKS4 non-blocking resolve of %s$SOCKS4 reply has wrong version, version should be 0.$SOCKS4%s request granted.$SOCKS4%s: connecting to HTTP proxy %s port %d$SOCKS4: Failed receiving connect request ack: %s$SOCKS4: too long host name$Too long SOCKS proxy name, can't use!$[
                                        • API String ID: 0-3760664348
                                        • Opcode ID: d992ab33b5ba2acc2fb80a774860a40dec9b1310fa009cfa0d7faafbb69255df
                                        • Instruction ID: acecdfa872007b866286ee5e1825ad525b476c53589e440f208c41425d3e5cd0
                                        • Opcode Fuzzy Hash: d992ab33b5ba2acc2fb80a774860a40dec9b1310fa009cfa0d7faafbb69255df
                                        • Instruction Fuzzy Hash: 13E1EF62A186C189EB54AF25D86037BA7A4FB49B88F848136DE6D477D5CF3DE040C7B0
                                        APIs
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674560E
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674563C
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674564A
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6745684
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67456D5
                                        • memset.VCRUNTIME140 ref: 00007FF7F6745503
                                          • Part of subcall function 00007FF7F6744350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F6744381
                                          • Part of subcall function 00007FF7F6746350: memcpy.VCRUNTIME140 ref: 00007FF7F67464C6
                                          • Part of subcall function 00007FF7F6741FF0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742161
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6745842
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674586E
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674587C
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67458B7
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674590A
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67459F1
                                        • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7F6745A09
                                        • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7F6745A16
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                                        • String ID: value
                                        • API String ID: 2102519606-494360628
                                        • Opcode ID: 0681b0cbd6cc313949f343e8ef1c8002e7ee2f51d413c373bf9241906f22b9b9
                                        • Instruction ID: 9865abd854ff944ebc0fe836a20092944b578e8f85dfaaf28c90e64e459c8078
                                        • Opcode Fuzzy Hash: 0681b0cbd6cc313949f343e8ef1c8002e7ee2f51d413c373bf9241906f22b9b9
                                        • Instruction Fuzzy Hash: 3CF1F922A1C781C5FB10EB74D8543AEA764EB897A4F544231EABD03AE9DF3CD085D760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$strchr$_strdup
                                        • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                        • API String ID: 1922034842-2519073162
                                        • Opcode ID: 618ecbf9edcba6c5a583dceb0031c8d968e55155e3ae0f44d7de65b39f56fd4a
                                        • Instruction ID: abb3bfba7cafb1e053dc3d0611e9f65b12baabb85416d283d4c34c4fb4fc9acd
                                        • Opcode Fuzzy Hash: 618ecbf9edcba6c5a583dceb0031c8d968e55155e3ae0f44d7de65b39f56fd4a
                                        • Instruction Fuzzy Hash: 4B919821A1964285FB61EB119E2037BA798AF49BC4FC44032CE7D87AD5FE2DE54187B0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID:
                                        • API String ID: 2653869212-0
                                        • Opcode ID: df8c272462819afb120329c5d55349d2ebdef6b687dea4e3c70b77ee26e3604d
                                        • Instruction ID: 0b366a53d98f9362e456f7b8bc2bd0ac281d8c3dc688de0799bc977ae716ef2e
                                        • Opcode Fuzzy Hash: df8c272462819afb120329c5d55349d2ebdef6b687dea4e3c70b77ee26e3604d
                                        • Instruction Fuzzy Hash: 59B16D32A09B82C6EB159F15E96036AB3A8FB49B44F840135CBAD43B94DF3CF464C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                        • API String ID: 111713529-3006446216
                                        • Opcode ID: ead7ad64410cf63012cd3b6e98572aabadeff694823e11d38ff1ffd43fa03750
                                        • Instruction ID: 5edf582220c7f06341e98c064919829126ae1c0ba3d3c5223b39dda1a310f023
                                        • Opcode Fuzzy Hash: ead7ad64410cf63012cd3b6e98572aabadeff694823e11d38ff1ffd43fa03750
                                        • Instruction Fuzzy Hash: A271CA9290D6C295E711AB3598242BBFBE8EB4A788FDC4532C66D033D1EE2DD445C371
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                        • API String ID: 2190258309-1086287758
                                        • Opcode ID: d6ceaab0806046a6fad15daabaa3b331c93cb5b9507ece998b51a21d75b291da
                                        • Instruction ID: ed75612c64fc7fccd32a8ca55288882b4ebd9f21bcb332ee0fec0734bad50879
                                        • Opcode Fuzzy Hash: d6ceaab0806046a6fad15daabaa3b331c93cb5b9507ece998b51a21d75b291da
                                        • Instruction Fuzzy Hash: 3AB16371A18B4685E710AF25ED602AEB7A8FB4D784F800035DE6D57B98EF3CD544C7A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                        • API String ID: 1294909896-1220118048
                                        • Opcode ID: f0158090d86be3429eb3269982509cc72675253f20fd575ca3fe3ae1e362a893
                                        • Instruction ID: 756e04244f82c7e0c3fe7ad4c38765baa5b9d9466a75edf1a6cc84b704275532
                                        • Opcode Fuzzy Hash: f0158090d86be3429eb3269982509cc72675253f20fd575ca3fe3ae1e362a893
                                        • Instruction Fuzzy Hash: D0714061A0978691EB11AB71A8601FBA399EB4DB84F884032DE6D037D6FE3CD501C7F1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloctolower
                                        • String ID: %%%02x
                                        • API String ID: 1244608590-4020994737
                                        • Opcode ID: cc941b5b1586ca65034f02fda84f81cd4fb17835c43a73507d46e3afe6f7d722
                                        • Instruction ID: 423e80376f73ad509661f2478f111ca519ffd87582c4e30e1e02ce41b0fd39b9
                                        • Opcode Fuzzy Hash: cc941b5b1586ca65034f02fda84f81cd4fb17835c43a73507d46e3afe6f7d722
                                        • Instruction Fuzzy Hash: 98A1972190C2D245EB616B35983037BABD8BF5AFD4FA84471DAAD472C5DE2CE844C371
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID:
                                        • API String ID: 111713529-0
                                        • Opcode ID: 621cbfd0ee36ffef54caf14af25ee3b9e37cafa5b82458fd53113b4841491521
                                        • Instruction ID: ed52d2c88623045f284f313fa9974dc602c71e6afc3f3458fd4884eac8c801f9
                                        • Opcode Fuzzy Hash: 621cbfd0ee36ffef54caf14af25ee3b9e37cafa5b82458fd53113b4841491521
                                        • Instruction Fuzzy Hash: 5461BF72A19B42C2EB25EF15E86412AB3A8FB5DB80B854035DF6D43795EF3CE484C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                        • API String ID: 1294909896-2312071747
                                        • Opcode ID: 45a34611d84476b2e080b72f6ced0c4b1cfdcdd26aaf3e4243e8fd60c329ad54
                                        • Instruction ID: 6f848c35350776b85f6cb6d4b0b3ec5cedd9396f93d9b89032c9ce2716855bb8
                                        • Opcode Fuzzy Hash: 45a34611d84476b2e080b72f6ced0c4b1cfdcdd26aaf3e4243e8fd60c329ad54
                                        • Instruction Fuzzy Hash: 44D1B661A0C78285EB64BB359A603BBA298FB49B55FD40231DB7D036D1DF6CE84483F1
                                        APIs
                                          • Part of subcall function 00007FF7F6744350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F6744381
                                          • Part of subcall function 00007FF7F6746350: memcpy.VCRUNTIME140 ref: 00007FF7F67464C6
                                          • Part of subcall function 00007FF7F6741FF0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742161
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674A891
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674A8BF
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674A8CD
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674A907
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674A964
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674AA1D
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674AA4B
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674AA59
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674AA93
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674AAE4
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674AB2E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                        • String ID: value
                                        • API String ID: 3212548336-494360628
                                        • Opcode ID: 6b5334c8dc40afd695f9f5f7814dc70773cd0d43c74a1f3ab58cc3c0daa169ad
                                        • Instruction ID: 8590f7f493fb895b2861006440ba40a10566dfd3ba4223ce722be43550bb9cf4
                                        • Opcode Fuzzy Hash: 6b5334c8dc40afd695f9f5f7814dc70773cd0d43c74a1f3ab58cc3c0daa169ad
                                        • Instruction Fuzzy Hash: 5EA1A662A18A8585EB00EB74E8543AE6365EF497A4F900335DA7D03AE9DF7CD085D360
                                        APIs
                                          • Part of subcall function 00007FF7F6744350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F6744381
                                          • Part of subcall function 00007FF7F6746350: memcpy.VCRUNTIME140 ref: 00007FF7F67464C6
                                          • Part of subcall function 00007FF7F6741FF0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742161
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674C120
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674C14E
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674C15C
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674C196
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674C1F3
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674C2AC
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674C2DA
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF7F674C2E8
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674C322
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674C373
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674C3BD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                        • String ID: value
                                        • API String ID: 3212548336-494360628
                                        • Opcode ID: e1a5b043ecd058536a3f072a734b4312760a1a7b5b6e1a9a95c02f418abc0208
                                        • Instruction ID: 1d0675c10f8d3a05d0be48baf78b5fae0dac556fbabda5c9301c91e2db24e6bb
                                        • Opcode Fuzzy Hash: e1a5b043ecd058536a3f072a734b4312760a1a7b5b6e1a9a95c02f418abc0208
                                        • Instruction Fuzzy Hash: D3A19862A1868181EB00EB74E8543AF6365EB497A4F901336DA7D03AE9DF7CD085D760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$calloc$malloc
                                        • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                        • API String ID: 3103867982-1477229593
                                        • Opcode ID: abcaebdcec3108e36cd59e43220c0eb99015a202a648407847131c0655e3d7ce
                                        • Instruction ID: 638b8210df4c9679bff6e9d2233fe52a5c2812cdf73715e994181d786fa5e741
                                        • Opcode Fuzzy Hash: abcaebdcec3108e36cd59e43220c0eb99015a202a648407847131c0655e3d7ce
                                        • Instruction Fuzzy Hash: E5C14072A04B5186FB10EF75E8602AEB7A8FB49B88F500036DE5D47798EF38D445C7A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Issuer: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$Issuer$Subject$TRUE$Version
                                        • API String ID: 2190258309-1457932261
                                        • Opcode ID: ffcff0d822d8f7f5c7eb8353cc099688e07f61669229ae3a7ba24ad747551c18
                                        • Instruction ID: 02b2b31e0061c30551b22fc241d9c5131b02f9f2c0f5b25f8f73f1329d814fbc
                                        • Opcode Fuzzy Hash: ffcff0d822d8f7f5c7eb8353cc099688e07f61669229ae3a7ba24ad747551c18
                                        • Instruction Fuzzy Hash: 4361A021A0D78291EB15AB25AC243FBA3A9BB49794F844936CD6D077D5EF3CE144C3B0
                                        APIs
                                        • memset.VCRUNTIME140 ref: 00007FF7F678A6CB
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F678A7F5
                                          • Part of subcall function 00007FF7F6756070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6760670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7F67524A1), ref: 00007FF7F6756097
                                          • Part of subcall function 00007FF7F6756070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6760670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7F67524A1), ref: 00007FF7F67560A3
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F678A7AF
                                          • Part of subcall function 00007FF7F6755FD0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F6755FE0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freestrncpy$_strdupmemset
                                        • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                        • API String ID: 3826632026-748038847
                                        • Opcode ID: 59a0c5fa885d2920454bd0d086efa8d0fdb8e179524ebb4e6a53ff4d96d24a27
                                        • Instruction ID: 1719702437a6e5be5777b1ae87b9f20cf42b110077cc21ead91ac3b19cc88d48
                                        • Opcode Fuzzy Hash: 59a0c5fa885d2920454bd0d086efa8d0fdb8e179524ebb4e6a53ff4d96d24a27
                                        • Instruction Fuzzy Hash: 95717131A0D6C694FB21AF20D8616EAA368FB48B84FD40132DA5C47298EF3DD945C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$timeout$tsize
                                        • API String ID: 1294909896-3837278924
                                        • Opcode ID: bdcbd8baab8f02340eb2e0130b2b437af5bdfe96411d1b8ad3a950f51c653a80
                                        • Instruction ID: 3603845594a0c8bf1d269c27e12549291cd350ecfa334d93be2d3082b9f4cf02
                                        • Opcode Fuzzy Hash: bdcbd8baab8f02340eb2e0130b2b437af5bdfe96411d1b8ad3a950f51c653a80
                                        • Instruction Fuzzy Hash: 0FD1AD62A0CA8285EB11DF24D8603BAA765FB49B88FD48132CA5D477C5DF3DD909C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: sendto$ErrorLast
                                        • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                        • API String ID: 4042023021-4197595102
                                        • Opcode ID: 85231d28fff2e654bee0dea8e08f6af6eeea1f587eb2a535d9c6f41173a7fb84
                                        • Instruction ID: 5d2bcfacd3f819c66e25d3b906d7ebad6af1463fb90c39ff086206bf08e969c7
                                        • Opcode Fuzzy Hash: 85231d28fff2e654bee0dea8e08f6af6eeea1f587eb2a535d9c6f41173a7fb84
                                        • Instruction Fuzzy Hash: F6B1A032608682C6D7259F39D8606AA77A4FB4CF88F944132CE5D4B798DF38D805C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLastsend
                                        • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                        • API String ID: 1802528911-931584821
                                        • Opcode ID: c0ccde3566b09747bdcd1574ce02ccefcf66fd362645a6cd761a98cee10aabe0
                                        • Instruction ID: a7dcae0862b8ff1c8bd76cd17e7a0fdc94b9bf94373a86626ebf3b227d1eda83
                                        • Opcode Fuzzy Hash: c0ccde3566b09747bdcd1574ce02ccefcf66fd362645a6cd761a98cee10aabe0
                                        • Instruction Fuzzy Hash: A291F422608AC195F721AF24E8557EBA3A4FB49B68F840231EE6C07BD5DF3DD145C7A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdup$freestrchrstrncmpstrtol
                                        • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                        • API String ID: 2070079882-2404041592
                                        • Opcode ID: d0dbf708304496b083f23b7e812b48d865a99afd1e2578677d33c2e86739b3fa
                                        • Instruction ID: 2ad75bee7bfb10e6b9c34116dbeb521362fd1b1152c6c1a2ab2db16c35396bd5
                                        • Opcode Fuzzy Hash: d0dbf708304496b083f23b7e812b48d865a99afd1e2578677d33c2e86739b3fa
                                        • Instruction Fuzzy Hash: CE51D611A086C785FB51AB169C30377A7D9AF0AB94FC88031DA6D062D9EE2DE545C7F0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                        • String ID: Set-Cookie:$none
                                        • API String ID: 4109794434-3629594122
                                        • Opcode ID: 9f5bed46c0964185472ff9964054de0d46ab92f24e80c46b5d6bfa1eefba3946
                                        • Instruction ID: 07ef8d3af0c442d7e4aa5bfd74d853a2fc68c827d85a8ba0042ea28d7fff086a
                                        • Opcode Fuzzy Hash: 9f5bed46c0964185472ff9964054de0d46ab92f24e80c46b5d6bfa1eefba3946
                                        • Instruction Fuzzy Hash: FA51C62190C78241FB55A7216D3027BA698AF5D780F884474DEBE067D9DF3DE84283B1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memcpy
                                        • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                        • API String ID: 3510742995-1652449680
                                        • Opcode ID: 0a5120772036d3f2536d4dc9d905eb8926beb600ab6b3706c495f539b64e461b
                                        • Instruction ID: 4bb5f432dd1ec233c004dee5d750da6535d72a33632cb48aef13a7fdea9c5125
                                        • Opcode Fuzzy Hash: 0a5120772036d3f2536d4dc9d905eb8926beb600ab6b3706c495f539b64e461b
                                        • Instruction Fuzzy Hash: 89A19F21A18A82C1E750EF21DC603BBB769EB48B98FD45131DE2D4A2D5EE7DE44483B1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                        • API String ID: 1294909896-3146291949
                                        • Opcode ID: c6d6408244153583df09f91122f28af32bbeb0fa9cc065ef9557b59c520eb09d
                                        • Instruction ID: 7efe399aa4b2df082be6d93413dd33a81b0dfcce4a4140d1bb52e56a83ce53ee
                                        • Opcode Fuzzy Hash: c6d6408244153583df09f91122f28af32bbeb0fa9cc065ef9557b59c520eb09d
                                        • Instruction Fuzzy Hash: B6916E21B1CB4285FB64AB219CA037BA298EF4DB84F844435DB6D476C5EF2CE54183F1
                                        APIs
                                          • Part of subcall function 00007FF7F6765EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765EC4
                                          • Part of subcall function 00007FF7F6765EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765EDA
                                          • Part of subcall function 00007FF7F6765EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765EEE
                                          • Part of subcall function 00007FF7F6765EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765F02
                                          • Part of subcall function 00007FF7F6765EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765F16
                                          • Part of subcall function 00007FF7F6765EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765F2A
                                          • Part of subcall function 00007FF7F6765EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765F3E
                                          • Part of subcall function 00007FF7F6765EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765F52
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F6764F52
                                          • Part of subcall function 00007FF7F678EE80: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F6764EF5,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F678EE95
                                          • Part of subcall function 00007FF7F678EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F6764EF5,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F678EEAF
                                          • Part of subcall function 00007FF7F678EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F6764EF5,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F678EECA
                                          • Part of subcall function 00007FF7F678EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F6764EF5,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F678EEE6
                                          • Part of subcall function 00007FF7F678EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F6764EF5,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F678EF02
                                          • Part of subcall function 00007FF7F678EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F6764EF5,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F678EF1A
                                          • Part of subcall function 00007FF7F678EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F6764EF5,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F678EF32
                                          • Part of subcall function 00007FF7F678EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F6764EF5,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F678EF4A
                                          • Part of subcall function 00007FF7F678EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F6764EF5,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F678EF62
                                          • Part of subcall function 00007FF7F678EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F6764EF5,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F678EF7A
                                          • Part of subcall function 00007FF7F678EE80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F6764EF5,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F678EF94
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F6765156
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F6765199
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF7F67652DE
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F676535B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdup$free$callocstrtoul
                                        • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$file
                                        • API String ID: 954404409-4150109901
                                        • Opcode ID: 0ac8339ab56343dfb0608ee691da3d5eeb1b2d07e07abf4930b7335b89ee0e18
                                        • Instruction ID: 70e1640f00ddcfdc209312bb8cbdc14cd40874eb07fb9a53ba590fe9b0ba5671
                                        • Opcode Fuzzy Hash: 0ac8339ab56343dfb0608ee691da3d5eeb1b2d07e07abf4930b7335b89ee0e18
                                        • Instruction Fuzzy Hash: 80C1A231B08682C6FB69AA35DD603FAA398FB49744F884431CB2D476C5DF3AE55093B0
                                        APIs
                                          • Part of subcall function 00007FF7F67423B0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67424A9
                                          • Part of subcall function 00007FF7F67423B0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67424E8
                                          • Part of subcall function 00007FF7F6744350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F6744381
                                          • Part of subcall function 00007FF7F6743BF0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF7F6741DCB), ref: 00007FF7F6743C36
                                          • Part of subcall function 00007FF7F6745E10: memcpy.VCRUNTIME140(?,?,?,00007FF7F6741DFA), ref: 00007FF7F6745EA1
                                          • Part of subcall function 00007FF7F6743C70: memcpy.VCRUNTIME140 ref: 00007FF7F6743CC3
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742161
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67421B1
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742202
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742242
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742294
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67422D3
                                        • __std_exception_copy.VCRUNTIME140 ref: 00007FF7F6742326
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742377
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                        • String ID: parse error$parse_error
                                        • API String ID: 2484256320-1820534363
                                        • Opcode ID: 919d596e004d04ec6581c94e81083fc727d7f244b40b8ebbd95ffc42edea20ab
                                        • Instruction ID: 1ba34504073f056e13b5c17e8212040cbaddf810b341968f8431248a360e9591
                                        • Opcode Fuzzy Hash: 919d596e004d04ec6581c94e81083fc727d7f244b40b8ebbd95ffc42edea20ab
                                        • Instruction Fuzzy Hash: EFB19462A18B81C5FB00DB64E9543AE7775EB897A4F904621DA7D03AE9DF7CE0C0C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                        • API String ID: 1865132094-1312055526
                                        • Opcode ID: 31c77a37b0c0b8fbe5e53ac8bd18da749b3546c27af0e0e94c4b5068321a577e
                                        • Instruction ID: 4bdb103542c90570ebaae393d8124e269ee100a037309d7a733551fcf1d6c826
                                        • Opcode Fuzzy Hash: 31c77a37b0c0b8fbe5e53ac8bd18da749b3546c27af0e0e94c4b5068321a577e
                                        • Instruction Fuzzy Hash: B071C961908783C0E760AB3498603BFB7A9EB49B98F980531DE6D476E5CF3ED44187B1
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F676192D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F676194A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F676195E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F676197A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761997
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F67619BA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F67619CE
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F67619E2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761A08
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761A1C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761A30
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761A7F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761A8C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6761AB5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 9dafe04a3beda65af2da05c8c2c950cb73e504e5584e316465673385af97ca7b
                                        • Instruction ID: 335ea840bd26e2c8fa30c78b0de36f5bb5998b61ebe3970cd25ac766373e1645
                                        • Opcode Fuzzy Hash: 9dafe04a3beda65af2da05c8c2c950cb73e504e5584e316465673385af97ca7b
                                        • Instruction Fuzzy Hash: 27510031519682C1EB14EF25DC612FE6368FF99F84F884431DE6E4B69ACE39944583B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: CRAM-MD5$DIGEST-MD5$EXTERNAL$GSSAPI$LOGIN$NTLM$OAUTHBEARER$PLAIN$XOAUTH2
                                        • API String ID: 1294909896-1896214517
                                        • Opcode ID: 6f629dc6e99d2c2fd32bc3e9a67ca7cbba0816a4f61251375445570cdc9e1aea
                                        • Instruction ID: 9627830cd409157f18dbffa83cab44f3f3c698a1b85f5bca84f6f1c6b6ffdcc5
                                        • Opcode Fuzzy Hash: 6f629dc6e99d2c2fd32bc3e9a67ca7cbba0816a4f61251375445570cdc9e1aea
                                        • Instruction Fuzzy Hash: 02D15D6260968285EB60DF24E8503AAA7F8FB49754F840136DE6C077E8EF3CD445CB75
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$MAILINDEX$PARTIAL$SECTION$UID$UIDVALIDITY
                                        • API String ID: 2190258309-1670639106
                                        • Opcode ID: 846e8b8c6c6f9739c4a2866379d1f83382772be3885393c130899fe3e4b18a15
                                        • Instruction ID: 796e8ae8955eade335cb983668baa2ee50b7e3fff9ff134f1d2aebfbba1dcc03
                                        • Opcode Fuzzy Hash: 846e8b8c6c6f9739c4a2866379d1f83382772be3885393c130899fe3e4b18a15
                                        • Instruction Fuzzy Hash: A7A19822929A8685EB51EF21DC643BAA7A4FB49784F840031EB6E476D5DF3CD491C3B0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdup$free$strrchr$_access_stat64
                                        • String ID:
                                        • API String ID: 2557200964-0
                                        • Opcode ID: a425e0188cbebe21396c5b31fd7196939b60543e69e3bf0485de30aa4f04b208
                                        • Instruction ID: 3c362139220b2a848cea5025415c4d95ccf43c3e1dee48cb06978f3f1c587853
                                        • Opcode Fuzzy Hash: a425e0188cbebe21396c5b31fd7196939b60543e69e3bf0485de30aa4f04b208
                                        • Instruction Fuzzy Hash: F641732170DB0285FB10BB11A86027AA2A8FF4DB80F844134DE6D477D8EF3CE855C2B4
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy$strchr
                                        • String ID:
                                        • API String ID: 1615377186-0
                                        • Opcode ID: 4a31933ddea44201a5d47b42c714698563d84d1637834a4103e73a14b779df92
                                        • Instruction ID: 5146ea283c3e70e273bed21e5d19b5afd03db4606ab36c69dfaab76462a07810
                                        • Opcode Fuzzy Hash: 4a31933ddea44201a5d47b42c714698563d84d1637834a4103e73a14b779df92
                                        • Instruction Fuzzy Hash: 9F518321709682C1DBA5AF15AA2427AE299BF5DBC4F884530DEBD07B94EF3DE4058370
                                        APIs
                                        Strings
                                        • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF7F6764649
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Couldn't find host %s in the .netrc file; using defaults
                                        • API String ID: 2653869212-3983049644
                                        • Opcode ID: 4dcf73271c8b8bacb8cfe7207693d9b5d91f111473b558ca7ff9bc1d3b6bb3d1
                                        • Instruction ID: 1be8f82cba27a1a6d54aa2c28efb44631e0393647d9a00dd665c6db5bf83acd2
                                        • Opcode Fuzzy Hash: 4dcf73271c8b8bacb8cfe7207693d9b5d91f111473b558ca7ff9bc1d3b6bb3d1
                                        • Instruction Fuzzy Hash: 8671D521A08B82C2EB65AB26DC6436BA7A8FB49744F444031DB6D477D5EF3EE450C7B0
                                        APIs
                                        Strings
                                        • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF7F6764649
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Couldn't find host %s in the .netrc file; using defaults
                                        • API String ID: 2653869212-3983049644
                                        • Opcode ID: f2588b72eae4d2d83d4234019271e759b3b16d48f596f5c2917e1ce51cc32042
                                        • Instruction ID: 191cf6ec159c07fa488a5ec4dbc1c444f8f8798349b8b62e280070d5c64a9542
                                        • Opcode Fuzzy Hash: f2588b72eae4d2d83d4234019271e759b3b16d48f596f5c2917e1ce51cc32042
                                        • Instruction Fuzzy Hash: 9B51C562908B82C6E715AB26D86436FA7A4FB49B44F898031CB6D473D5EF3DE450C770
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %s%s%s$Couldn't set desired mode$Got a %03d response code instead of the assumed 200$LIST$NLST
                                        • API String ID: 0-1262176364
                                        • Opcode ID: a8525d8e46d4123448b7e5117b4cd6fc8f1f50e17aea422bfd7cf4a9209a6dfd
                                        • Instruction ID: 623a782073d121af80370e6e5aa7ef64c16fdd1fceb62c4599a70e069c61f018
                                        • Opcode Fuzzy Hash: a8525d8e46d4123448b7e5117b4cd6fc8f1f50e17aea422bfd7cf4a9209a6dfd
                                        • Instruction Fuzzy Hash: D841A422B1825286FB60AB35EC601BBE368BB49F84FD44035DA6D076D5DF6DE84487F0
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7F6774E4A), ref: 00007FF7F6768E5F
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7F6774E4A), ref: 00007FF7F6768EB1
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7F6774E4A), ref: 00007FF7F6768ED5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7F6774E4A), ref: 00007FF7F6768F25
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,Digest,?,00007FF7F6774E4A), ref: 00007FF7F6768F68
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdupstrchr
                                        • String ID: %.*s$%sAuthorization: Digest %s$Digest$Proxy-
                                        • API String ID: 153040452-3976116069
                                        • Opcode ID: b6a1072ca62c58b089c756f09791d4861f3d13de823f70109af0538b333defb4
                                        • Instruction ID: 2ae51baa92baa9d5fc7525582914cea712c79be6dc08ea4c69d4aa393fd46a16
                                        • Opcode Fuzzy Hash: b6a1072ca62c58b089c756f09791d4861f3d13de823f70109af0538b333defb4
                                        • Instruction Fuzzy Hash: 7541A022608B86D2E720AF15E8103ABB7A8FB49B84F840035EEAD47795DF3DD556C370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchr
                                        • String ID: Unknown error %u (0x%08X)
                                        • API String ID: 1897771742-1058733786
                                        • Opcode ID: 58551a6dfcc84a0f0f44b5743901858bdd7a11215c9ae304ce99c475564e9eb4
                                        • Instruction ID: 8e306f8483b2952374acc89026d7fd6197b99e492c20d862d7c869c0399d4795
                                        • Opcode Fuzzy Hash: 58551a6dfcc84a0f0f44b5743901858bdd7a11215c9ae304ce99c475564e9eb4
                                        • Instruction Fuzzy Hash: AB216622A1878186E7116F21AD1422BFA99BF9CB90F894075DA7D037E9DE3DD84187B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                        • API String ID: 600764987-2628789574
                                        • Opcode ID: 97b1c77c699c43dc9b389d94b9c168d1f79c38719a14beb900fe4c4e939f7505
                                        • Instruction ID: cf83129de6f5c0ea75d2c85a443e4771a195d4d69dc7b3273147fc319c98c1f2
                                        • Opcode Fuzzy Hash: 97b1c77c699c43dc9b389d94b9c168d1f79c38719a14beb900fe4c4e939f7505
                                        • Instruction Fuzzy Hash: DD31232260D6C185E761BF20AD643ABB7A8FB88744F840575DABD02AD9DF3CD544CBB0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                        • API String ID: 600764987-1502336670
                                        • Opcode ID: a99f060a03aed788ed5e06c1aa8b7c80c7450bad84408ad51638c64175808135
                                        • Instruction ID: 94b4e81ef2c64a073ee8bacee0e9aa23818c6416b6a07a0e0c1a47d4df82b943
                                        • Opcode Fuzzy Hash: a99f060a03aed788ed5e06c1aa8b7c80c7450bad84408ad51638c64175808135
                                        • Instruction Fuzzy Hash: 4931412260D6C185E761BB20AD243ABB3A8FB88744F840575DABD02AD9DF3CD544DBB0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                        • API String ID: 600764987-3862749013
                                        • Opcode ID: de0156c4063bd9a466d38293046c8cbb20a83bbdd5fd275fc8d816d0a695292a
                                        • Instruction ID: 72e06ea230db4a0f50930e8dfdaeb07a1f1e56e4421866a3e0fe18bdcfc6cbdd
                                        • Opcode Fuzzy Hash: de0156c4063bd9a466d38293046c8cbb20a83bbdd5fd275fc8d816d0a695292a
                                        • Instruction Fuzzy Hash: 5831412260D6C185E761BB20AD243ABB3A8FB88744F840575CABD02AD9DF3CD544CBB0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                        • API String ID: 600764987-1381340633
                                        • Opcode ID: 298e794ac7706a66fab8b4d1c88976078ee655fcbdcb2b83b484b773f6ff4f63
                                        • Instruction ID: 250c893ce3926ec81b475ef17ecc0c6531617eb36550e2f51ace5862d08f6bb6
                                        • Opcode Fuzzy Hash: 298e794ac7706a66fab8b4d1c88976078ee655fcbdcb2b83b484b773f6ff4f63
                                        • Instruction Fuzzy Hash: AC31412260D6C185E761BB20AD243ABB3A8FB88744F840575DABD02AD9DF3CD544CBB0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                        • API String ID: 600764987-2710416593
                                        • Opcode ID: a0204534bdfcb8b00a98a7e01e510a1d63ffabb6fbdf480f0e4bbfb348c73876
                                        • Instruction ID: 3ff98137bb60a53d36fbda48cfb812aee92cfb14c4d5ab684cc42f11b09337bf
                                        • Opcode Fuzzy Hash: a0204534bdfcb8b00a98a7e01e510a1d63ffabb6fbdf480f0e4bbfb348c73876
                                        • Instruction Fuzzy Hash: 3031412260D6C185E761BF20AD243ABB3A8FB88744F840575CABD02AD9DF3CD544CBB0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                        • API String ID: 600764987-1052566392
                                        • Opcode ID: 0efca67b4cdc14fbe91d37422af2e9fb08fc75ec36ce691b1a4c732ea022d591
                                        • Instruction ID: 02475d718ad7d807e2bc65bbc9f4764f025ca25d7f08662ffe29cc6af6acd286
                                        • Opcode Fuzzy Hash: 0efca67b4cdc14fbe91d37422af2e9fb08fc75ec36ce691b1a4c732ea022d591
                                        • Instruction Fuzzy Hash: 6331232260D6C185E761BF20AD643ABB7A8FB88744F840575DABD02AD9DF3CD544CBB0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                        • API String ID: 600764987-618797061
                                        • Opcode ID: baaace8c9324e1153c16d76581dd1b850064508bf1f345ef6eeb36c0a0138756
                                        • Instruction ID: c7f1e91311f73eee5c7a9067cf3d44421d3e37f28593785242661505a62d273a
                                        • Opcode Fuzzy Hash: baaace8c9324e1153c16d76581dd1b850064508bf1f345ef6eeb36c0a0138756
                                        • Instruction Fuzzy Hash: B231342260D6C185E761BF20ED643ABB798FB88744F840575DAAD02AD9DF3CD544CB70
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F6788348
                                          • Part of subcall function 00007FF7F6766180: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF7F6771F95,?,?,00000000,00007FF7F67722F5), ref: 00007FF7F6766195
                                          • Part of subcall function 00007FF7F6766180: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF7F6771F95,?,?,00000000,00007FF7F67722F5), ref: 00007FF7F67661AB
                                        • memcpy.VCRUNTIME140 ref: 00007FF7F6788168
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F67882B9
                                        • memcpy.VCRUNTIME140 ref: 00007FF7F6788382
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F678838E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$memcpy$realloc
                                        • String ID: Cannot pause RTP$Failed writing RTP data$Got an error writing an RTP packet
                                        • API String ID: 657767516-1165944077
                                        • Opcode ID: 660aa62fdb57f9ad4f97bb8f1537920e62d72f1c1ab7316212b221423c490b78
                                        • Instruction ID: 3afa0df31e4f8ae052738f7062ff7c0e1fb9c189c9326c4ce8aade7fe656f4c5
                                        • Opcode Fuzzy Hash: 660aa62fdb57f9ad4f97bb8f1537920e62d72f1c1ab7316212b221423c490b78
                                        • Instruction Fuzzy Hash: 98718222B09B8595E754EB25D8143AAE7A8FB49B80F944035EF6D47B94DF3CE860C360
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_time64
                                        • String ID:
                                        • API String ID: 3087401894-0
                                        • Opcode ID: 94b7a02d5bc3b31133621eaaf653b4e2e7eeaf76c314e2bfd27b0698e7b4643e
                                        • Instruction ID: 9bf7ecd258714f1500c146af4e88fb0b458cbccfbe67f6b82079244ad04bf1b4
                                        • Opcode Fuzzy Hash: 94b7a02d5bc3b31133621eaaf653b4e2e7eeaf76c314e2bfd27b0698e7b4643e
                                        • Instruction Fuzzy Hash: C721F036619A52C2E710AF21E86513AA378FB5EF84F440471EEAD13799DE38D845C3B0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                        • API String ID: 0-808606891
                                        • Opcode ID: b7f0683384f41ca6ab58209a4010d6c5d75d2bd6ba60dd59bf4ed1c60fdea11b
                                        • Instruction ID: ef5e5c90ebf4d275c9451a067ee6a8cf8f5eff084c2d8475c9a5726aefb6ed2f
                                        • Opcode Fuzzy Hash: b7f0683384f41ca6ab58209a4010d6c5d75d2bd6ba60dd59bf4ed1c60fdea11b
                                        • Instruction Fuzzy Hash: 97B1A16290CA41C5E7259F28D86823DB779F719B58FE44532C66D062D8DF38E885C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdup
                                        • String ID: Authentication problem. Ignoring this.$Basic$Bearer$Digest$Ignoring duplicate digest auth header.$NTLM$Negotiate
                                        • API String ID: 1169197092-907567932
                                        • Opcode ID: 8811c21d227fe7b456c0f5a6e030505f98a5b81c9e62d162cdb0ae453dfad27b
                                        • Instruction ID: 3e8eab9c496e86074364b28732f378178042ecf9dfeee3163c64838d6d9fb4be
                                        • Opcode Fuzzy Hash: 8811c21d227fe7b456c0f5a6e030505f98a5b81c9e62d162cdb0ae453dfad27b
                                        • Instruction Fuzzy Hash: C4710821A2C28286FB24AA219D7027BFAD9AF09784FC44034DE7A472D1DF3DE554D7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfreestrpbrk
                                        • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                                        • API String ID: 1812939018-2300960079
                                        • Opcode ID: f3eda4bbea35c3fc35fa090c4d3cd7c91a46c8c7f5d33282ed58acf73afcbf50
                                        • Instruction ID: 408dce993a211885e495cd94f90c0899a2725ce6bc460822fe8c68b4d1050d70
                                        • Opcode Fuzzy Hash: f3eda4bbea35c3fc35fa090c4d3cd7c91a46c8c7f5d33282ed58acf73afcbf50
                                        • Instruction Fuzzy Hash: E951C722E1CB8681EB51DB25EC2077AA7A5BB5AB84FD40231DA6D037D1DF2DD941C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                        • API String ID: 2653869212-3672398475
                                        • Opcode ID: e07c45d19973509e67b550ba4295e2b84292b797af6f8f338bbd6149bdbebad7
                                        • Instruction ID: de3bb80313574279d1c5377501b880eb2b6a69c4fa2c8bdc80fd9771ea5d3991
                                        • Opcode Fuzzy Hash: e07c45d19973509e67b550ba4295e2b84292b797af6f8f338bbd6149bdbebad7
                                        • Instruction Fuzzy Hash: 37415355A0978284EB15AB359C641FBA7A8BB0D7C8F884435CE6D177D6EE3CE044C3B0
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F67619F9,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F675A00D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F67619F9,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F675A037
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F67619F9,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F675A041
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F67619F9,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F675A04B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F67619F9,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F675A055
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F67619F9,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F675A05F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F67619F9,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F675A069
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F67619F9,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F675A073
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F67619F9,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F675A07D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F67619F9,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F675A086
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F67619F9,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F675A0A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 548a08269f7edc9ae1dc99300c80eb12a085d950e618f5ac623358a1f60b81e7
                                        • Instruction ID: 9257a9e9e411de0b07b917506e4bfb4acfc306a86fd5dcc742e029a005e6229d
                                        • Opcode Fuzzy Hash: 548a08269f7edc9ae1dc99300c80eb12a085d950e618f5ac623358a1f60b81e7
                                        • Instruction Fuzzy Hash: 2B21EC66624A52C2D710AF15E86522AA374FB9EF80F441431EEBE03759DE38D845D770
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: mallocmemcpy
                                        • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                        • API String ID: 4276657696-1832275178
                                        • Opcode ID: 7d32dc7c02c0576a480f03aa2b20523e87f0181136edf8925a4e73fa6a3427c9
                                        • Instruction ID: c2b67559cec9340b3c5c136e2b18c5aed8287f0d3f466fea25092df28af8a2b3
                                        • Opcode Fuzzy Hash: 7d32dc7c02c0576a480f03aa2b20523e87f0181136edf8925a4e73fa6a3427c9
                                        • Instruction Fuzzy Hash: 0AA15471609BC684EB65AF21A9203AAB3A8FB48BC4F944135DD6D43798DF3CD845C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3401966785-2901970132
                                        • Opcode ID: fbe24e366b728afa5db670c27b8319507fe6065f7f31e2c79264c5bae932625d
                                        • Instruction ID: a522e88f4b625f6acb7819a47aecaad9657369bcd67ea14af3194a2bb9d1ca48
                                        • Opcode Fuzzy Hash: fbe24e366b728afa5db670c27b8319507fe6065f7f31e2c79264c5bae932625d
                                        • Instruction Fuzzy Hash: 2B61C351A0868285EB19AB3588341BEE7E9AF1D794F844935CE7E077D5EE3CE04583B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3401966785-517259162
                                        • Opcode ID: 742c0360e6210f7455115ce56e8553b7ac11c260097db8010f3a55c0742de8cc
                                        • Instruction ID: a96915d1111cd73353341f556f2638da814df72acf2815615094d6157b245726
                                        • Opcode Fuzzy Hash: 742c0360e6210f7455115ce56e8553b7ac11c260097db8010f3a55c0742de8cc
                                        • Instruction Fuzzy Hash: D061E151A0968285EB18A7358D342BAA7E9EF197D4F884535CA3E0B7D5FE2CE045C3B0
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7F6774E28), ref: 00007FF7F6791950
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7F6774E28), ref: 00007FF7F6791987
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF7F6774E28), ref: 00007FF7F67919AE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                        • API String ID: 1294909896-3948863929
                                        • Opcode ID: 28345fe83e5f92978302311b7c25afe45d2fd59016ff0eb21e1732458eff48fc
                                        • Instruction ID: 1a2139cc9ca889bb6fcc8129661ca1d97887b6edccf076a3e728dd81b8f393d3
                                        • Opcode Fuzzy Hash: 28345fe83e5f92978302311b7c25afe45d2fd59016ff0eb21e1732458eff48fc
                                        • Instruction Fuzzy Hash: 9C618F32608B8281EB60DF15E8643ABB3E9FB49B84F804036DA9D47798EF3CD555C761
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                        • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                        • API String ID: 1392894463-1168109407
                                        • Opcode ID: 18990fc156d9d11678551ccf624d1351fa5d6f5ee740d5d836fb751b64834d78
                                        • Instruction ID: dbead270a8b74643c2332567cfa3fac7a8fe7a54fe8f60de034a2eb421ed8b85
                                        • Opcode Fuzzy Hash: 18990fc156d9d11678551ccf624d1351fa5d6f5ee740d5d836fb751b64834d78
                                        • Instruction Fuzzy Hash: C441B421A0868285EB10AB25AC602BBE794FF49B84FD44131DA7E873D5DF2CE84183B0
                                        APIs
                                        • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0 ref: 00007FF7F6786F57
                                          • Part of subcall function 00007FF7F6787500: strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF7F6787536
                                          • Part of subcall function 00007FF7F6787500: _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF7F678758B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _fstat64_openstrchr
                                        • String ID: Accept-ranges: bytes$Can't get the size of file.$Content-Length: %I64d$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT%s$failed to resume file:// transfer
                                        • API String ID: 3410096895-1509146019
                                        • Opcode ID: 59da335d30f4d699e7207b292d001fc9ee825fbd86006c68da29940bdb92b76e
                                        • Instruction ID: 4727a8136c0fd7f8ad8ae04401258f1a4110e2e21d788978e4d67708af0c096c
                                        • Opcode Fuzzy Hash: 59da335d30f4d699e7207b292d001fc9ee825fbd86006c68da29940bdb92b76e
                                        • Instruction Fuzzy Hash: A8B17832A0C68285E721EB359D603BBA3A5FB98B84F944031DE5D477D5EE3CE80187B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strchr$mallocrealloc
                                        • String ID: 0123456789-$<DIR>$APM0123456789:
                                        • API String ID: 359134164-4291660576
                                        • Opcode ID: 1572c55741b108669f971dfd891189aed3ed9b688e2cf8bed39c0b620db78256
                                        • Instruction ID: cc977613be79743f039d492cbbe13afc00ef1aa253cb13ea830410193ec484f4
                                        • Opcode Fuzzy Hash: 1572c55741b108669f971dfd891189aed3ed9b688e2cf8bed39c0b620db78256
                                        • Instruction Fuzzy Hash: 39B14036908B4186EB64AF35D96033AA7F8FB49B48F944135CA6E073D5EE38E451C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: %s?%s$Failed sending Gopher request
                                        • API String ID: 111713529-132698833
                                        • Opcode ID: 5c15754a6507ecacf18ab4310b7ffd65b8a6eac73087b67df4945e53af86dda4
                                        • Instruction ID: caec07879e0573235ab39c890e1c8c328a37f708c913dba38eeafe6a838340ae
                                        • Opcode Fuzzy Hash: 5c15754a6507ecacf18ab4310b7ffd65b8a6eac73087b67df4945e53af86dda4
                                        • Instruction Fuzzy Hash: 9F519421A19A8281E751AB35AC201BBA798BB8DFE4F940231DE7D437D5EF3CD44187B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                        • String ID: value
                                        • API String ID: 1346393832-494360628
                                        • Opcode ID: 4a4d25d41ed406c1d0a011403156945727fdde6037d227963cedff3a9bb42d56
                                        • Instruction ID: c1a863394d959f088f5e1a8f6d5402d27c4c07fd4c4a2b3ef0e7736083050774
                                        • Opcode Fuzzy Hash: 4a4d25d41ed406c1d0a011403156945727fdde6037d227963cedff3a9bb42d56
                                        • Instruction Fuzzy Hash: 7E61A432A18A8585EB10DB74E8583EEA365EF497A4F504335DABC16AE9DF7CD081C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freeisupper$mallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 3511497317-3412697401
                                        • Opcode ID: 76afa4462d984f8d383d5eb4a1e9a793224edee2424a0de39b241f5a08cbdea3
                                        • Instruction ID: aef9ce588ef95c31e76d4f2a5c02abcf960f309a8d0d76eca31b31d98c8a3c87
                                        • Opcode Fuzzy Hash: 76afa4462d984f8d383d5eb4a1e9a793224edee2424a0de39b241f5a08cbdea3
                                        • Instruction Fuzzy Hash: 8D512811E0E69245FB19E6364D3437ABBD6AB5AB90F844335C6BF02AD5EE3D9041C3B0
                                        APIs
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF7F6787536
                                        • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF7F678758B
                                        • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF7F67875FC
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF7F6787609
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF7F678771B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _close$_fstat64_openstrchr
                                        • String ID: Can't get the size of %s$Can't open %s for writing
                                        • API String ID: 423814720-3544860555
                                        • Opcode ID: 47806318dad57eb09a6b322e9798bef99cc3e6e357c7198381fcfe81f338dd94
                                        • Instruction ID: 6a4673f9516029caebc8c15c011572c6767985c04ec6777a2dbffb034722348c
                                        • Opcode Fuzzy Hash: 47806318dad57eb09a6b322e9798bef99cc3e6e357c7198381fcfe81f338dd94
                                        • Instruction Fuzzy Hash: BD517561718A4281EB14AB359C602BFA399FB8DFD4F944435DA6E473D5EE3CE84183B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdupstrtol
                                        • String ID: %%%02x
                                        • API String ID: 2999891020-4020994737
                                        • Opcode ID: 644ecf454b5406c55117dfc577d459684ad165775d5b9113ed441861368e03cd
                                        • Instruction ID: dd7dee1e80425e79b7800b65735c5f93daca56f84a573b6dfc4ed81313c8eaa2
                                        • Opcode Fuzzy Hash: 644ecf454b5406c55117dfc577d459684ad165775d5b9113ed441861368e03cd
                                        • Instruction Fuzzy Hash: F551BC2190D2C245FB61AB35583437AAA94BF5AFD0FA80171DABE473C1DE2DE844C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1496848336-4020994737
                                        • Opcode ID: bb92e0fb6e8724d6a603b74c0048d4e019eb1dcf875e4f0697c5b41cb2e9f126
                                        • Instruction ID: 84b601dd1b8a7723dc6e81387bc775c00282b49a45f2f5d91f6b77f90d33efdb
                                        • Opcode Fuzzy Hash: bb92e0fb6e8724d6a603b74c0048d4e019eb1dcf875e4f0697c5b41cb2e9f126
                                        • Instruction Fuzzy Hash: 2741BB2190D6D245FB61AB35582437AAB99BF5AB90F980171DABE073C1DE2DE844C370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLasthtonssend
                                        • String ID: Sending data failed (%d)
                                        • API String ID: 2027122571-2319402659
                                        • Opcode ID: 0fa8e56fa81545f9f8688c2b6d7ab52c58c37d91cada740fb0c289274a355cef
                                        • Instruction ID: 845de0d5a283f70430fb8599042e893bdec650e9449094039507816e3f5a9247
                                        • Opcode Fuzzy Hash: 0fa8e56fa81545f9f8688c2b6d7ab52c58c37d91cada740fb0c289274a355cef
                                        • Instruction Fuzzy Hash: A041D032608A8680E7006F35D924AAEB324F759F88FC44632DBA9037D8DF7CE456C361
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 111713529-2901970132
                                        • Opcode ID: 239da363b9946295e359e9748766d2625f1db9500ef6f53e91155123ced98a70
                                        • Instruction ID: 900857db0dc051ebdfaf4bcfe1ffad1d12d5085bdc290e91e4c701872341c085
                                        • Opcode Fuzzy Hash: 239da363b9946295e359e9748766d2625f1db9500ef6f53e91155123ced98a70
                                        • Instruction Fuzzy Hash: B4313F65A0878285EB15AB619C241FAA7A9BF0D788FC44835CE6D173D6EE3CE104C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 111713529-517259162
                                        • Opcode ID: 0fa73a337b14f544b56cbf689623e98a816b00dcf3c2286807af888b4a2c9cbe
                                        • Instruction ID: 6bcc08032fd4e9d45febd9534298ea0c66c0a526f4ea66a2e445c3f70f411bac
                                        • Opcode Fuzzy Hash: 0fa73a337b14f544b56cbf689623e98a816b00dcf3c2286807af888b4a2c9cbe
                                        • Instruction Fuzzy Hash: A9314355A0978284EB14A7759C241FBA7A9AF0D788FC84835CE6D173D6FE3CA40483B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Expire Date$Public Key Algorithm
                                        • API String ID: 1294909896-3805148269
                                        • Opcode ID: 3b490722dc74504eb9dd9ef87649719e5d11dc463ea0953fe5ed6b16c9670ad0
                                        • Instruction ID: 33b6a1d2e0b684d41f909785d26f7bbc03e3109be68dbd7544193e422e624f05
                                        • Opcode Fuzzy Hash: 3b490722dc74504eb9dd9ef87649719e5d11dc463ea0953fe5ed6b16c9670ad0
                                        • Instruction Fuzzy Hash: 5371A061A0868284EB14AB359C241FAE7E9FB0A784FC44836DA6D177D5EF3CE145C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-599393795
                                        • Opcode ID: 388a09dec5b697b908bc13682b02e5d7ea3e4acabdcfc6577ff0b92c602df413
                                        • Instruction ID: 18d2b05719e1946ae9fdb33209cb193cb54ec8dc32890476f979836fe14f6353
                                        • Opcode Fuzzy Hash: 388a09dec5b697b908bc13682b02e5d7ea3e4acabdcfc6577ff0b92c602df413
                                        • Instruction Fuzzy Hash: AF61B061A096D284EB14AB359C241BAEBE8AB097C4FC84436DA6D077D5FF3CE541C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc$memcpy
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 901724546-1663925961
                                        • Opcode ID: 88c815334131e338bb9b5bca162bc0b0591a3bf54374b822b0adf169f96e1fa6
                                        • Instruction ID: 7a2710a5a015f73420f804fc359faa83b0d37cb9938d1c46453b3e673e9d39b0
                                        • Opcode Fuzzy Hash: 88c815334131e338bb9b5bca162bc0b0591a3bf54374b822b0adf169f96e1fa6
                                        • Instruction Fuzzy Hash: 7E513611A0868245EB18AA2598243BBE794FB497E4F840A36CA7F077D5FE2CE045C371
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$Expire Date$GMT$Public Key Algorithm
                                        • API String ID: 1294909896-1642401773
                                        • Opcode ID: b835cbb95ab126bbad8e794f07ad83e9ba5c3e34d718217ebb3e2543cfac9581
                                        • Instruction ID: b9c398e66f72394ee84ad9ddce79a1062f0601781049aaa75c16f18502b1b1c8
                                        • Opcode Fuzzy Hash: b835cbb95ab126bbad8e794f07ad83e9ba5c3e34d718217ebb3e2543cfac9581
                                        • Instruction Fuzzy Hash: 93516361A0978294EB14AB759C201FAE7A9FB0D784FC84835CA6D172D5EF3CE545C3B0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdup
                                        • String ID:
                                        • API String ID: 1169197092-0
                                        • Opcode ID: 1b0595316675f82772fc28900d3198f3d8a03ff6b87a63347f3563558c6d9905
                                        • Instruction ID: 4b3e7dd23dca27f93fbcfb8c9e733fa58ae884cf5770a8e6812f91364686604b
                                        • Opcode Fuzzy Hash: 1b0595316675f82772fc28900d3198f3d8a03ff6b87a63347f3563558c6d9905
                                        • Instruction Fuzzy Hash: CC51A426A1AB8181EB55DF16F45012973A8FB4CB84B481175DFAD03B8DDF3CE8A1CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-3876350232
                                        • Opcode ID: 3c568e79d8b76ca8c0f4947349ea53ad1015d81a9fc9ab77821cedc04fbb5508
                                        • Instruction ID: 98f1afdcaf84316cf47755a5d892785618f7d0f7adaf3654060ea6ccc467c360
                                        • Opcode Fuzzy Hash: 3c568e79d8b76ca8c0f4947349ea53ad1015d81a9fc9ab77821cedc04fbb5508
                                        • Instruction Fuzzy Hash: 9C515161A0978284EB14AB359C601FAE7A9EB097C4FC84435DA6D173D5EF3CE545C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3401966785-2901970132
                                        • Opcode ID: 546c04391f3f1894b024eb3058d86346fbee1fd25c8aed46030c2e58979d9950
                                        • Instruction ID: 25c21527c0557c920ecd57a5b356a5f4211aafd0a8bf6ca38e4bb1ed95d2a04b
                                        • Opcode Fuzzy Hash: 546c04391f3f1894b024eb3058d86346fbee1fd25c8aed46030c2e58979d9950
                                        • Instruction Fuzzy Hash: 2E416065A0878244EB15AB719D241FAE7A9BF1D788FC44935CE2D177D5EE3CE10483B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Entry path is '%s'$Failed to figure out path$SYST
                                        • API String ID: 2190258309-1780565354
                                        • Opcode ID: 868c23e0445c8f829c81cdfaee16e57183642d2d1252c1cd069e64622adada94
                                        • Instruction ID: 71ba6e328e5db6485a44072767d78ca750adee9d42c48979ec4ea77edf05f33f
                                        • Opcode Fuzzy Hash: 868c23e0445c8f829c81cdfaee16e57183642d2d1252c1cd069e64622adada94
                                        • Instruction Fuzzy Hash: 32419661E0868291EB61EB35EC642BBA798BB0DF84F904031CAAD037D6DE3CD44593B0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 055e168fb65f423c57915a892bfce5b182b090623d16bc49fd49c5fdfd9f067a
                                        • Instruction ID: 11587e2cb55a2f06aa7ffce9f861ffc051fb6b792b39cf24ade7855b1c993937
                                        • Opcode Fuzzy Hash: 055e168fb65f423c57915a892bfce5b182b090623d16bc49fd49c5fdfd9f067a
                                        • Instruction Fuzzy Hash: 0C413022918B52C2E761AF25986023A77A8FB5DB84F844635DAAD53398DF38D850C3B0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: c643178a85888b15959d4e7ca118a99b6d7baaba478ac413579d56a64d74c09d
                                        • Instruction ID: 798f56f36235336e4dc9ff7b21304fc536d29e1938ecf528b270887baf810f79
                                        • Opcode Fuzzy Hash: c643178a85888b15959d4e7ca118a99b6d7baaba478ac413579d56a64d74c09d
                                        • Instruction Fuzzy Hash: 06311E36618A52C1D720AF12EC1522AB778FB99FC4F440431DEAD43B99DE3DD841D7A0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 1ca458fc3389da7aade84e51b82ba5cd5ed2bd2528ed2cb808cc53f9e49b542e
                                        • Instruction ID: 7096cc91a715f09f2c412ec49492b58810e76be265246310e8253ea12d7ae936
                                        • Opcode Fuzzy Hash: 1ca458fc3389da7aade84e51b82ba5cd5ed2bd2528ed2cb808cc53f9e49b542e
                                        • Instruction Fuzzy Hash: 0521F876618A52C2D720AF25EC2112AB378FB9AB84F440431DEAD43769DF3CD845C7A0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: aab127bf0e8542732e3c18ba64e321ddd3c5e6f1a73537df46da66dd3b5eae98
                                        • Instruction ID: e38eb8921121855267e3cf5f1c2b1698901f8d932b812086a88ed67d66a7f685
                                        • Opcode Fuzzy Hash: aab127bf0e8542732e3c18ba64e321ddd3c5e6f1a73537df46da66dd3b5eae98
                                        • Instruction Fuzzy Hash: 9A01A966624A12C2DB14AF26EC65139A334FF9EF85B441431DDBE433A9DE2CD844D3B0
                                        APIs
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF7F67933F3), ref: 00007FF7F6794088
                                        • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF7F67933F3), ref: 00007FF7F67940CA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF7F67933F3), ref: 00007FF7F679416F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FF7F67933F3), ref: 00007FF7F6794182
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F6794667
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$memcpystrchr
                                        • String ID: %s?dns=%s$Failed to encode DOH packet [%d]
                                        • API String ID: 1438451818-3030351490
                                        • Opcode ID: 4fadfb71b7984ed60b0423e7eae2986a5b3e6e9891e7e44db6b0c4a082480bef
                                        • Instruction ID: 54c4c9c3203a3c44569b0eb1b056f9b7b617dce8b0da45ba4bf663b6a1ca88dd
                                        • Opcode Fuzzy Hash: 4fadfb71b7984ed60b0423e7eae2986a5b3e6e9891e7e44db6b0c4a082480bef
                                        • Instruction Fuzzy Hash: FF02937171878245FB11AA769C643BBA7DDAB59788F814031DE2C477CEEE68E841C3B0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpymemset
                                        • String ID:
                                        • API String ID: 1579693990-0
                                        • Opcode ID: 9adbed3489a0455967ee38d16e91ff20980ce936b9dff803bb5791a7768888f6
                                        • Instruction ID: 1a371f7b053f48b2298ea7a403808a1b39d2919a08c82d81cbf82f21c961033c
                                        • Opcode Fuzzy Hash: 9adbed3489a0455967ee38d16e91ff20980ce936b9dff803bb5791a7768888f6
                                        • Instruction Fuzzy Hash: 2C914021B0C74281EB64AA275D6437B92E8AF49BC4F844134DE6D477C9FF2CE85183B4
                                        APIs
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7F675B26A,?,?,?,?,?,?,?,00007FF7F675B037), ref: 00007FF7F6778251
                                        • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7F67783F3
                                        • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7F6778410
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strchr$_errno
                                        • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                        • API String ID: 2644425738-1191287149
                                        • Opcode ID: 7c5d4e7d2faa273dc8e58ced809aa81b5d23591f7467f2b6c40110dc8b8441fb
                                        • Instruction ID: 4513d2ac513befc0f99a3fa5197a52f3c36c2c86046c1ee85837b7639b250333
                                        • Opcode Fuzzy Hash: 7c5d4e7d2faa273dc8e58ced809aa81b5d23591f7467f2b6c40110dc8b8441fb
                                        • Instruction Fuzzy Hash: 3A510922F2C78541EF11AB15E86017FEB98AB5A788FD44131DA6E067D5DE3CD581C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: isupper$free
                                        • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                        • API String ID: 573759493-910067264
                                        • Opcode ID: 9ea57fa784b95d5cecdc159aef28458afd098b0769c5b2b03456adca71fa3106
                                        • Instruction ID: a646b2ec03362a7cdf63f1e131b00f6d0edea44c5be7723af78f03d0314c0cde
                                        • Opcode Fuzzy Hash: 9ea57fa784b95d5cecdc159aef28458afd098b0769c5b2b03456adca71fa3106
                                        • Instruction Fuzzy Hash: 82610321A0D6D244FB11AB359D2427BFBE9AB0A784FD84031D6AD02AD5EF3DD445C7B0
                                        APIs
                                        • memcpy.VCRUNTIME140(?,?,?,00007FF7F6741DFA), ref: 00007FF7F6745EA1
                                        • memcpy.VCRUNTIME140(?,?,?,00007FF7F6741DFA), ref: 00007FF7F6745EE5
                                        • memcpy.VCRUNTIME140(?,?,?,00007FF7F6741DFA), ref: 00007FF7F6745EFD
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7F6741DFA), ref: 00007FF7F6745F82
                                          • Part of subcall function 00007FF7F679FB48: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7F674442E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F679FB62
                                        • memcpy.VCRUNTIME140(?,?,?,00007FF7F6741DFA), ref: 00007FF7F6745FB4
                                        • memcpy.VCRUNTIME140(?,?,?,00007FF7F6741DFA), ref: 00007FF7F6745FCF
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7F6745FEC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                        • String ID:
                                        • API String ID: 1155477157-0
                                        • Opcode ID: 105eb5b8ecb37e2dada83aefac9818a8211f75c97886bab9d9afdb0a84635369
                                        • Instruction ID: bd9bebc8ecf12358c1c5ab82512c88f8943102a271905efbefb3331650b6037a
                                        • Opcode Fuzzy Hash: 105eb5b8ecb37e2dada83aefac9818a8211f75c97886bab9d9afdb0a84635369
                                        • Instruction Fuzzy Hash: A351D822619B81C1FB04EF25D96816AA369FB08BD4F940A31DE3D077D1CF78E195C3A1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strstr
                                        • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                                        • API String ID: 1392478783-2096918210
                                        • Opcode ID: f36673910abb49c915d81611450cd3aef25059b3077479c1ad091aa4937d379d
                                        • Instruction ID: be83a8668437cfbddaaa042c371b8fa49cde51134e8b39ce7242bf531f8791cd
                                        • Opcode Fuzzy Hash: f36673910abb49c915d81611450cd3aef25059b3077479c1ad091aa4937d379d
                                        • Instruction Fuzzy Hash: B751DD22A0974641EB24A779AC6427AE398FB4DB74FD80231D97C026D1DF7CDC8687B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                                        • API String ID: 2190258309-3231818857
                                        • Opcode ID: 55d78412daaa31d674ec054b636355c7addbf0a6c2a3f49e325662ff4e4aa6d3
                                        • Instruction ID: 17077364332c0cc0a47677e7559bc71bc944e4a0985416a6945537aaea7d8f29
                                        • Opcode Fuzzy Hash: 55d78412daaa31d674ec054b636355c7addbf0a6c2a3f49e325662ff4e4aa6d3
                                        • Instruction Fuzzy Hash: 3351B462B0C6C285EB119B65A8242BBE7E9FB49790F944832DA9D03795EF3CD145C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Digest$stale$true
                                        • API String ID: 1294909896-2487968700
                                        • Opcode ID: cd561cf00eb158123dea8fd1aef4a8a90218ffcbb6a09d60f9fec1baa2a441d2
                                        • Instruction ID: cbdd780d98b252e9399c1b359afca56d2912f25eef23c78c31b6983ec6c70f4c
                                        • Opcode Fuzzy Hash: cd561cf00eb158123dea8fd1aef4a8a90218ffcbb6a09d60f9fec1baa2a441d2
                                        • Instruction Fuzzy Hash: 25517722518A4681FB20AB25ED603BAA3E8FF4D784F944131DABD476C5EF2CD515C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memchrmemcpyrecvfrom
                                        • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                        • API String ID: 3107918033-477593554
                                        • Opcode ID: 3a54981905c914cdaef3556359282fe403773f15e8db7d6cbb4857878a6436a4
                                        • Instruction ID: 5a5243ae7df36b4e7f885791512edf81ac5802cfb7f1031b4800867748e188a8
                                        • Opcode Fuzzy Hash: 3a54981905c914cdaef3556359282fe403773f15e8db7d6cbb4857878a6436a4
                                        • Instruction Fuzzy Hash: 6A51C771A08582C5EB54AB35DD203BBA7A4FB48B88F944132DA6D477C5DE3CE845CBB0
                                        APIs
                                          • Part of subcall function 00007FF7F6746E10: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7F674240B), ref: 00007FF7F6746E8E
                                          • Part of subcall function 00007FF7F6746E10: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7F674240B), ref: 00007FF7F6746E9C
                                          • Part of subcall function 00007FF7F6746E10: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF7F674240B), ref: 00007FF7F6746EB2
                                          • Part of subcall function 00007FF7F6743BF0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF7F6741DCB), ref: 00007FF7F6743C36
                                          • Part of subcall function 00007FF7F6745E10: memcpy.VCRUNTIME140(?,?,?,00007FF7F6741DFA), ref: 00007FF7F6745EA1
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67424A9
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F67424E8
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742536
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742584
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                                        • String ID: at line $, column
                                        • API String ID: 2665656946-191570568
                                        • Opcode ID: ac706bb0521000e4c115238f0d9df125bc0f969b470b4f5ee90fe16b4f1feced
                                        • Instruction ID: 4f29d168d859ea43bdf1985f32d3a66d1282dd561c52646a8cd362efdc9fadfd
                                        • Opcode Fuzzy Hash: ac706bb0521000e4c115238f0d9df125bc0f969b470b4f5ee90fe16b4f1feced
                                        • Instruction Fuzzy Hash: E551C462B08A81C5FB00EB74D9643AE6325EB487A8F405235DE7C13BD9DE38D495D3A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                        • API String ID: 1294909896-1255959952
                                        • Opcode ID: 3f6686c5872a1f6a81ecd9e0f058412ef29e7e2cd2025b5abae98a3b82803512
                                        • Instruction ID: 5d578aeb2c4a87a3f6e3d07edceb7ffd2327f384bfe67bd1a63505e7a43bc663
                                        • Opcode Fuzzy Hash: 3f6686c5872a1f6a81ecd9e0f058412ef29e7e2cd2025b5abae98a3b82803512
                                        • Instruction Fuzzy Hash: 0951C532A0864296FB11EB35D8602BAA7D8FB49794F844031DA6D432D1FF3DE461C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 1fb06e9a3e7450c4a3794c0b93c4f63385b47844a9cf2e3dc595b16c47b35eb1
                                        • Instruction ID: 1e81dc7e5dbec2c1a4f129fecba05ecf5101640b68f501bded30f533dfb725aa
                                        • Opcode Fuzzy Hash: 1fb06e9a3e7450c4a3794c0b93c4f63385b47844a9cf2e3dc595b16c47b35eb1
                                        • Instruction Fuzzy Hash: 7941DA2190D6D245FB62AB35583037AAB98BF5ABD4F980171DAAE473C1DE2DE844C370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: dfaed6e386e33724cb2e223900adcbd9f7fef9935f9687bffa3bbf8d2aa51031
                                        • Instruction ID: 57ac5a446dc5c610757f63e61b6605732f699a29a45c6960e8a004053033de82
                                        • Opcode Fuzzy Hash: dfaed6e386e33724cb2e223900adcbd9f7fef9935f9687bffa3bbf8d2aa51031
                                        • Instruction Fuzzy Hash: D541DC2190D2D245FB62AB35583437AAB95BF5ABD4FA80171D9BE073C1DE2DE844C370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: a5c0cff52b00059ef7d8c77f212d0b1658b3423eb890fb7911eff90761143d53
                                        • Instruction ID: 9920c5acc03da87f16034a9cae2f494d9a553dd90f831efb7237de6d556c3b77
                                        • Opcode Fuzzy Hash: a5c0cff52b00059ef7d8c77f212d0b1658b3423eb890fb7911eff90761143d53
                                        • Instruction Fuzzy Hash: F341BA2190D6D245FB62AB35583437AAB99BF5ABD0FA80171D9BD073C1DE2DE844C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 2e3edc563f2aee38bc4da222f14dc07a5d5f3b87b8ef437c646bcd55731b9087
                                        • Instruction ID: 1c0d6605a52734c07023f3b0c89cdb76561352f26a953420737bbf1d648425d4
                                        • Opcode Fuzzy Hash: 2e3edc563f2aee38bc4da222f14dc07a5d5f3b87b8ef437c646bcd55731b9087
                                        • Instruction Fuzzy Hash: E441BA2190D6D245FB62AB35583437AAB99BF5ABD0FA80171D9BD073C1DE2DE844C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 3c17b8edd8f51791b30496a62c6b8e61968bdc908898effc3d30ade1595102bd
                                        • Instruction ID: 5d490ab973fac1c5746bd90d6eb8d06d4cf35028807b46d5ffb2ab68f1bb7a2d
                                        • Opcode Fuzzy Hash: 3c17b8edd8f51791b30496a62c6b8e61968bdc908898effc3d30ade1595102bd
                                        • Instruction Fuzzy Hash: 7441BA2190D6D245FB62AB35583437AAB99BF5ABD0FA80171D9BD073C1DE2DE844C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: b67b34d9d2b74a6abba1901238562642ff15dceaa1a23bc772bb3e51d676fca3
                                        • Instruction ID: 3ebe46b8ffa4331ae53e23bedf8bd2c40d5601baa725cf063c3eb72e964ed5d7
                                        • Opcode Fuzzy Hash: b67b34d9d2b74a6abba1901238562642ff15dceaa1a23bc772bb3e51d676fca3
                                        • Instruction Fuzzy Hash: D241BC2190D6D245FB61AB35583437AAB95BF5ABD0FA80171D9BD073C1DE2DA844C370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: eebc2a546fc8e6feac9b87d948e5f37beee0bb11b8e0f088ce828c99f435c154
                                        • Instruction ID: abfae14243b6bbec44c7e3c77b9ad88052630adb5c1814345dc13e5333017e63
                                        • Opcode Fuzzy Hash: eebc2a546fc8e6feac9b87d948e5f37beee0bb11b8e0f088ce828c99f435c154
                                        • Instruction Fuzzy Hash: EA41CA2190D6D245FB62AB35583437AAB99BF5ABD0F980171DABD073C1DE2DE844C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strchr
                                        • String ID: 100-continue$Expect$Expect:$Expect: 100-continue
                                        • API String ID: 2830005266-711804848
                                        • Opcode ID: 7e7249d2413e93b8756c8e5a769afa0f3ec6f63a671b70d6ce7e4fc1b7ebd840
                                        • Instruction ID: e109d72d19269ac580b3ed6cf18b3427dd88ab90450a9f21c79f3f56f1b29672
                                        • Opcode Fuzzy Hash: 7e7249d2413e93b8756c8e5a769afa0f3ec6f63a671b70d6ce7e4fc1b7ebd840
                                        • Instruction Fuzzy Hash: 1D41F921B2C78281EB54AB1BAD200BAE3949F4D788FC85034DA7D477DADD1DE4418BB4
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _time64
                                        • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                        • API String ID: 1670930206-870032562
                                        • Opcode ID: 293506947766e32d74f725f200bba93e5a6cab1f91c5436f01adaa20fbc03ab6
                                        • Instruction ID: 4cf1f7b1f936a683f90ed4485ee5a51ef6d4b8dd3ef477075fb5805e48386d0c
                                        • Opcode Fuzzy Hash: 293506947766e32d74f725f200bba93e5a6cab1f91c5436f01adaa20fbc03ab6
                                        • Instruction Fuzzy Hash: 25412B7272861586DB24DF3AE41056977A4F78CF88FA05132DE1C877D4DE39E941CB90
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$%s%lx$Expire Date$Public Key Algorithm
                                        • API String ID: 1294909896-3155708153
                                        • Opcode ID: d2c81df787f58d74bd1c2b5c7b52d4f0f54536a8e8ffd5d60f426d4f5dc7a506
                                        • Instruction ID: 2779989e05ab7ffdcec4fcd4b5df1b99ab3cbcdd12b3a513fd6cce183f66f50d
                                        • Opcode Fuzzy Hash: d2c81df787f58d74bd1c2b5c7b52d4f0f54536a8e8ffd5d60f426d4f5dc7a506
                                        • Instruction Fuzzy Hash: 38415461A0968284EB15AB759C241FAA7A9AF0D788FC44835CE6D176D6FF2CE10483B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                                        • API String ID: 2190258309-3662781045
                                        • Opcode ID: 950803be5321596d8ae6dcd6400d6715bd22c82becce96dbb6edd16642afa6e7
                                        • Instruction ID: fedbf1fe15c47015ca4882aeb2f31903d7a7872df22fc34c44957fcec0458764
                                        • Opcode Fuzzy Hash: 950803be5321596d8ae6dcd6400d6715bd22c82becce96dbb6edd16642afa6e7
                                        • Instruction Fuzzy Hash: C5417722A1878285EB10AF25E8601ABE3A8FB49784FC84432DA5D177D5EF3CD545C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-659367561
                                        • Opcode ID: f392083efe6b65ded1fc2e6bc662f49a9fc365949f050ff65cdf9f05b9f96eba
                                        • Instruction ID: c345670be395a83389de4ef633dfba8cd01ed3ff9f5a2ed7b27313e1406fad36
                                        • Opcode Fuzzy Hash: f392083efe6b65ded1fc2e6bc662f49a9fc365949f050ff65cdf9f05b9f96eba
                                        • Instruction Fuzzy Hash: 34417755A0968284EF14A7359C241BBABA9AF0D7C4FC84831DE6E177D6FE3DE04483B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: .
                                        • API String ID: 1865132094-916926321
                                        • Opcode ID: 027f7fe9b366bf7d7183bdacec28f6c9f86bb076554f293a86ea0004c285c0c6
                                        • Instruction ID: 7d2651039f25a4f658058b10d16b2ea8f01d8dc970798cf93c3d19501fcbc662
                                        • Opcode Fuzzy Hash: 027f7fe9b366bf7d7183bdacec28f6c9f86bb076554f293a86ea0004c285c0c6
                                        • Instruction Fuzzy Hash: 45416422A08B4681F750EB259C2037AA3A8FB4DF80F954031DA6D476D5DF3CE89187F0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3401966785-517259162
                                        • Opcode ID: 25f84c5534454b8c43c74e32c76f92ce0ee4c5d2a495e4f678ebbaf9449bc15d
                                        • Instruction ID: 37d0e5c94d28dcb7133828645608ba105d2ac77e65bf180a75a4dd85ef53a5ad
                                        • Opcode Fuzzy Hash: 25f84c5534454b8c43c74e32c76f92ce0ee4c5d2a495e4f678ebbaf9449bc15d
                                        • Instruction Fuzzy Hash: 4F417255A0978284EB15AB359C241FAA7A9BF097C8FC84435CE2D177D5FE3CA504C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: isupper$freemallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 2172629687-3412697401
                                        • Opcode ID: 81732ace61d0e8073f3c1e9c35bbff8b0fbca31934598ee0c7dac7d395ac8eea
                                        • Instruction ID: 8ea69456f675d4381b2f7107f1ceb7036552b8a52edc76f33b42b7596541571f
                                        • Opcode Fuzzy Hash: 81732ace61d0e8073f3c1e9c35bbff8b0fbca31934598ee0c7dac7d395ac8eea
                                        • Instruction Fuzzy Hash: 7531FA11E0E69245FB12EB364D24376FBD96B5AB90F844631C97E02AD5EE3E9441C370
                                        APIs
                                          • Part of subcall function 00007FF7F677C880: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F6760DF9,?,?,?,?,00007FF7F676019B), ref: 00007FF7F677C8A8
                                          • Part of subcall function 00007FF7F677C880: GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF7F6760DF9,?,?,?,?,00007FF7F676019B), ref: 00007FF7F677C8CE
                                          • Part of subcall function 00007FF7F677C880: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F6760DF9,?,?,?,?,00007FF7F676019B), ref: 00007FF7F677C8EF
                                          • Part of subcall function 00007FF7F677C880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F6760DF9,?,?,?,?,00007FF7F676019B), ref: 00007FF7F677C900
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F6790E0F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F6790E58
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F6790E61
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$realloc$EnvironmentVariable
                                        • String ID: %s%s.netrc$%s%s_netrc$HOME
                                        • API String ID: 4174189579-3384076093
                                        • Opcode ID: 9e24961a21cdaee02f2969bed35d094b8ed2ff04c1a69ee7d1d5efb70e16ef92
                                        • Instruction ID: f4990f512866627471525b5ef27ce4a83f93f6d6120468707045332f73a76470
                                        • Opcode Fuzzy Hash: 9e24961a21cdaee02f2969bed35d094b8ed2ff04c1a69ee7d1d5efb70e16ef92
                                        • Instruction Fuzzy Hash: 1A314121A19B5281EB24BB26BC20167E3A8BF4DB90F844535EDAC477D5FE3CE40593B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc$memcpy
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 3519880569-1663925961
                                        • Opcode ID: 41a64bd3ee70ac3280c524507bdb8a6bfecaf95fafe27d1a23f5f35e8675915e
                                        • Instruction ID: cf3558bb7df98dcfbb348ec7c27fd0c1fc914f685955ca8471c3895d49bc4c81
                                        • Opcode Fuzzy Hash: 41a64bd3ee70ac3280c524507bdb8a6bfecaf95fafe27d1a23f5f35e8675915e
                                        • Instruction Fuzzy Hash: FC318561A0978245EB55AB2698242BBD394FF49BD4F840932DD6D177D5EE3CE0018370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: __stdio_common_vsscanf_strdupfree
                                        • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                        • API String ID: 860312144-3309259123
                                        • Opcode ID: 4f8b19885a3942946affcb2a731a69568565c9aeb0bd8ea935e111cb0f4ff412
                                        • Instruction ID: 7c7c0413196706886a7c49a4d49b89f3fbdf3f87f94c1c5b1ea4da100d9f9ea5
                                        • Opcode Fuzzy Hash: 4f8b19885a3942946affcb2a731a69568565c9aeb0bd8ea935e111cb0f4ff412
                                        • Instruction Fuzzy Hash: 05311062A18A8281EB64BB20DE601BFA368FF4D794F944431CA6D476D5DF2CE85183F1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1941130848-1663925961
                                        • Opcode ID: ca1245fe2eff767ec2f233e59202265185292fa145f8adc7ec0566ffc5c026f4
                                        • Instruction ID: 189cc680018f856220a423c0a73793cb0c7afc46320a9ec0b3afa8892b7e0c11
                                        • Opcode Fuzzy Hash: ca1245fe2eff767ec2f233e59202265185292fa145f8adc7ec0566ffc5c026f4
                                        • Instruction Fuzzy Hash: 06214562A1868285EB54AB25E8642BBE3A8FF4D7C4F840432DE6D17795EF3CD105C770
                                        APIs
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F6765FB5
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F6765FE1
                                        • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F6765FE9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F676600B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7F67632FC), ref: 00007FF7F6766022
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_errnostrerrorstrtoul
                                        • String ID: Invalid zoneid: %s; %s
                                        • API String ID: 439826447-2159854051
                                        • Opcode ID: 1e5153ef112f2720b21915057dfbc39a98e88746b31ffda249c79a4b110ed5cd
                                        • Instruction ID: f71fe7ff45712558980960d33e3b96d4fc7fbe0c909dad30beec3c6416c40dc5
                                        • Opcode Fuzzy Hash: 1e5153ef112f2720b21915057dfbc39a98e88746b31ffda249c79a4b110ed5cd
                                        • Instruction Fuzzy Hash: 5D118171A19642C2EB10AB25EC6057BA364FF8AB44FD40031DA7D436E4EE2DE844DBB0
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765EC4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765EDA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765EEE
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765F02
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765F16
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765F2A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765F3E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F6765F52
                                          • Part of subcall function 00007FF7F678EE50: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6765F6B,?,?,00000000,00007FF7F67619B3,?,?,00000000,00007FF7F6761F35), ref: 00007FF7F678EE65
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 7eb113df98b6ab4a04c26d3616b0b5b8789459c08ce18511ff8b14322545e604
                                        • Instruction ID: 55ecd92d3a4421a5a14411e576838a43ac5115b1ce409bf1bbfd958e5d9eb8c6
                                        • Opcode Fuzzy Hash: 7eb113df98b6ab4a04c26d3616b0b5b8789459c08ce18511ff8b14322545e604
                                        • Instruction Fuzzy Hash: 4D11B636518F81C1D7109F25EDA51E973B8FBDAF8AB580031EE6A4F6999F348055C270
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: e45aeea8ff3dcbb3fd8da7c6b960110f74b281d7bdb83cb583dbac18daa8ca81
                                        • Instruction ID: 784bccb688d40c6ebe9541ac91079d66144839fd346eec9f3c70a76ab6044760
                                        • Opcode Fuzzy Hash: e45aeea8ff3dcbb3fd8da7c6b960110f74b281d7bdb83cb583dbac18daa8ca81
                                        • Instruction Fuzzy Hash: A3F05966A24912C2D724AF2AEC661396334FBAEF45B441431DD7E423A9DE2CD845D3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Start Date: %s$Start Date
                                        • API String ID: 3401966785-2389359183
                                        • Opcode ID: c3347e06e0772bf1e423b4f3f997015e39df33b2c3b1c317c076bd70ed71b90e
                                        • Instruction ID: 3b7bf1c20bf075a096502805758d6b82321fdeaad01af2af6f93faa0ed04fda8
                                        • Opcode Fuzzy Hash: c3347e06e0772bf1e423b4f3f997015e39df33b2c3b1c317c076bd70ed71b90e
                                        • Instruction Fuzzy Hash: 3C412751A0928245EF1C673548352BAA7D6EB1EBD4F888635CA3F077D5FE2CA44583B0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: a20e593d4bd82ef9cc10abe2e2397c5f0dd4fde0d56d9362464a2f7d70bc2716
                                        • Instruction ID: e9b04d4a3c2959920ef159964b61b465fbe4a49efc216bdf7715f480d59ffb35
                                        • Opcode Fuzzy Hash: a20e593d4bd82ef9cc10abe2e2397c5f0dd4fde0d56d9362464a2f7d70bc2716
                                        • Instruction Fuzzy Hash: 4831B22171D641C6EF14BB2699281AAE269AB48BE0F944732DE7D07BD5DF3CE041C370
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ConditionMask$InfoVerifyVersion
                                        • String ID:
                                        • API String ID: 2793162063-0
                                        • Opcode ID: 886a942f540bc7cf8f29631a9320e31e516c52bfc616a14f4d3cfc983c6169fc
                                        • Instruction ID: 82281fd14e8123af03ba0c1f43569ab58844870cf016af29bd90d3254f4d1458
                                        • Opcode Fuzzy Hash: 886a942f540bc7cf8f29631a9320e31e516c52bfc616a14f4d3cfc983c6169fc
                                        • Instruction Fuzzy Hash: 87412B22E1C682C6F3309B11E8247BBF364EBD9300F545235E9E903B95DE3EE4819B60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 1294909896-2901970132
                                        • Opcode ID: 7c92a4bbe7371fb4b1d8e617a56d88ad3c7bf77f1d7e34ffe023260c47be8e9d
                                        • Instruction ID: 80b0668a960957dc39cc359c7e89a5ef9c05dc1fa3f324e88fb07fdd8e1c3a4d
                                        • Opcode Fuzzy Hash: 7c92a4bbe7371fb4b1d8e617a56d88ad3c7bf77f1d7e34ffe023260c47be8e9d
                                        • Instruction Fuzzy Hash: AB417365A087C285EB14AB619C241FAA7A9BF0D788F884935CE6D177D6EF3CE104C370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-517259162
                                        • Opcode ID: 7b7e3b5bfc8c0bbd38473bdcac9e04d71a842dd77c58079ce5dae42441d08063
                                        • Instruction ID: cff325b16755f3dbf4b8b47212c1f3a7d6beedcb9b5ff14275d6f544de98966d
                                        • Opcode Fuzzy Hash: 7b7e3b5bfc8c0bbd38473bdcac9e04d71a842dd77c58079ce5dae42441d08063
                                        • Instruction Fuzzy Hash: 6D419665A0978284EB14AB319C241FAA7A9BF0D7C8F884835DE6D177D5EE3CE104C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memcpy$freemalloc
                                        • String ID: PLAIN
                                        • API String ID: 3313557100-4000620671
                                        • Opcode ID: b2f10b0df633edde4c663c154711e900b01d618fb6a07a779d575b7840397b43
                                        • Instruction ID: 109735813f4c9cfb62c8d394662f25230b58ce82e9d89742a4b7508594f6f416
                                        • Opcode Fuzzy Hash: b2f10b0df633edde4c663c154711e900b01d618fb6a07a779d575b7840397b43
                                        • Instruction Fuzzy Hash: 7A31C766A08B8682EB10DF25E96026BA794FF49BD8F844631DEBD077D5EE3CD045C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 1294909896-2901970132
                                        • Opcode ID: 64455ddd5a978b85e33b616fc1962a5c0a1841916232d696f0edef40e74da327
                                        • Instruction ID: 15b4b3497d88404bc5f81b8d7d72a260cb1ad8ab9dad7c27c0d71e723ba8577d
                                        • Opcode Fuzzy Hash: 64455ddd5a978b85e33b616fc1962a5c0a1841916232d696f0edef40e74da327
                                        • Instruction Fuzzy Hash: 38312461A0978245EB15AB759C241FAA7A9BF0D788FC44835DE6D172D6FF3CE10483B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: callocfreememcpystrchr
                                        • String ID: CAPA$Got unexpected pop3-server response
                                        • API String ID: 2887963327-1591402739
                                        • Opcode ID: 7b13aeeb5f174c84a05b40aad520cf0a66e54b04a4a91b3024b38faf5081b1cc
                                        • Instruction ID: 78a25cc358be5e210268a27499b18f6269a7553623605ddef22cd6fe49e67495
                                        • Opcode Fuzzy Hash: 7b13aeeb5f174c84a05b40aad520cf0a66e54b04a4a91b3024b38faf5081b1cc
                                        • Instruction Fuzzy Hash: D431E762B0938282EB09A7309D6067BA698BB09B54F940535CA3D437E1CF3CFC5583B1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3061335427-2901970132
                                        • Opcode ID: 35b22113d5f68d879cf3847396f763c90cde38f4a5f83b542e2eefac487958b7
                                        • Instruction ID: 3557599207647aace8dc0964d64d9d0bf80bb2650796ba909da4e8d749a35b4b
                                        • Opcode Fuzzy Hash: 35b22113d5f68d879cf3847396f763c90cde38f4a5f83b542e2eefac487958b7
                                        • Instruction Fuzzy Hash: 05312365A0978245EB15AB719C241FAA7A9BF0D788FC44835CE6D172D6FF3CE10483B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3061335427-2901970132
                                        • Opcode ID: 0ce4234f479c702b72b5579015f8e0b31a955954a5808c6e2cbe134b7e04fb63
                                        • Instruction ID: b06292e7c65674efd18f948aa42c196c880c37c06d73767f33097b052b7e01d9
                                        • Opcode Fuzzy Hash: 0ce4234f479c702b72b5579015f8e0b31a955954a5808c6e2cbe134b7e04fb63
                                        • Instruction Fuzzy Hash: 04313461A0978245EB15AB719C241FAA7A9BF0D788FC44835DE6D172D6FF3CE10483B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$%s%lx$Signature
                                        • API String ID: 2190258309-1406629954
                                        • Opcode ID: 9264e6448cedd647a91235911ff1229aaed000e140e40ead4778aa69a6d9dffe
                                        • Instruction ID: b9c17c55181b67ffb4a77077f918aa531d9f9c33719e971b9955582aa636b710
                                        • Opcode Fuzzy Hash: 9264e6448cedd647a91235911ff1229aaed000e140e40ead4778aa69a6d9dffe
                                        • Instruction Fuzzy Hash: F5319862B0868285EB10AB2598642BBE399FB4D784FD40831DE6D477D5EE2DD045C7B0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupcallocfree
                                        • String ID:
                                        • API String ID: 1236595397-0
                                        • Opcode ID: e8613d0294d1cc7f92a55901f0896a61e06b1b620139e0056f4eaf019247f7ed
                                        • Instruction ID: fd58182c00bca84387ad622b935430bf74436c49ec1cad474734ad8d3bd35a65
                                        • Opcode Fuzzy Hash: e8613d0294d1cc7f92a55901f0896a61e06b1b620139e0056f4eaf019247f7ed
                                        • Instruction Fuzzy Hash: 0231B622A1878681EB519B24D8203BAF3B4FB4AB88FA80030DE6C077D5DF3DD4558770
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-517259162
                                        • Opcode ID: ea154de60150d50552c2718d6fc22c5b5b235f255668f2ffea73f60108924b44
                                        • Instruction ID: cb947446aec2eef3c23b1b989ea26e100ffa72d7b51a253ef0c5649f6fc7c1d9
                                        • Opcode Fuzzy Hash: ea154de60150d50552c2718d6fc22c5b5b235f255668f2ffea73f60108924b44
                                        • Instruction Fuzzy Hash: 91314555A0968284EB14A7759C241FBA7A9AF0D7C8FC84835DE6D1B3D6FE3CE44083B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3061335427-517259162
                                        • Opcode ID: bd3d540a2484f9cd3a53e73c16194a4881832abcfbe8509155d6b2d58ebfcfa6
                                        • Instruction ID: c7d881550b8724ffe289cec2fdd7266057b995cb3610539b5f619585bb1b75b2
                                        • Opcode Fuzzy Hash: bd3d540a2484f9cd3a53e73c16194a4881832abcfbe8509155d6b2d58ebfcfa6
                                        • Instruction Fuzzy Hash: 78313355A0978284EB14AB759C241FBA7A9AF0D7C8F884835DE6D173D6FE3CE54083B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3061335427-517259162
                                        • Opcode ID: db235a4450c5f349b9ab72eb30da38325840abdeb67f20acb983d19fc2a4c14d
                                        • Instruction ID: 1c2bad33bad079639a975282a4d6abc5063b2aabb81b3f398e287a455664917b
                                        • Opcode Fuzzy Hash: db235a4450c5f349b9ab72eb30da38325840abdeb67f20acb983d19fc2a4c14d
                                        • Instruction Fuzzy Hash: 9F313355A0978284EB14AB759C241FBA7A9AF0D7C8F884835DE6D173D6FE3CE54083B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: OS/400$SITE NAMEFMT 1
                                        • API String ID: 3061335427-2049154998
                                        • Opcode ID: ad2d57b8bdb64e64066a1e9082085b36c03f6f800f1ceea49132c5796a990990
                                        • Instruction ID: d92adc79f168411a34093fb3581d14cf30726d442f0b6bfe60dc9a70ad916b64
                                        • Opcode Fuzzy Hash: ad2d57b8bdb64e64066a1e9082085b36c03f6f800f1ceea49132c5796a990990
                                        • Instruction Fuzzy Hash: 5131C721A0C68381E771AB359D603BBA358BB5EB84F904071CAAD536D5DE3CD946D370
                                        APIs
                                          • Part of subcall function 00007FF7F6744350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F6744381
                                          • Part of subcall function 00007FF7F6743C70: memcpy.VCRUNTIME140 ref: 00007FF7F6743CC3
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742722
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F6742770
                                        • __std_exception_copy.VCRUNTIME140 ref: 00007FF7F67427C0
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674280D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                        • String ID: out_of_range
                                        • API String ID: 2484256320-3053435996
                                        • Opcode ID: 416aaa0d375e5eec63550c4ab23ce1862656c62d6f6218db7ac47a387bde8a41
                                        • Instruction ID: ae40b3b87fb6dafb84da302b479e9324286b87b32abb675b257c429bafb8bbfe
                                        • Opcode Fuzzy Hash: 416aaa0d375e5eec63550c4ab23ce1862656c62d6f6218db7ac47a387bde8a41
                                        • Instruction Fuzzy Hash: 73516032B18B41D9EB00EF74D9543AD6369EB59798F804235DA7C03AD9DF38E1A5C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _errno_strdupstrcspnstrncmpstrspn
                                        • String ID: 0123456789abcdefABCDEF:.
                                        • API String ID: 2191890455-446397347
                                        • Opcode ID: 76ee79804532aefb5b9b615f8364d287c592931fb6a858183854be42adcf5243
                                        • Instruction ID: 23a1163b93bcc345c1e3136efd428775deb79f604a26e9b91d9137c641d736d0
                                        • Opcode Fuzzy Hash: 76ee79804532aefb5b9b615f8364d287c592931fb6a858183854be42adcf5243
                                        • Instruction Fuzzy Hash: 9841D322A1CACA45EB21AB249C2037BA799EB1EB44FC80135DA6D076C5DF2CE455C7B1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: isupper$free
                                        • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                        • API String ID: 573759493-632690687
                                        • Opcode ID: 5748dd9c5ea64109dffa579bb85d4611a3a368ad641f5f36c4c6bd507780b0bd
                                        • Instruction ID: b18489c1f9938ab3da9153c9cabfbb66cb225888794fbfc4adb16eaa689adc64
                                        • Opcode Fuzzy Hash: 5748dd9c5ea64109dffa579bb85d4611a3a368ad641f5f36c4c6bd507780b0bd
                                        • Instruction Fuzzy Hash: 97410622A0D6C285FB11DB35886427AFBD9AB4D780FD84131C6AE02AD6EF3DD541C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: tolower$_time64
                                        • String ID: :%u$Hostname in DNS cache was stale, zapped
                                        • API String ID: 4068448496-2924501231
                                        • Opcode ID: a1bcfb6b737e128f22dc2304d54d207902b239ab6957f751d3e806f713f45f87
                                        • Instruction ID: 7913de9619fefbf23c010fcea24feb3a439b020b60561ff072c8e51161f5b7c0
                                        • Opcode Fuzzy Hash: a1bcfb6b737e128f22dc2304d54d207902b239ab6957f751d3e806f713f45f87
                                        • Instruction Fuzzy Hash: 5641F5226186C6C1EB11EB11E8603BAA769EB4DB88F844231DE6D077D5DF3DE005C770
                                        APIs
                                        • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F6744381
                                        • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F6744446
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F674449A
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7F67444A1
                                          • Part of subcall function 00007FF7F679FB48: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7F674442E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F679FB62
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                        • String ID: https://keyauth.win/api/1.2/
                                        • API String ID: 1155477157-3933380396
                                        • Opcode ID: 80e07f2ec084bafb4c9b2edb4020a5aa9b86da915471fa139b76f77608c9046b
                                        • Instruction ID: 931603555d9987cd2b98f4bfff2462d61906abcf0c0395fb0dd0c314139387cb
                                        • Opcode Fuzzy Hash: 80e07f2ec084bafb4c9b2edb4020a5aa9b86da915471fa139b76f77608c9046b
                                        • Instruction Fuzzy Hash: 6131EA2270968584EF15FE2699282799259DB09FF4F940630CE3D17BDDDE7CE48293B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_close_openmalloc
                                        • String ID: Couldn't open file %s
                                        • API String ID: 3412525164-447283422
                                        • Opcode ID: 7856573c67e4ecf729b0dc835e39a869844de092acf3b00592fb5aa2bffd79d6
                                        • Instruction ID: 683f2da5e57e92612c49e30062eb3f768828ebc49668d189754a834b9696c2d0
                                        • Opcode Fuzzy Hash: 7856573c67e4ecf729b0dc835e39a869844de092acf3b00592fb5aa2bffd79d6
                                        • Instruction Fuzzy Hash: 6741D222608AC581EB109F35E85022FEBA5FB89BD4FA84031DAAE476D4CF7CD8418771
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_errnofreememcpyrecv
                                        • String ID: Recv failure: %s
                                        • API String ID: 267823591-4276829032
                                        • Opcode ID: 9f37ef25d2cbde7e44d61f655dfd075aa7a26731cbe2d316d942a178f3c2f71e
                                        • Instruction ID: 485776fe38da9cec976b68772fef999c22ade362ed586f0930c78c01f586f132
                                        • Opcode Fuzzy Hash: 9f37ef25d2cbde7e44d61f655dfd075aa7a26731cbe2d316d942a178f3c2f71e
                                        • Instruction Fuzzy Hash: E231AE76A05B4181EB10AF25ED602ABA3A8BB48FD8F904135DE2D077D8DE3CD455D7A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                        • API String ID: 1865132094-195851662
                                        • Opcode ID: b2f75524ccea4e637de733992f4f779450420ae890607c224c1569b4bb52aa83
                                        • Instruction ID: b78dfa045cd30fbf2ddd4ad2c5a57bb982031725011c27e547fbd8ea76d217f7
                                        • Opcode Fuzzy Hash: b2f75524ccea4e637de733992f4f779450420ae890607c224c1569b4bb52aa83
                                        • Instruction Fuzzy Hash: CA41E631B1CA82C1E754DB25E8603AAB794EB48B88F884131DB6D073D5CF7ED490CBA0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: isupper$_strdupfree
                                        • String ID: FALSE
                                        • API String ID: 3359907120-3701058176
                                        • Opcode ID: de3b3f800822c5a1ee2a18dac8cb532862dd517388c01c2709d3af70ce711eaf
                                        • Instruction ID: b313d7a68c49e54f18190e4ade1e2755cdf0d113c30b8443cd0c46d4c4449f19
                                        • Opcode Fuzzy Hash: de3b3f800822c5a1ee2a18dac8cb532862dd517388c01c2709d3af70ce711eaf
                                        • Instruction Fuzzy Hash: 32313822E0E69245FB13EB359D2437ABBD85B5A764F980631C9BA016D1EE3DD082C370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfreestrpbrk
                                        • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                                        • API String ID: 1812939018-579818044
                                        • Opcode ID: e8bf0f1166062040c79a1d659e28989542820538a677ba05d44a4a9e570ddb35
                                        • Instruction ID: 58963fc784a27419663c6a27aad3a89cfabfe9180c413f47fea449b5b264d7cd
                                        • Opcode Fuzzy Hash: e8bf0f1166062040c79a1d659e28989542820538a677ba05d44a4a9e570ddb35
                                        • Instruction Fuzzy Hash: 6B31CA62A1CB8681EB01DB25E8502BAE3A4FB99F90F984335DA6D037D5DF7CD501C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: %s: %s$FALSE$TRUE
                                        • API String ID: 1865132094-3430445539
                                        • Opcode ID: 3825d031a93768815eb6b5328640b0091a31a05f0c4b0cbf60904bbfdb54b7ed
                                        • Instruction ID: f83bccc08f13f5ce36b0d90856be1b3ab7a804c2c3e582911948578b29368e0d
                                        • Opcode Fuzzy Hash: 3825d031a93768815eb6b5328640b0091a31a05f0c4b0cbf60904bbfdb54b7ed
                                        • Instruction Fuzzy Hash: 46018251A08782C1FB60AB16AC203A7A3A4AB09B80FC84031CE6D033D6EF2CE145C3B1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                        • API String ID: 1294909896-1891748601
                                        • Opcode ID: be9a38051f2161b3db7cc7e844ed7f2beca6a4246db6e062d6f1a9b834a90101
                                        • Instruction ID: e5b5e9dc40e6b96a79a573c7f3a3e982b02c7f74b4b35c5398dfd861b22281d6
                                        • Opcode Fuzzy Hash: be9a38051f2161b3db7cc7e844ed7f2beca6a4246db6e062d6f1a9b834a90101
                                        • Instruction Fuzzy Hash: BE51C561A0C78285E764F63099703BBA258BB49B64FD00235DA7D076D6DF7DE88183F1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 3401966785-3412697401
                                        • Opcode ID: c025a0c3dc1ec3e80a8e52a6cec06fdbfe740c0ae21a7d2b85079ddef5b95d9f
                                        • Instruction ID: abbf9b008c177072ac2ad05b650d2b7d6d326e82926bc3294bd4075db254f28c
                                        • Opcode Fuzzy Hash: c025a0c3dc1ec3e80a8e52a6cec06fdbfe740c0ae21a7d2b85079ddef5b95d9f
                                        • Instruction Fuzzy Hash: 44418C61B1A69241FB0596398D35376B7E6EB197E0F844635CA7E433C9ED6CD081C3B0
                                        APIs
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7F679DEE0), ref: 00007FF7F679DF8F
                                          • Part of subcall function 00007FF7F6778240: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF7F675B26A,?,?,?,?,?,?,?,00007FF7F675B037), ref: 00007FF7F6778251
                                          • Part of subcall function 00007FF7F6778240: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7F67783F3
                                          • Part of subcall function 00007FF7F6778240: strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7F6778410
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7F679DEE0), ref: 00007FF7F679DFFE
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7F679DEE0), ref: 00007FF7F679E018
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,00000000,00000000,00000000,00007FF7F679DEE0), ref: 00007FF7F679E04E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strchr$_errno
                                        • String ID: xn--
                                        • API String ID: 2644425738-2826155999
                                        • Opcode ID: 3a6b1145198a3fd0865864d78e7b62c04439682efdea46383549bedd37ad973c
                                        • Instruction ID: c6130accb277aa88e94fc71b6c82d3d4895dbce52632be4940757616fe0b79fe
                                        • Opcode Fuzzy Hash: 3a6b1145198a3fd0865864d78e7b62c04439682efdea46383549bedd37ad973c
                                        • Instruction Fuzzy Hash: 6341B051B1C68245FB54B6358D243BBD2CAAF49BC0F988134DE6E877C2EE2DE44183B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: callocfreememset
                                        • String ID: CONNECT phase completed!$allocate connect buffer!
                                        • API String ID: 3505321882-591125384
                                        • Opcode ID: 5583faf6e005cd107dec4d3bac618da173c31701fa176c289d6e4ea17e0dfae9
                                        • Instruction ID: c7510df08bd70968351481d758ce30392ce89b4149124bef236289dfb7e594fe
                                        • Opcode Fuzzy Hash: 5583faf6e005cd107dec4d3bac618da173c31701fa176c289d6e4ea17e0dfae9
                                        • Instruction Fuzzy Hash: D5518761B08682C2E719AB15DD643BAB3A8FB49784F844035CB6C072D5DF7AE565C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _errnofreememcpy
                                        • String ID: Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                                        • API String ID: 738009125-4268564757
                                        • Opcode ID: ea9be0aaf75f8c8767959a99ab3c0081047d4b67f84ae8826110748a631f1350
                                        • Instruction ID: d30df3d79731f99f9e5c7d92a912bcbc32b0fe38b8bee86eb98df324ab5786ad
                                        • Opcode Fuzzy Hash: ea9be0aaf75f8c8767959a99ab3c0081047d4b67f84ae8826110748a631f1350
                                        • Instruction Fuzzy Hash: 5B51A262A1C7C682EB54AB25D8202BBE368FB49784FD44032DA6D03AD5DF7CE45187B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 2190258309-1663925961
                                        • Opcode ID: 7e941dfaf5f8a2d93b432d2b7afcc53c8c33386750d809cd1a2bcc3477fb2b98
                                        • Instruction ID: 206410ae72db56319dc8d188cce09e92029811428a3ba16dfa94392700aad2ad
                                        • Opcode Fuzzy Hash: 7e941dfaf5f8a2d93b432d2b7afcc53c8c33386750d809cd1a2bcc3477fb2b98
                                        • Instruction Fuzzy Hash: 4C21A262B08AC285EB109B25E8542FBA3A4FB49BD4F884532DE6D577D5EF3CD101C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Failure sending QUIT command: %s$QUIT
                                        • API String ID: 1294909896-1162443993
                                        • Opcode ID: 807ef8fa226970ae5b9040265797cb9f53c43fdafe48f57b89e976fbdb420d33
                                        • Instruction ID: f69d1f45aa192dff7093c512c2c2e6231069dd674de79a823157ab09ac7ca274
                                        • Opcode Fuzzy Hash: 807ef8fa226970ae5b9040265797cb9f53c43fdafe48f57b89e976fbdb420d33
                                        • Instruction Fuzzy Hash: EB317231A1878281EB50EF3599603BAB3A8FB4AF84F944131DA6D07695DF2CD451C3F0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$calloc$memcpy
                                        • String ID:
                                        • API String ID: 3478730034-0
                                        • Opcode ID: 551880f0cf651d9d3cd7b3d72f1750254fa78b1a94682acab546ab4d6fd1212c
                                        • Instruction ID: fff50949f98d96933bd38e556cd4b7a77f53130c3bea68a7f04d9158c3b71513
                                        • Opcode Fuzzy Hash: 551880f0cf651d9d3cd7b3d72f1750254fa78b1a94682acab546ab4d6fd1212c
                                        • Instruction Fuzzy Hash: 9021E76191978386E7109F15A82023AB7A4FB4DB94F844234DABD177D5DF3CD4408360
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupmalloc
                                        • String ID:
                                        • API String ID: 4236146995-0
                                        • Opcode ID: ac77d55da153c51ce4b0da4844e3ee0dc72817ed75bc1a3428b20dbaeaf331c7
                                        • Instruction ID: bcda80ecd7c8ef0ad8fe2621e2460cfdfb5ae6a7316cc7a74b120132665be0a4
                                        • Opcode Fuzzy Hash: ac77d55da153c51ce4b0da4844e3ee0dc72817ed75bc1a3428b20dbaeaf331c7
                                        • Instruction Fuzzy Hash: 4B219262B15B8681EB81DB25D8603A9A3E4FB89F84F480134DE2D4B789EF39D491C770
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: Start Date: %s$Start Date
                                        • API String ID: 3056473165-2389359183
                                        • Opcode ID: 3cac47918bbe22a3064b11e21b76c3d374301543d4bb7f4bdd617f3bd592a610
                                        • Instruction ID: 8e2868d5a310eae24897a1e0475bf5aa5a19abfaa33410b7e369c5a0e11a4613
                                        • Opcode Fuzzy Hash: 3cac47918bbe22a3064b11e21b76c3d374301543d4bb7f4bdd617f3bd592a610
                                        • Instruction Fuzzy Hash: C421E051A0868280EF14AB218D242F6E3DAAF1DBD4FC88931C93D077E5EE2DA44483B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 2190258309-1663925961
                                        • Opcode ID: 0524c1bf4175a93633869f3fc57a9e9334e9eb6c4924e45b541d7c896293409d
                                        • Instruction ID: b0b38924736b13eacb6afb08cde3f7fb7c57971c766f3671d7a78ee5a1e2f9b5
                                        • Opcode Fuzzy Hash: 0524c1bf4175a93633869f3fc57a9e9334e9eb6c4924e45b541d7c896293409d
                                        • Instruction Fuzzy Hash: D2216762A0968285EB54AB25E8642BBE3A8FF4D7C4F840831DE6D17795EE3CD041C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: malloc$free
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1480856625-1663925961
                                        • Opcode ID: 0e76b6a316340a42a1bc527b4a0993da5b2c0cb114230e1b1a20d8241241b9a3
                                        • Instruction ID: 8ed978801b3cfaf086711aa5dc1f95dfb4ad06ad3054346754bdececf235207d
                                        • Opcode Fuzzy Hash: 0e76b6a316340a42a1bc527b4a0993da5b2c0cb114230e1b1a20d8241241b9a3
                                        • Instruction Fuzzy Hash: 76214462A0868285EB50AB25E8642EBA3A8FF497C4F840432DE5D17795EE3CD001C770
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: malloc$free
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1480856625-1663925961
                                        • Opcode ID: 7e4034373774d43b519a8af8c2c682e0bc05bde0d65ec1908a57987c2b653275
                                        • Instruction ID: b21912066a245731e9ff51c0d3e7ac967e1bc60bd77aba276b96a9b766409174
                                        • Opcode Fuzzy Hash: 7e4034373774d43b519a8af8c2c682e0bc05bde0d65ec1908a57987c2b653275
                                        • Instruction Fuzzy Hash: 63215662A0868285EB50AB25E8642FBE3A8FF497C4F840432DE5D17795EF3CD001C770
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                        • String ID:
                                        • API String ID: 469868127-0
                                        • Opcode ID: 059db627849e2e226bb10930d3277cc3b65913901b4ea62fb5c050b9fbc6cc93
                                        • Instruction ID: 87e3e16e93a3e7281b4fbc0e7faa4efbc0837efaffa8e2c4992c25b75d91faf9
                                        • Opcode Fuzzy Hash: 059db627849e2e226bb10930d3277cc3b65913901b4ea62fb5c050b9fbc6cc93
                                        • Instruction Fuzzy Hash: 0711F136608B41C6E710AF12E56023AB374FB4DB90F544131DFAD03B95DF39E8659760
                                        APIs
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F6752EB9), ref: 00007FF7F675381F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strncpy
                                        • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                                        • API String ID: 3301158039-3625861382
                                        • Opcode ID: 1ff2dce18e257e774129ac5e1c4637ee97025658beddbabc7998c3cc9fc065be
                                        • Instruction ID: e9fa82b19170653ddc7a6a76d503ca376a2288d6dab12029ebb062e81cbe31d3
                                        • Opcode Fuzzy Hash: 1ff2dce18e257e774129ac5e1c4637ee97025658beddbabc7998c3cc9fc065be
                                        • Instruction Fuzzy Hash: C6113D51E1C18290EB1D6B14ED7417A9698EF0C750FC84070C62E467F9ED6CFC8083B1
                                        APIs
                                        Strings
                                        • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 00007FF7F677616B
                                        • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 00007FF7F67763B5
                                        • ** Resuming transfer from byte position %I64d, xrefs: 00007FF7F6776158
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: fflush
                                        • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                                        • API String ID: 497872470-664487449
                                        • Opcode ID: c95acca9036dcc247727338940155616288281e00d77431897b59486f692ae5b
                                        • Instruction ID: c57340b4af0430a2a04e70f480e36addaa659cfd15dcd048dfd737295ac7b396
                                        • Opcode Fuzzy Hash: c95acca9036dcc247727338940155616288281e00d77431897b59486f692ae5b
                                        • Instruction Fuzzy Hash: 4591B22161AB8685DA60EB15E9587ABA368FB88BC4F811031DE6D47B99EF3CD001D750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLastfreememcpy
                                        • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout$We got a 421 - timeout!
                                        • API String ID: 1248052217-2064316097
                                        • Opcode ID: fa6a4d64733e03c5ed3c8d8a01dfbba4641c5a4f74dbedc3fe6745e7767d25cd
                                        • Instruction ID: 6875674cd279a62bbdb05315857120dad01437011f790d9636d1aa65d8d958aa
                                        • Opcode Fuzzy Hash: fa6a4d64733e03c5ed3c8d8a01dfbba4641c5a4f74dbedc3fe6745e7767d25cd
                                        • Instruction Fuzzy Hash: 4F41A921A0864285F760EE799C103BBA398BB4DF94F984131DE6D873D5EE3CD84587B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: FALSE$TRUE
                                        • API String ID: 1865132094-1412513891
                                        • Opcode ID: f1a68c5537dbf8c23db2369df14daea5e9d1e5d646dd923bf12f28056a1744cf
                                        • Instruction ID: daf3dcc086124ed1595b41dc9999deaab141082d22c1d622d8f186996496d6a1
                                        • Opcode Fuzzy Hash: f1a68c5537dbf8c23db2369df14daea5e9d1e5d646dd923bf12f28056a1744cf
                                        • Instruction Fuzzy Hash: AA411A55B0A35684FF159A359C2027AA7E9AB0A795F884632CE6E073C5FE2DE0418370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _time64$ErrorLast
                                        • String ID: TFTP response timeout
                                        • API String ID: 3339832089-3820788777
                                        • Opcode ID: bad9c33546a407fec38eb90579f1c035f618f46276d5925fabfde9c3533044e3
                                        • Instruction ID: c6d43a7e25236498245d4a176703d290f054bf44cf3c9cc880ec7e5e2a253218
                                        • Opcode Fuzzy Hash: bad9c33546a407fec38eb90579f1c035f618f46276d5925fabfde9c3533044e3
                                        • Instruction Fuzzy Hash: 0E41932261864185E760AF35EC246BAA764FB8CBA4F944231DE3D477D9DF3CD84187B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: isupper$free
                                        • String ID: %s%lx
                                        • API String ID: 573759493-530121141
                                        • Opcode ID: 388810033930dfc79d928e8b47dceac9b35a50cafe639a047c11366d6d893bc1
                                        • Instruction ID: b7e057ac99b6ca629926ed41a4569f4c71f3f2bd905ff63332c73adcb31087ed
                                        • Opcode Fuzzy Hash: 388810033930dfc79d928e8b47dceac9b35a50cafe639a047c11366d6d893bc1
                                        • Instruction Fuzzy Hash: A5312611E0E1D249FB12EB358C7437ABBD99B5E741F984531C5AE02AD2EE2ED041C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: isupper$free
                                        • String ID: TRUE
                                        • API String ID: 573759493-3412697401
                                        • Opcode ID: a6fba0571c3b23f939b7e82bf09c7321e34b42d1c1305e4c2d75dcd762ed15e1
                                        • Instruction ID: 6b96004682ea7faaf31efe336400a298997b7482b07adf2417fa5b8613e6226d
                                        • Opcode Fuzzy Hash: a6fba0571c3b23f939b7e82bf09c7321e34b42d1c1305e4c2d75dcd762ed15e1
                                        • Instruction Fuzzy Hash: CE312B21A0D59245F701DB35992437ABFD5A70AB94F884231C6BE42AD5DF3DD141C370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: fwrite
                                        • String ID: ...$...
                                        • API String ID: 3559309478-2253869979
                                        • Opcode ID: 8108603736209bb098f9a9e31943748ac7ad89f18f806ab5dd93ef5962823fb4
                                        • Instruction ID: aff8d3901558a6fc5c6a6e13e253adc7ef0da96f5cb5a98f22a16c4a97d69ae7
                                        • Opcode Fuzzy Hash: 8108603736209bb098f9a9e31943748ac7ad89f18f806ab5dd93ef5962823fb4
                                        • Instruction Fuzzy Hash: 2B31C321A08A8181EB60EB11D8247FBA7A5FB88B94FC44131CA6D037D5CF3ED555C7E1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: acceptgetsocknameioctlsocket
                                        • String ID: Connection accepted from server$Error accept()ing server connect
                                        • API String ID: 36920154-2331703088
                                        • Opcode ID: e6968442e24d414e7df2a505c6a3c38eb1f75961d075d8d18ba77aea0e8e6f0d
                                        • Instruction ID: c4dcf596a2e377c6e7ed2409fd1138049a0bd0dfec7f8e507f24c640fed431a4
                                        • Opcode Fuzzy Hash: e6968442e24d414e7df2a505c6a3c38eb1f75961d075d8d18ba77aea0e8e6f0d
                                        • Instruction Fuzzy Hash: B731C22160C68181EB54EB21A9243ABB3A8FB4CBA4FD40231DA7D077D5DF7DE505CBA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %s%s$LIST "%s" *
                                        • API String ID: 0-1744359683
                                        • Opcode ID: 24136d207ae102c5ea7ef9a2db057a650322fa4e370001de2a68ccbc906af9fe
                                        • Instruction ID: 64bc0094032dc3159e757bec90789044583da95d17434214281dfac0f154b03c
                                        • Opcode Fuzzy Hash: 24136d207ae102c5ea7ef9a2db057a650322fa4e370001de2a68ccbc906af9fe
                                        • Instruction Fuzzy Hash: 55116021E1874281EB15AF59E8601BAA364BB4CBC4F845531DE2D077A5DF2CE58583B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: :
                                        • API String ID: 2653869212-336475711
                                        • Opcode ID: 701d1b398b1993d91f495c10ed7512d9c4404652cc60f658269a2a9ff914048b
                                        • Instruction ID: 7851180d65aa8ef96e4ee65a613dd7f745f1e89883bb2ce4216327896c8fc72f
                                        • Opcode Fuzzy Hash: 701d1b398b1993d91f495c10ed7512d9c4404652cc60f658269a2a9ff914048b
                                        • Instruction Fuzzy Hash: 7C115432A09B8685EB619F15E9103A6B3A4AB89750F944131CFBD437DCEF3CD8558770
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: ErrorLastsend
                                        • String ID: SENT$Sending data failed (%d)
                                        • API String ID: 1802528911-3459338696
                                        • Opcode ID: 98a7d7a251e3052cc762b497f2e48137b1bd5726523e44b18bfb68837d2e112f
                                        • Instruction ID: becdf3cc09dc3c2eae66e327bc33ed90cfa97b22b3fa638508e10deceb796f52
                                        • Opcode Fuzzy Hash: 98a7d7a251e3052cc762b497f2e48137b1bd5726523e44b18bfb68837d2e112f
                                        • Instruction Fuzzy Hash: E201D222708A92C1DB109B2AE85045ABB24FB88FC4B994171DB6D43B65DE39D541C7E0
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67722F5), ref: 00007FF7F6771F18
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67722F5), ref: 00007FF7F6771F21
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67722F5), ref: 00007FF7F6771F9A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F67722F5), ref: 00007FF7F6771FAB
                                        • memcpy.VCRUNTIME140(?,?,00000000,00007FF7F67722F5), ref: 00007FF7F6771FD4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID:
                                        • API String ID: 3401966785-0
                                        • Opcode ID: 9a784d6129e5b36e527808a1feb78dde24a39c20fac065423d1946ba5f9cea45
                                        • Instruction ID: fcf5fd613ef7f9e5948c693f4e41fe499dee44308ccf2c8a4e4ffcedb572bc00
                                        • Opcode Fuzzy Hash: 9a784d6129e5b36e527808a1feb78dde24a39c20fac065423d1946ba5f9cea45
                                        • Instruction Fuzzy Hash: CD31602161AB4581EB10AF11E82036AA2A8AB19BD4F880631EE7D477D9DF3CD441C7A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: calloc$free
                                        • String ID: chunked
                                        • API String ID: 171065143-1066005980
                                        • Opcode ID: 2e14a48d677b6cb63ff9c65bcbc64d1f64e2529bf2d7316cee8101d75cf86319
                                        • Instruction ID: a65ad526e7d5f0f55b12afb49e4c186f20bc5f29a8436bbcd80979034fdc773d
                                        • Opcode Fuzzy Hash: 2e14a48d677b6cb63ff9c65bcbc64d1f64e2529bf2d7316cee8101d75cf86319
                                        • Instruction Fuzzy Hash: 2351C621A0869295EB55AB119D6037BA3D9AB0FFC4F884030DE7C437D5EF2DE46583B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                        • API String ID: 1294909896-910067264
                                        • Opcode ID: 175b8fed516aa4291b1f46da496cdeccca5547fd3abd262188f1c2dcfda0c20d
                                        • Instruction ID: ecf6b24c203a789e8f38f32cb59f7cb3cb2c9cef19b808cdd7b09c67bee9c1fe
                                        • Opcode Fuzzy Hash: 175b8fed516aa4291b1f46da496cdeccca5547fd3abd262188f1c2dcfda0c20d
                                        • Instruction Fuzzy Hash: AC51C661B0969644EB119B35AD2417AF7E9AB09784FD48032DA6D077D4EF3CD581C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                                        • API String ID: 1294909896-2632828617
                                        • Opcode ID: 2d567fc7870b19634a2cbb62e17730c428280785e8b13154c206ba112d2b15db
                                        • Instruction ID: 327a56b812ff879a04eadf5d3c8a824bca9cbfc3b4480797f04626be38578d79
                                        • Opcode Fuzzy Hash: 2d567fc7870b19634a2cbb62e17730c428280785e8b13154c206ba112d2b15db
                                        • Instruction Fuzzy Hash: 9441C861A0C6D185FB649B2598246BAE7D8EB09790FC84035CA6D037D6EF3CE446C370
                                        APIs
                                        • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F674D1D8), ref: 00007FF7F674D69E
                                        • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F674D1D8), ref: 00007FF7F674D6CC
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F674D1D8), ref: 00007FF7F674D735
                                          • Part of subcall function 00007FF7F679FB48: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7F674442E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F679FB62
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7F674D742
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                        • String ID:
                                        • API String ID: 2942768764-0
                                        • Opcode ID: e313eb31bb9c36e5e7182acaf55df2307521fd66a11ad611a39392af3f5df12e
                                        • Instruction ID: f34a9ca7b19e8e39b68a326ea88892a2a996e29254a26eb17fcc89db61a2fbd4
                                        • Opcode Fuzzy Hash: e313eb31bb9c36e5e7182acaf55df2307521fd66a11ad611a39392af3f5df12e
                                        • Instruction Fuzzy Hash: D441A26270D685C5EB15AF25D92827AB369BB48BE4F944735CBBD037C4EF2CE0518360
                                        APIs
                                        • memcpy.VCRUNTIME140 ref: 00007FF7F674F16F
                                          • Part of subcall function 00007FF7F679FB48: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF7F674442E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF7F6741B89), ref: 00007FF7F679FB62
                                        • memcpy.VCRUNTIME140 ref: 00007FF7F674F15C
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F674F1DD
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7F674F1EA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                        • String ID:
                                        • API String ID: 1155477157-0
                                        • Opcode ID: 1e9ebfaffefdbeffb0c650a7ee0079e5ade564a83bb1e0c2e599b6bd42ae2091
                                        • Instruction ID: a468c43073da007126d0c7a9adcc0ef6a2f2b3fb1a046d42cd4fc16ad8abb898
                                        • Opcode Fuzzy Hash: 1e9ebfaffefdbeffb0c650a7ee0079e5ade564a83bb1e0c2e599b6bd42ae2091
                                        • Instruction Fuzzy Hash: 6141B562719AC5C1EE04EB25D9682AEA364AB48BE0F944635CA7D077D4DF3CE091C360
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: f57466c40c565452301723b37a3341091d7968150f5e4cfc42a57b952f741096
                                        • Instruction ID: bb0a63eab7ccac3bf94023bd3cc2b9ff436d9eec80f6f4f00d868bbbe4619d3b
                                        • Opcode Fuzzy Hash: f57466c40c565452301723b37a3341091d7968150f5e4cfc42a57b952f741096
                                        • Instruction Fuzzy Hash: B231C621A19B4181EB10AB12A95466BA298BB08BE0F944635DEBD07BD5DE3CF49183A1
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF7F677D31B), ref: 00007FF7F679B1CE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s
                                        • API String ID: 1294909896-3043279178
                                        • Opcode ID: 352856b1eae17858e1b077f2ee5fd32b90ad45b0c77a443594dcac492bc27cdb
                                        • Instruction ID: 28b56445cf80b5fb75e1a9007b468523f7029c5e0cf252d5dec72a6d95379c2d
                                        • Opcode Fuzzy Hash: 352856b1eae17858e1b077f2ee5fd32b90ad45b0c77a443594dcac492bc27cdb
                                        • Instruction Fuzzy Hash: 60416332618B8582D750DB15B8501ABB7A8FB99B90F540135DFAE03BA5EF3CE491C360
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF7F677EB60,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF7F679B603
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F679B68C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s
                                        • API String ID: 1294909896-3043279178
                                        • Opcode ID: ab711b374cce4f61b9c1c04fbc7c9437e1ddaaeae5eb021ca5eae824c80ea905
                                        • Instruction ID: 62ace78b5c91ca0ff5aa8cdd43c2b3adf299764182bbedd4332f783feb245925
                                        • Opcode Fuzzy Hash: ab711b374cce4f61b9c1c04fbc7c9437e1ddaaeae5eb021ca5eae824c80ea905
                                        • Instruction Fuzzy Hash: CB417422618B8582E710EB25B85016BB3E4FB89B90F544135DFAD07BA5EF3CE091C760
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: e520eb792d9bd2cddaf205114843ce8f76967c4b6129fc21578506071090eed2
                                        • Instruction ID: b1c3c62289d4f81f7ce98dd29533263f692b4cd9420c4fef1acf414a3e97266d
                                        • Opcode Fuzzy Hash: e520eb792d9bd2cddaf205114843ce8f76967c4b6129fc21578506071090eed2
                                        • Instruction Fuzzy Hash: 9831F72170D79195EF14EB26995826AE359EB08BE0F940730DE7D07BDDCE7CE0519360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                        • API String ID: 1294909896-918878739
                                        • Opcode ID: 6c645be8e5b1f5d6d945d0e325e0d0960cc81af97aaf99509a56fb7c7365217d
                                        • Instruction ID: 951140c30c088372b4ef67679005e4c9a197ec07d681234b6a8dc66d9d0e0454
                                        • Opcode Fuzzy Hash: 6c645be8e5b1f5d6d945d0e325e0d0960cc81af97aaf99509a56fb7c7365217d
                                        • Instruction Fuzzy Hash: 1E31EA22A09B8684EB10DB75D9141AAB7E9F749790FC44031CA6D037D5EF3CD151C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                        • API String ID: 1294909896-1153420294
                                        • Opcode ID: f3e28e3f91499ebf32120d26d22ad79634019ec5771c8a1804892b3f14b7e7f3
                                        • Instruction ID: b33aab683f2e2138f2281d5240db66c1eb2d476c73bfe058ca05f08e715cf40b
                                        • Opcode Fuzzy Hash: f3e28e3f91499ebf32120d26d22ad79634019ec5771c8a1804892b3f14b7e7f3
                                        • Instruction Fuzzy Hash: 31318461A08BC294F7609F65D8606EAA3A8FB4D781FD84032CA6D072D6EF7DD545C3B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 3056473165-3412697401
                                        • Opcode ID: acf237168278095a5ad18c07f63b861f156cdde06034463f095727a3b20c5360
                                        • Instruction ID: 80f60c93c3004f676aef6f3d938857342ab4a16f1d0c3fff62aabafdfafbeba1
                                        • Opcode Fuzzy Hash: acf237168278095a5ad18c07f63b861f156cdde06034463f095727a3b20c5360
                                        • Instruction Fuzzy Hash: 42210565B0A74640FF019B269D20376A3AAAB19BE4F944532CD3D037C8EE3CE08183B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: strstr$calloc
                                        • String ID: ;type=
                                        • API String ID: 3224321581-3507045495
                                        • Opcode ID: 83f9003945630041e6858e660da5d42b8c1988889c996b83a9ca53f0be40fe01
                                        • Instruction ID: 99c987e73bc6b83a73dcc818f9379c3b3ec7f0650b5b3f3ebaa774cbe6e099e2
                                        • Opcode Fuzzy Hash: 83f9003945630041e6858e660da5d42b8c1988889c996b83a9ca53f0be40fe01
                                        • Instruction Fuzzy Hash: 8821F73150868281E7149B35E9543AAB7A4FB58B84F884131DBBD077C5DF3CE49183B0
                                        APIs
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F6760DF9,?,?,?,?,00007FF7F676019B), ref: 00007FF7F677C8A8
                                        • GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF7F6760DF9,?,?,?,?,00007FF7F676019B), ref: 00007FF7F677C8CE
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F6760DF9,?,?,?,?,00007FF7F676019B), ref: 00007FF7F677C8EF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7F6760DF9,?,?,?,?,00007FF7F676019B), ref: 00007FF7F677C900
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: realloc$EnvironmentVariablefree
                                        • String ID:
                                        • API String ID: 2828309815-0
                                        • Opcode ID: 5919ed26601e5a1983441ff13bfa5010129d55b5ebbfabf283f15f6243ff0c7b
                                        • Instruction ID: ac9439b761adf7868ccf1c2f36c2219a82ce9c24e71cfaeae1ee6ae88170670b
                                        • Opcode Fuzzy Hash: 5919ed26601e5a1983441ff13bfa5010129d55b5ebbfabf283f15f6243ff0c7b
                                        • Instruction Fuzzy Hash: 41118A21B1D74285E760AB16695023BE1A9FF5DBC4F580035DEAD43BD5DE3CD44087B4
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Proxy-Connection: Keep-Alive
                                        • API String ID: 1294909896-2835282938
                                        • Opcode ID: 940235ba96ecd116c11ce8e31b952d266a1eb65064ca4e9b5e6f911fc8cbd765
                                        • Instruction ID: 3740555f810f11c094bafc3bf56e3a108bee66018cf465926026ec8b16e588ce
                                        • Opcode Fuzzy Hash: 940235ba96ecd116c11ce8e31b952d266a1eb65064ca4e9b5e6f911fc8cbd765
                                        • Instruction Fuzzy Hash: 1701C462B1464182FB15AB55BD603AAA294AF59BE0F444230DEB9077D5DF3C9885C3B0
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF7F677D203), ref: 00007FF7F677D8F2
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF7F677D203), ref: 00007FF7F677D943
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupmalloc
                                        • String ID: (){ %*]
                                        • API String ID: 3515966317-731572209
                                        • Opcode ID: bdd1c43b3494f96c2aad5221c01ac2cadb3a7930ebfd7d110b4e8fbb3137c04d
                                        • Instruction ID: eb1bc6e9b8b7fbe0c1caf4674e11ddbc198239d81b4061430a353ea62b38bad1
                                        • Opcode Fuzzy Hash: bdd1c43b3494f96c2aad5221c01ac2cadb3a7930ebfd7d110b4e8fbb3137c04d
                                        • Instruction Fuzzy Hash: F931481191C68684FB616B255870377ABC5DFAE754FC84330DAAE032C6CE1DA40586B1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: %ld
                                        • API String ID: 1865132094-1112595699
                                        • Opcode ID: 8466dd995ef6cc7ee2963ef660399adda1b82d207d892cd0f1e4e7a24164cfab
                                        • Instruction ID: b45b05cc280de2c047add9c2db787cb99358125c83fa6ee14240edd9d3c7d536
                                        • Opcode Fuzzy Hash: 8466dd995ef6cc7ee2963ef660399adda1b82d207d892cd0f1e4e7a24164cfab
                                        • Instruction Fuzzy Hash: 94319372E09AC281FB65EB64D87437BA299BF48B94F954031C96D036C5EE2CE844C7B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupmalloc
                                        • String ID: identity
                                        • API String ID: 3515966317-1788209604
                                        • Opcode ID: 595691c1025c69a5a6e6f5a3209642cedb3fc84d5119c0a71d3fa7417d96b739
                                        • Instruction ID: ba3b35e7df7fef52e4b669af3162e233e8ff3c58b0f404e976eb244a834958fa
                                        • Opcode Fuzzy Hash: 595691c1025c69a5a6e6f5a3209642cedb3fc84d5119c0a71d3fa7417d96b739
                                        • Instruction Fuzzy Hash: B831A121E19A46C1EB419B15D960367ABA4EF5AFA4F884231CE3D037D5EF2DD45183B0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: mallocrealloc
                                        • String ID:
                                        • API String ID: 948496778-3916222277
                                        • Opcode ID: a2ff660f8911486f5e09a836224ee4278f170a739adc915ed60c233465fbcead
                                        • Instruction ID: bfb591ab8b0a11d7fc8c3c9429be0bde3f04468b58643d8f44919d725f72fedd
                                        • Opcode Fuzzy Hash: a2ff660f8911486f5e09a836224ee4278f170a739adc915ed60c233465fbcead
                                        • Instruction Fuzzy Hash: 6E11B172609B82C1DB449F16E51026AB3A4FB08FD4F844135EE6E07799EF39D490C3A0
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: %I64d-
                                        • API String ID: 1865132094-19666937
                                        • Opcode ID: fd25e5e2079d766e7d45def979497dd31f2c776d6472fa23e50be1d168c7e315
                                        • Instruction ID: cf6e6bdc8d4508f92834f1f2c04566628dbe1fdd669ac791cd0c09a17111c51d
                                        • Opcode Fuzzy Hash: fd25e5e2079d766e7d45def979497dd31f2c776d6472fa23e50be1d168c7e315
                                        • Instruction Fuzzy Hash: C211E572A06682C1FF149B64CC653F663A5FF6CB48F5C0035C92C4E2A6DF2E54969370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: TRUE
                                        • API String ID: 1865132094-3412697401
                                        • Opcode ID: be029bd6a1667cbe2f6cba47e9e4bccf039cfda38148d3da651511633063af34
                                        • Instruction ID: f24454dbe7806006d83a8c3fa0cc250b07a19d7d95816b64110e5a4f98127a72
                                        • Opcode Fuzzy Hash: be029bd6a1667cbe2f6cba47e9e4bccf039cfda38148d3da651511633063af34
                                        • Instruction Fuzzy Hash: 4B019B66A0A65644FB02DB35DD2127A67A9B709BD4F844431CE2D073D9EE7CD081C370
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: _strdupfreemalloc
                                        • String ID: %s: %s
                                        • API String ID: 3985033223-1451338302
                                        • Opcode ID: e8e740b37246a4764d6c3ce1eb164d90d97fc3f94e3ec7d35f47fa24bbdef41c
                                        • Instruction ID: 3c41f237ee1433b5c237330771d22cdc304fc5753425f002686161f072580ac1
                                        • Opcode Fuzzy Hash: e8e740b37246a4764d6c3ce1eb164d90d97fc3f94e3ec7d35f47fa24bbdef41c
                                        • Instruction Fuzzy Hash: 4FF03151A0D682C1FB65AB16AC217E792A4AB4DBC4FC84431CE6D077D6AE2CD1468770
                                        APIs
                                          • Part of subcall function 00007FF7F6756070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6760670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7F67524A1), ref: 00007FF7F6756097
                                          • Part of subcall function 00007FF7F6756070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F6760670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7F67524A1), ref: 00007FF7F67560A3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F675C576
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F675C586
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F675C594
                                        • memset.VCRUNTIME140 ref: 00007FF7F675C5CF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free$memset
                                        • String ID:
                                        • API String ID: 2717317152-0
                                        • Opcode ID: eaa7c906f893e631f80e24afcd7594a9ff7dc79e7c09c795ab08258e7351f13f
                                        • Instruction ID: eada3882cad839b493a8d93e93bc7f198f4594b53071b6e4ca3177f85c1526e9
                                        • Opcode Fuzzy Hash: eaa7c906f893e631f80e24afcd7594a9ff7dc79e7c09c795ab08258e7351f13f
                                        • Instruction Fuzzy Hash: 09212A32E14B9193E304DB22DA503A9A364F7AA744F509226EBAD03A65DF74F1F1C350
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 4dc756646f465d19538aa0d0ebc42b3fd6a2a7856d82e2757587a04e2cbd417f
                                        • Instruction ID: f7c00daa27425be24fc30b7433d625a6a99647ed87e956ed7950bc718c51bd47
                                        • Opcode Fuzzy Hash: 4dc756646f465d19538aa0d0ebc42b3fd6a2a7856d82e2757587a04e2cbd417f
                                        • Instruction Fuzzy Hash: 9D112136A08A45C1EB54AF25D9A033DA3E8FF99F84F544431CA6D027A9DE3CD450C3B1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: c78045512bd42d14feec1b2225692ea8de54b7c52051612741a62dcf1c59137d
                                        • Instruction ID: 957812c387b748c386d7cb26501867a356b4e1d9ce0e7706a661831f116de0a1
                                        • Opcode Fuzzy Hash: c78045512bd42d14feec1b2225692ea8de54b7c52051612741a62dcf1c59137d
                                        • Instruction Fuzzy Hash: 11116A36614B41C6D7409F69E990369B3A8F788F84F584035DFAE47368CF38E8A5C3A0
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F679127E), ref: 00007FF7F67951A6
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F679127E), ref: 00007FF7F67951C7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F679127E), ref: 00007FF7F67951E2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7F679127E), ref: 00007FF7F67951F0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.3331429867.00007FF7F6741000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F6740000, based on PE: true
                                        • Associated: 00000000.00000002.3331397773.00007FF7F6740000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331494522.00007FF7F67A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331546005.00007FF7F67B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.3331580865.00007FF7F67BF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff7f6740000_AimPrivStoreAtt117.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: a9be8488605f3ddb21fcd3ebe878c33e1fc0cdb249d0500abf06e90a83e44b1c
                                        • Instruction ID: ea58315c383665933c7991f124df9d9d9e484e1f896b55bb2ce9864394e7f90d
                                        • Opcode Fuzzy Hash: a9be8488605f3ddb21fcd3ebe878c33e1fc0cdb249d0500abf06e90a83e44b1c
                                        • Instruction Fuzzy Hash: 1E11A836614B45C2EB14AF2AE9A112DB3B8FF99F847500426DE6D437A9DF38D850C3A0