Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AimPrivStoreAtt117.exe

Overview

General Information

Sample name:AimPrivStoreAtt117.exe
Analysis ID:1590900
MD5:199e093792c0a0c91233709796553e3c
SHA1:3046ad48ef9e69c4482b58e89f2d6573e2e75793
SHA256:cbb3e224ed616e62f2a81dedd1d88a7b1c3dfe318372506364662cadb73353c6
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found API chain indicative of debugger detection
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • AimPrivStoreAtt117.exe (PID: 5560 cmdline: "C:\Users\user\Desktop\AimPrivStoreAtt117.exe" MD5: 199E093792C0A0C91233709796553E3C)
    • conhost.exe (PID: 5004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2656 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 6564 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 4500 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 4256 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6540 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 5264 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1248 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 940 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5552 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 1396 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 3452 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 2464 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 904 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2820 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1784 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1600 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 5840 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 7156 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6416 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5536 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 7116 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 3184 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 5804 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 5824 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5656 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1816 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2724 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 3448 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 6532 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 2804 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6008 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6004 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6632 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: AimPrivStoreAtt117.exeReversingLabs: Detection: 63%
Source: AimPrivStoreAtt117.exeVirustotal: Detection: 60%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.0% probability
Source: AimPrivStoreAtt117.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73168A87D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF73168A87D
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316A6410 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF7316A6410
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316AF870 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7316AF870
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316AD780 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7316AD780
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73168CB00 CryptAcquireContextA,CryptCreateHash,0_2_00007FF73168CB00
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF731689C40 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF731689C40
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF731689B70 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF731689B70
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73168CB60 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF73168CB60
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73168CB50 CryptHashData,0_2_00007FF73168CB50
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316A6D30 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF7316A6D30
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF73166FA20
Source: AimPrivStoreAtt117.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF731699440
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: AimPrivStoreAtt117.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Aim\x64\Release\EpicGames.pdb source: AimPrivStoreAtt117.exe
Source: Binary string: 2D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Aim\x64\Release\EpicGames.pdb source: AimPrivStoreAtt117.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 172.67.72.57 172.67.72.57
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316853A0 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF7316853A0
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: AimPrivStoreAtt117.exeString found in binary or memory: http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exe
Source: AimPrivStoreAtt117.exeString found in binary or memory: http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exeC:
Source: AimPrivStoreAtt117.exeString found in binary or memory: http://167.114.85.75/aimhvcionattprivatestore674.exe
Source: AimPrivStoreAtt117.exeString found in binary or memory: http://167.114.85.75/aimhvcionattprivatestore674.exeC:
Source: AimPrivStoreAtt117.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: AimPrivStoreAtt117.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34BD8000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000003.2135687514.0000019C34BD8000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000003.2135595751.0000019C34BD8000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34BB8000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34BAA000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000003.2135595751.0000019C34BD4000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000003.2135687514.0000019C34BD4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.cc/panel/bronkzware/Loader
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/aceEd
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/acev
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmp, AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/rograad.
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 172.67.72.57:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316AD780 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7316AD780
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316792C00_2_00007FF7316792C0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316772C00_2_00007FF7316772C0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316786000_2_00007FF731678600
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73168A87D0_2_00007FF73168A87D
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF731661AD00_2_00007FF731661AD0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF731661E700_2_00007FF731661E70
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73167FED00_2_00007FF73167FED0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316692D00_2_00007FF7316692D0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73167A1800_2_00007FF73167A180
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316831D00_2_00007FF7316831D0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73165D3400_2_00007FF73165D340
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316953300_2_00007FF731695330
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316A64100_2_00007FF7316A6410
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316886000_2_00007FF731688600
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73165959D0_2_00007FF73165959D
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73165977B0_2_00007FF73165977B
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316AD7800_2_00007FF7316AD780
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316617800_2_00007FF731661780
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316AF8000_2_00007FF7316AF800
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73168A9450_2_00007FF73168A945
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73168A93C0_2_00007FF73168A93C
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF731673C700_2_00007FF731673C70
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73165EC600_2_00007FF73165EC60
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73165AC3D0_2_00007FF73165AC3D
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73169DB600_2_00007FF73169DB60
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF731699E600_2_00007FF731699E60
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73168CF100_2_00007FF73168CF10
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316A1EF00_2_00007FF7316A1EF0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73165DED00_2_00007FF73165DED0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316A0EC00_2_00007FF7316A0EC0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF731685D200_2_00007FF731685D20
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF731670F400_2_00007FF731670F40
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316510000_2_00007FF731651000
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF73167AC70 appears 33 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF73167ABE0 appears 37 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF731663970 appears 49 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF73167AD50 appears 34 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7316B0B9C appears 47 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7316762B0 appears 381 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7316797C0 appears 36 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF731676430 appears 323 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF7316796F0 appears 46 times
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: String function: 00007FF731670B80 appears 70 times
Source: classification engineClassification label: mal60.evad.winEXE@68/18@1/2
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF731662650 GetLastError,_errno,FormatMessageA,strchr,strncpy,_errno,_errno,GetLastError,SetLastError,0_2_00007FF731662650
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5004:120:WilError_03
Source: AimPrivStoreAtt117.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: AimPrivStoreAtt117.exeReversingLabs: Detection: 63%
Source: AimPrivStoreAtt117.exeVirustotal: Detection: 60%
Source: AimPrivStoreAtt117.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\AimPrivStoreAtt117.exe "C:\Users\user\Desktop\AimPrivStoreAtt117.exe"
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: AimPrivStoreAtt117.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: AimPrivStoreAtt117.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: AimPrivStoreAtt117.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Aim\x64\Release\EpicGames.pdb source: AimPrivStoreAtt117.exe
Source: Binary string: 2D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Aim\x64\Release\EpicGames.pdb source: AimPrivStoreAtt117.exe
Source: AimPrivStoreAtt117.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: AimPrivStoreAtt117.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: AimPrivStoreAtt117.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: AimPrivStoreAtt117.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: AimPrivStoreAtt117.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316792C0 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF7316792C0
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeWindow / User API: threadDelayed 2683Jump to behavior
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 2200Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-47798
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeAPI coverage: 5.2 %
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exe TID: 1708Thread sleep time: -134150s >= -30000sJump to behavior
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

Anti Debugging

barindex
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-47437
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316B06AC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7316B06AC
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316B0A48 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF7316B0A48
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316792C0 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF7316792C0
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316B03B4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7316B03B4
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316B06AC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7316B06AC
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316B0854 SetUnhandledExceptionFilter,0_2_00007FF7316B0854
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316B08C4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7316B08C4
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF7316853A0 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF7316853A0
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF731695330 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF731695330
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73169BE35 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF73169BE35
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF73169C090 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF73169C090
Source: C:\Users\user\Desktop\AimPrivStoreAtt117.exeCode function: 0_2_00007FF731677F70 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF731677F70
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
12
Virtualization/Sandbox Evasion
LSASS Memory131
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager12
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets23
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590900 Sample: AimPrivStoreAtt117.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 60 34 keyauth.win 2->34 36 bg.microsoft.map.fastly.net 2->36 42 Multi AV Scanner detection for submitted file 2->42 44 Machine Learning detection for sample 2->44 46 AI detected suspicious sample 2->46 8 AimPrivStoreAtt117.exe 1 2->8         started        signatures3 process4 dnsIp5 38 keyauth.win 172.67.72.57, 443, 49708 CLOUDFLARENETUS United States 8->38 40 127.0.0.1 unknown unknown 8->40 48 Found API chain indicative of debugger detection 8->48 12 cmd.exe 1 8->12         started        14 cmd.exe 1 8->14         started        16 cmd.exe 1 8->16         started        18 16 other processes 8->18 signatures6 process7 process8 20 taskkill.exe 1 12->20         started        22 taskkill.exe 1 14->22         started        24 sc.exe 1 16->24         started        26 taskkill.exe 1 18->26         started        28 taskkill.exe 1 18->28         started        30 taskkill.exe 1 18->30         started        32 9 other processes 18->32

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
AimPrivStoreAtt117.exe63%ReversingLabsWin64.Trojan.Generic
AimPrivStoreAtt117.exe61%VirustotalBrowse
AimPrivStoreAtt117.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://167.114.85.75/aimhvcionattprivatestore674.exe0%Avira URL Cloudsafe
http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exe0%Avira URL Cloudsafe
http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exeC:0%Avira URL Cloudsafe
https://keyauth.cc/panel/bronkzware/Loader0%Avira URL Cloudsafe
http://167.114.85.75/aimhvcionattprivatestore674.exeC:0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    high
    keyauth.win
    172.67.72.57
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://keyauth.win/api/1.1/false
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exeAimPrivStoreAtt117.exefalse
        • Avira URL Cloud: safe
        unknown
        http://167.114.85.75/aimhvcionattprivatestore674.exeAimPrivStoreAtt117.exefalse
        • Avira URL Cloud: safe
        unknown
        https://keyauth.win/api/1.2/rograad.AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://167.114.85.75/aimhvcionattprivatestore674.exeC:AimPrivStoreAtt117.exefalse
          • Avira URL Cloud: safe
          unknown
          http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exeC:AimPrivStoreAtt117.exefalse
          • Avira URL Cloud: safe
          unknown
          https://keyauth.win/api/1.1/aceEdAimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://keyauth.win/api/1.1/acevAimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://curl.haxx.se/docs/http-cookies.htmlAimPrivStoreAtt117.exefalse
                high
                https://curl.haxx.se/docs/http-cookies.html#AimPrivStoreAtt117.exefalse
                  high
                  https://keyauth.cc/panel/bronkzware/LoaderAimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34BD8000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000003.2135687514.0000019C34BD8000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000003.2135595751.0000019C34BD8000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34BB8000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34BAA000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000003.2135595751.0000019C34BD4000.00000004.00000020.00020000.00000000.sdmp, AimPrivStoreAtt117.exe, 00000000.00000003.2135687514.0000019C34BD4000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://keyauth.win/api/1.2/AimPrivStoreAtt117.exe, 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmp, AimPrivStoreAtt117.exe, 00000000.00000002.3964803329.0000019C34B8B000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    172.67.72.57
                    keyauth.winUnited States
                    13335CLOUDFLARENETUSfalse
                    IP
                    127.0.0.1
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1590900
                    Start date and time:2025-01-14 16:52:13 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 30s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Run name:Run with higher sleep bypass
                    Number of analysed new started processes analysed:38
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:AimPrivStoreAtt117.exe
                    Detection:MAL
                    Classification:mal60.evad.winEXE@68/18@1/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 48
                    • Number of non-executed functions: 231
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded IPs from analysis (whitelisted): 20.109.210.53, 52.165.164.15, 13.95.31.18, 13.107.253.45
                    • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    172.67.72.57SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Win64.MalwareX-gen.11163.24254.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Win64.MalwareX-gen.31663.10814.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                    lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                      flX5YA1C09.exeGet hashmaliciousUnknownBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        keyauth.winEspPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        tpmbypassprivatestore.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        ak3o7AZ3mH.exeGet hashmaliciousBabadeda, Conti, MimikatzBrowse
                                        • 104.26.0.5
                                        Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        bg.microsoft.map.fastly.netemail.emlGet hashmaliciousunknownBrowse
                                        • 199.232.214.172
                                        http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                        • 199.232.214.172
                                        final shipping documents.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                        • 199.232.214.172
                                        0dsIoO7xjt.docxGet hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        original.emlGet hashmaliciousUnknownBrowse
                                        • 199.232.214.172
                                        original.emlGet hashmaliciousUnknownBrowse
                                        • 199.232.214.172
                                        Mbda Us.pdfGet hashmaliciousHTMLPhisherBrowse
                                        • 199.232.214.172
                                        T710XblGiM.docmGet hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        T710XblGiM.docmGet hashmaliciousUnknownBrowse
                                        • 199.232.214.172
                                        https://biomed.acemlna.com/lt.php?x=3TZy~GE4J6XM5p79_du5VOds1H_TjdEjvPthjaTKJ3DP65RA_ky.0.Rv2Y2liNA~j-xAXHXFJFQNDb.y_ELGV.Fw3Hyoi8Get hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUShttp://loginmicrosoftonline.al-mutaheda.com/expiration/notice/nRrRc/receiving@accel-inc.comGet hashmaliciousHTMLPhisherBrowse
                                        • 172.67.74.152
                                        EspPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        tpmbypassprivatestore.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        email.emlGet hashmaliciousunknownBrowse
                                        • 172.64.41.3
                                        http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        http://brillflooring.comGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 104.21.64.1
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0eEspPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        SPOOOFER776.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        http://www.brillflooring.comGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        PlusPrivStoreAtt116.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        Confirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 172.67.72.57
                                        Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                        • 172.67.72.57
                                        http://vionicstore.shopGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        q9JZUaS1Gy.docGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        No context
                                        Process:C:\Users\user\Desktop\AimPrivStoreAtt117.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):302
                                        Entropy (8bit):3.591458873507413
                                        Encrypted:false
                                        SSDEEP:3:rRRqmIEaGj3F/9Dqa+U4W42oJXTIFNBh2To3G3oJXTIFNBhWXqowvxOwVGt:H041lqABhHfABhwcV4
                                        MD5:2093ABDC1CC5C502980BCE5F4F8897A7
                                        SHA1:23552E512460D3CC05A91E5491BF3ADCD9AB8568
                                        SHA-256:6B1550C3CDBCADFC23C19F432C52168C41BF0B54784962910391352D800ECDA5
                                        SHA-512:6E6C2E4E350921C2F8070E2B47FF1B056AEC8102CDA839B7288B578F7C86791C50DAE291568948C6E759801018BDFF48023FD856DDF56FF1D07F7E8BD21402F3
                                        Malicious:false
                                        Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[1] Iniciar Valorant Aim (HVCI DESLIGADO): ..[2] Iniciar Valorant Aim (HVCI HABILITADO): ....[+] Selecione a opcao:
                                        Process:C:\Windows\System32\cmd.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):44
                                        Entropy (8bit):4.003997527334849
                                        Encrypted:false
                                        SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                        MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                        SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                        SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                        SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                        Malicious:false
                                        Preview:The system cannot find the file specified...
                                        File type:PE32+ executable (console) x86-64, for MS Windows
                                        Entropy (8bit):6.418976746883596
                                        TrID:
                                        • Win64 Executable Console (202006/5) 92.65%
                                        • Win64 Executable (generic) (12005/4) 5.51%
                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                        • DOS Executable Generic (2002/1) 0.92%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:AimPrivStoreAtt117.exe
                                        File size:510'464 bytes
                                        MD5:199e093792c0a0c91233709796553e3c
                                        SHA1:3046ad48ef9e69c4482b58e89f2d6573e2e75793
                                        SHA256:cbb3e224ed616e62f2a81dedd1d88a7b1c3dfe318372506364662cadb73353c6
                                        SHA512:f59dc0b6b5df0889db3819bb57c71bf878ccefaf0107fc1fb0e54a49a161fcb35caadd8cb3995760cc9cf871656d5aa0b6f437d53a9c6a755e74f17167f53c0a
                                        SSDEEP:12288:GXDur8S9+8Qu/y9x2EpL5UcY+6cm3C/pk:6urP93v/C2E19Y+7/pk
                                        TLSH:8FB46D96A7A913E9D1A7C07CC547C603E7B6B4991311DBDB43A0CA791F137E22E3A720
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._...B...PHe.^...PH..v...PH..\...PH..R...PH..P.......A...V...x.......?...9H..T...9H..W...9Hg.W...9H..W...RichV..
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x140060398
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x140000000
                                        Subsystem:windows cui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x677DDF4C [Wed Jan 8 02:13:32 2025 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:6
                                        OS Version Minor:0
                                        File Version Major:6
                                        File Version Minor:0
                                        Subsystem Version Major:6
                                        Subsystem Version Minor:0
                                        Import Hash:551e5f19de2baa264d46ee5c6718793c
                                        Instruction
                                        dec eax
                                        sub esp, 28h
                                        call 00007F5B70D972C8h
                                        dec eax
                                        add esp, 28h
                                        jmp 00007F5B70D96C17h
                                        int3
                                        int3
                                        jmp 00007F5B70D9757Eh
                                        int3
                                        int3
                                        int3
                                        inc eax
                                        push ebx
                                        dec eax
                                        sub esp, 20h
                                        dec eax
                                        mov ebx, ecx
                                        xor ecx, ecx
                                        call dword ptr [00001D6Bh]
                                        dec eax
                                        mov ecx, ebx
                                        call dword ptr [00001D5Ah]
                                        call dword ptr [00001DB4h]
                                        dec eax
                                        mov ecx, eax
                                        mov edx, C0000409h
                                        dec eax
                                        add esp, 20h
                                        pop ebx
                                        dec eax
                                        jmp dword ptr [00001DB0h]
                                        dec eax
                                        mov dword ptr [esp+08h], ecx
                                        dec eax
                                        sub esp, 38h
                                        mov ecx, 00000017h
                                        call dword ptr [00001DA4h]
                                        test eax, eax
                                        je 00007F5B70D96DA9h
                                        mov ecx, 00000002h
                                        int 29h
                                        dec eax
                                        lea ecx, dword ptr [00019462h]
                                        call 00007F5B70D96F6Eh
                                        dec eax
                                        mov eax, dword ptr [esp+38h]
                                        dec eax
                                        mov dword ptr [00019549h], eax
                                        dec eax
                                        lea eax, dword ptr [esp+38h]
                                        dec eax
                                        add eax, 08h
                                        dec eax
                                        mov dword ptr [000194D9h], eax
                                        dec eax
                                        mov eax, dword ptr [00019532h]
                                        dec eax
                                        mov dword ptr [000193A3h], eax
                                        dec eax
                                        mov eax, dword ptr [esp+40h]
                                        dec eax
                                        mov dword ptr [000194A7h], eax
                                        mov dword ptr [0001937Dh], C0000409h
                                        mov dword ptr [00019377h], 00000001h
                                        mov dword ptr [00000081h], 00000000h
                                        Programming Language:
                                        • [IMP] VS2008 SP1 build 30729
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x773180x1cc.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x7f0000x1e8.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7a0000x405c.pdata
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x800000x4ec.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x710800x70.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x711000x28.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x70f400x140.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x620000x858.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x607180x60800602f1089df07ef344959cfe41447af2cFalse0.5326414750647669data6.334775760528484IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x620000x16ec40x1700034b296da2f473d4b9bd8f08336dcff29False0.37954313858695654data5.599267697230251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x790000xe080x4005b070ba4bf716bd9abd9429588bdb3edFalse0.21484375data2.448207517753268IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .pdata0x7a0000x405c0x420012d13dd91b54cb2b26af3136bc3f645dFalse0.4738991477272727data5.697151102004698IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .rsrc0x7f0000x1e80x2009682c2bd23621eded0bee00be928ba8fFalse0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x800000x4ec0x60043a6897ca7133ec62c7e8be294ec97b7False0.5162760416666666data4.831811206446416IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_MANIFEST0x7f0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                        DLLImport
                                        KERNEL32.dllReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, WideCharToMultiByte, RtlCaptureContext, GetModuleHandleA, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, FreeLibrary, GetSystemDirectoryA, QueryPerformanceFrequency, VerSetConditionMask, SleepEx, GetEnvironmentVariableA, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, DeleteCriticalSection, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileType, MultiByteToWideChar, WaitForSingleObjectEx, MoveFileExA, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, LeaveCriticalSection, GetSystemTimeAsFileTime, GetProcAddress, GetLastError, InitializeCriticalSectionEx, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, SetConsoleScreenBufferInfoEx, GetConsoleScreenBufferInfoEx, SetConsoleMode, GetConsoleMode, Sleep, RtlLookupFunctionEntry, GetStdHandle, OutputDebugStringW, InitializeSListHead
                                        USER32.dllMessageBoxA, MoveWindow, GetWindowRect, GetWindowLongA, SetWindowLongA
                                        ADVAPI32.dllCryptEncrypt, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey
                                        SHELL32.dllShellExecuteA
                                        MSVCP140.dll?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Xlength_error@std@@YAXPEBD@Z, _Thrd_detach, _Cnd_do_broadcast_at_thread_exit, ?_Throw_Cpp_error@std@@YAXH@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?_Random_device@std@@YAIXZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                        urlmon.dllURLDownloadToFileA
                                        Normaliz.dllIdnToAscii
                                        WLDAP32.dll
                                        CRYPT32.dllCertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertOpenStore, CertCloseStore
                                        WS2_32.dllntohl, gethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, __WSAFDIsSet, ioctlsocket, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, listen
                                        VCRUNTIME140.dll__std_exception_destroy, __std_exception_copy, memcpy, memcmp, _CxxThrowException, __std_terminate, __C_specific_handler, strchr, __current_exception_context, strrchr, __current_exception, memchr, memset, strstr, memmove
                                        VCRUNTIME140_1.dll__CxxFrameHandler4
                                        api-ms-win-crt-runtime-l1-1-0.dll_errno, __sys_nerr, _invalid_parameter_noinfo_noreturn, strerror, exit, _getpid, system, _beginthreadex, _register_thread_local_exe_atexit_callback, terminate, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, _c_exit, _get_initial_narrow_environment, _initterm, _initterm_e, _exit, __p___argv, __p___argc
                                        api-ms-win-crt-heap-l1-1-0.dll_callnewh, calloc, realloc, malloc, _set_new_mode, free
                                        api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, fputc, ftell, _lseeki64, _read, _write, _close, _open, __acrt_iob_func, __stdio_common_vsscanf, fgets, fputs, fopen, fflush, __stdio_common_vsprintf, fread, fclose, _set_fmode, fwrite
                                        api-ms-win-crt-convert-l1-1-0.dllatoi, strtoul, strtoull, strtoll, strtol, strtod
                                        api-ms-win-crt-locale-l1-1-0.dlllocaleconv, _configthreadlocale
                                        api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                        api-ms-win-crt-string-l1-1-0.dllstrpbrk, strcspn, strcmp, strncmp, strncpy, strspn, isupper, tolower, _strdup
                                        api-ms-win-crt-utility-l1-1-0.dllqsort
                                        api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _access, _unlink, _fstat64
                                        api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 14, 2025 16:53:13.392244101 CET49708443192.168.2.5172.67.72.57
                                        Jan 14, 2025 16:53:13.392287970 CET44349708172.67.72.57192.168.2.5
                                        Jan 14, 2025 16:53:13.392493963 CET49708443192.168.2.5172.67.72.57
                                        Jan 14, 2025 16:53:13.404994011 CET49708443192.168.2.5172.67.72.57
                                        Jan 14, 2025 16:53:13.405030012 CET44349708172.67.72.57192.168.2.5
                                        Jan 14, 2025 16:53:13.868478060 CET44349708172.67.72.57192.168.2.5
                                        Jan 14, 2025 16:53:13.868577003 CET49708443192.168.2.5172.67.72.57
                                        Jan 14, 2025 16:53:13.873060942 CET49708443192.168.2.5172.67.72.57
                                        Jan 14, 2025 16:53:13.873078108 CET44349708172.67.72.57192.168.2.5
                                        Jan 14, 2025 16:53:13.873421907 CET44349708172.67.72.57192.168.2.5
                                        Jan 14, 2025 16:53:13.877686024 CET49708443192.168.2.5172.67.72.57
                                        Jan 14, 2025 16:53:13.919337988 CET44349708172.67.72.57192.168.2.5
                                        Jan 14, 2025 16:53:14.180005074 CET44349708172.67.72.57192.168.2.5
                                        Jan 14, 2025 16:53:14.180099010 CET44349708172.67.72.57192.168.2.5
                                        Jan 14, 2025 16:53:14.180176020 CET49708443192.168.2.5172.67.72.57
                                        Jan 14, 2025 16:53:14.190316916 CET49708443192.168.2.5172.67.72.57
                                        Jan 14, 2025 16:53:14.190351009 CET44349708172.67.72.57192.168.2.5
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jan 14, 2025 16:53:13.376233101 CET6034853192.168.2.51.1.1.1
                                        Jan 14, 2025 16:53:13.383497000 CET53603481.1.1.1192.168.2.5
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jan 14, 2025 16:53:13.376233101 CET192.168.2.51.1.1.10x149bStandard query (0)keyauth.winA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jan 14, 2025 16:53:13.383497000 CET1.1.1.1192.168.2.50x149bNo error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                        Jan 14, 2025 16:53:13.383497000 CET1.1.1.1192.168.2.50x149bNo error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                        Jan 14, 2025 16:53:13.383497000 CET1.1.1.1192.168.2.50x149bNo error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                        Jan 14, 2025 16:53:26.128638029 CET1.1.1.1192.168.2.50x4187No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Jan 14, 2025 16:53:26.128638029 CET1.1.1.1192.168.2.50x4187No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        Jan 14, 2025 16:54:27.622817993 CET1.1.1.1192.168.2.50x67faNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Jan 14, 2025 16:54:27.622817993 CET1.1.1.1192.168.2.50x67faNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        • keyauth.win
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.549708172.67.72.574435560C:\Users\user\Desktop\AimPrivStoreAtt117.exe
                                        TimestampBytes transferredDirectionData
                                        2025-01-14 15:53:13 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                        Host: keyauth.win
                                        Accept: */*
                                        Content-Length: 74
                                        Content-Type: application/x-www-form-urlencoded
                                        2025-01-14 15:53:13 UTC74OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 32 2e 36 26 6e 61 6d 65 3d 4c 6f 61 64 65 72 20 50 72 69 6e 63 69 70 61 6c 20 7c 20 50 72 69 76 61 74 65 20 53 74 6f 72 65 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                        Data Ascii: type=init&ver=2.6&name=Loader Principal | Private Store&ownerid=9WIvTVJa9m
                                        2025-01-14 15:53:14 UTC1326INHTTP/1.1 200 OK
                                        Date: Tue, 14 Jan 2025 15:53:14 GMT
                                        Content-Type: application/json; charset=UTF-8
                                        Content-Length: 475
                                        Connection: close
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hxKzBJIlJarRRw9izFk2IloJegBipY04TgLzYpVb92byy%2BB2ooLEUL94nXwxvg8jIMYhbPu5hJxXotyX964ov8rwCy%2B%2B6tFyRUEm8%2FzHMu%2FJR0AAqXzwL98BP8Xs"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Acknowledge: Credit to VaultCord.com
                                        X-Powered-By: VaultCord.com
                                        content-security-policy: upgrade-insecure-requests
                                        permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                        referrer-policy: strict-origin-when-cross-origin
                                        strict-transport-security: max-age=31536000; includeSubDomains
                                        x-content-security-policy: img-src *; media-src * data:;
                                        x-content-type-options: nosniff
                                        x-frame-options: DENY
                                        x-xss-protection: 1; mode=block
                                        Access-Control-Allow-Headers: *
                                        Access-Control-Allow-Methods: *
                                        Access-Control-Allow-Origin: *
                                        Server: cloudflare
                                        CF-RAY: 901ecc363a255e78-EWR
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1611&min_rtt=1597&rtt_var=627&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2346&recv_bytes=862&delivery_rate=1708601&cwnd=252&unsent_bytes=0&cid=28970cb2a1b36c03&ts=325&x=0"
                                        2025-01-14 15:53:14 UTC43INData Raw: 7b 22 73 75 63 63 65 73 73 22 3a 74 72 75 65 2c 22 63 6f 64 65 22 3a 36 38 2c 22 6d 65 73 73 61 67 65 22 3a 22 49 6e 69 74 69 61
                                        Data Ascii: {"success":true,"code":68,"message":"Initia
                                        2025-01-14 15:53:14 UTC432INData Raw: 6c 69 7a 65 64 22 2c 22 73 65 73 73 69 6f 6e 69 64 22 3a 22 34 65 65 38 33 39 36 32 22 2c 22 61 70 70 69 6e 66 6f 22 3a 7b 22 6e 75 6d 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4f 6e 6c 69 6e 65 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4b 65 79 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 32 2e 36 22 2c 22 63 75 73
                                        Data Ascii: lized","sessionid":"4ee83962","appinfo":{"numUsers":"N/A - Use fetchStats() function in latest example","numOnlineUsers":"N/A - Use fetchStats() function in latest example","numKeys":"N/A - Use fetchStats() function in latest example","version":"2.6","cus


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:10:53:09
                                        Start date:14/01/2025
                                        Path:C:\Users\user\Desktop\AimPrivStoreAtt117.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\AimPrivStoreAtt117.exe"
                                        Imagebase:0x7ff731650000
                                        File size:510'464 bytes
                                        MD5 hash:199E093792C0A0C91233709796553E3C
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:false

                                        Target ID:1
                                        Start time:10:53:10
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6d64d0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:2
                                        Start time:10:53:10
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:10:53:10
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff7c6560000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:5
                                        Start time:10:53:10
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:10:53:10
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff7c6560000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:7
                                        Start time:10:53:10
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:10:53:10
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff7c6560000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:9
                                        Start time:10:53:10
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:10
                                        Start time:10:53:10
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff6fb6b0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:11
                                        Start time:10:53:10
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:12
                                        Start time:10:53:11
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff6fb6b0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:13
                                        Start time:10:53:11
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:14
                                        Start time:10:53:11
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:15
                                        Start time:10:53:11
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff7c6560000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:16
                                        Start time:10:53:11
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:17
                                        Start time:10:53:11
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff7c6560000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:18
                                        Start time:10:53:11
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:19
                                        Start time:10:53:11
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff7c6560000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:20
                                        Start time:10:53:12
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:21
                                        Start time:10:53:12
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff6fb6b0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:22
                                        Start time:10:53:12
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:23
                                        Start time:10:53:12
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff6fb6b0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:24
                                        Start time:10:53:12
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:25
                                        Start time:10:53:13
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:26
                                        Start time:10:53:13
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                        Imagebase:0x7ff7c6560000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:27
                                        Start time:10:53:13
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:28
                                        Start time:10:53:13
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                        Imagebase:0x7ff7c6560000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:29
                                        Start time:10:53:14
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:30
                                        Start time:10:53:14
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\taskkill.exe
                                        Wow64 process (32bit):false
                                        Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                        Imagebase:0x7ff7c6560000
                                        File size:101'376 bytes
                                        MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:31
                                        Start time:10:53:14
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:32
                                        Start time:10:53:14
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerPro
                                        Imagebase:0x7ff6fb6b0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:33
                                        Start time:10:53:14
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:34
                                        Start time:10:53:14
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:sc stop HTTPDebuggerProSdk
                                        Imagebase:0x7ff6fb6b0000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Target ID:35
                                        Start time:10:53:14
                                        Start date:14/01/2025
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                        Imagebase:0x7ff7d9800000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:5%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:22.7%
                                          Total number of Nodes:2000
                                          Total number of Limit Nodes:102
                                          execution_graph 47331 7ff7316929f0 47332 7ff731692a80 47331->47332 47333 7ff731692a19 47331->47333 47406 7ff73167c010 47332->47406 47335 7ff731692a40 47333->47335 47336 7ff731692a2a 47333->47336 47366 7ff7316772c0 47335->47366 47404 7ff73167bf10 405 API calls 47336->47404 47339 7ff731692a8d 47349 7ff731692af1 47339->47349 47351 7ff731692b6a 47339->47351 47426 7ff7316ab3c0 35 API calls 47339->47426 47340 7ff731692a35 47342 7ff731692a51 47342->47351 47405 7ff731693670 65 API calls 47342->47405 47344 7ff731692b22 47346 7ff731692b7e 47344->47346 47347 7ff731692b2e 47344->47347 47345 7ff731692c1e 47434 7ff73167d2e0 17 API calls 47345->47434 47361 7ff731692b87 47346->47361 47430 7ff7316ad450 _errno strtoll _errno 47346->47430 47427 7ff731693380 271 API calls 47347->47427 47349->47344 47349->47345 47349->47351 47353 7ff731692b38 47353->47351 47428 7ff731692ed0 26 API calls 47353->47428 47354 7ff731692a75 47357 7ff731692bde 47357->47351 47433 7ff7316ab3c0 35 API calls 47357->47433 47360 7ff731692ba3 47360->47357 47360->47361 47363 7ff731692bc9 47360->47363 47361->47357 47432 7ff731693710 72 API calls 47361->47432 47362 7ff731692b53 47362->47351 47429 7ff7316932c0 32 API calls 47362->47429 47431 7ff731693710 72 API calls 47363->47431 47367 7ff731677318 47366->47367 47380 7ff73167730f 47366->47380 47435 7ff73167e0f0 47367->47435 47371 7ff731677332 47372 7ff7316773a9 47371->47372 47373 7ff7316773c2 47371->47373 47483 7ff7316762b0 19 API calls 47372->47483 47375 7ff7316773cc 47373->47375 47402 7ff7316773f9 47373->47402 47376 7ff731678490 611 API calls 47375->47376 47377 7ff7316773da 47376->47377 47377->47380 47381 7ff7316785a0 51 API calls 47377->47381 47379 7ff7316776d5 47379->47380 47485 7ff731678bc0 616 API calls 47379->47485 47496 7ff7316aff40 47380->47496 47381->47380 47382 7ff731677644 SleepEx getsockopt 47384 7ff73167768c WSAGetLastError 47382->47384 47382->47402 47384->47402 47385 7ff7316775e6 SleepEx getsockopt 47386 7ff73167762e WSAGetLastError 47385->47386 47385->47402 47386->47402 47387 7ff731677707 47494 7ff731662e40 27 API calls 47387->47494 47388 7ff731677713 47391 7ff73167776b 47388->47391 47486 7ff731676f10 47388->47486 47389 7ff7316774f7 WSASetLastError 47389->47402 47390 7ff7316776ee 47390->47380 47390->47387 47462 7ff731678490 47391->47462 47395 7ff731676430 15 API calls 47395->47402 47396 7ff7316777e7 47495 7ff7316762b0 19 API calls 47396->47495 47397 7ff731677789 47397->47380 47475 7ff7316785a0 47397->47475 47400 7ff7316773b8 47400->47380 47402->47379 47402->47382 47402->47385 47402->47388 47402->47389 47402->47395 47403 7ff731678bc0 616 API calls 47402->47403 47438 7ff731686920 47402->47438 47484 7ff731662e40 27 API calls 47402->47484 47403->47402 47404->47340 47405->47354 47407 7ff73167c05f 47406->47407 47408 7ff73167c044 47406->47408 47409 7ff73167c0a1 memset 47407->47409 47425 7ff73167c065 47407->47425 47408->47407 47556 7ff7316704b0 47408->47556 47413 7ff73167c0d3 47409->47413 47411 7ff7316aff40 8 API calls 47412 7ff73167c205 47411->47412 47412->47339 47414 7ff73167c12e calloc 47413->47414 47415 7ff73167c1a6 47413->47415 47416 7ff73167c15c 47414->47416 47417 7ff73167c146 47414->47417 47579 7ff73167b3c0 404 API calls 47415->47579 47569 7ff731676430 47416->47569 47417->47425 47420 7ff73167c1b6 47422 7ff731676430 15 API calls 47420->47422 47423 7ff73167c1d1 47420->47423 47422->47423 47424 7ff73167c1db free 47423->47424 47423->47425 47424->47425 47425->47411 47426->47349 47427->47353 47428->47362 47429->47351 47430->47360 47431->47357 47432->47357 47433->47351 47434->47351 47436 7ff73167e13d GetTickCount 47435->47436 47437 7ff73167e102 QueryPerformanceCounter 47435->47437 47436->47371 47437->47371 47439 7ff731686967 47438->47439 47444 7ff73168699b 47438->47444 47440 7ff731686971 47439->47440 47439->47444 47441 7ff73168698b Sleep 47440->47441 47442 7ff731686978 WSASetLastError 47440->47442 47443 7ff731686994 47440->47443 47441->47443 47442->47443 47446 7ff7316aff40 8 API calls 47443->47446 47447 7ff731686ae5 47444->47447 47448 7ff731686b13 select 47444->47448 47449 7ff731686c4e 47446->47449 47450 7ff731686b06 Sleep 47447->47450 47451 7ff731686af3 WSASetLastError 47447->47451 47452 7ff731686aea 47447->47452 47448->47452 47449->47402 47450->47452 47451->47452 47452->47443 47453 7ff731686bb2 __WSAFDIsSet __WSAFDIsSet 47452->47453 47454 7ff731686bdc 47452->47454 47453->47454 47455 7ff731686c0b 47454->47455 47456 7ff731686be4 __WSAFDIsSet 47454->47456 47455->47443 47459 7ff731686c13 __WSAFDIsSet 47455->47459 47457 7ff731686bfa __WSAFDIsSet 47456->47457 47458 7ff731686bf7 47456->47458 47457->47455 47458->47457 47460 7ff731686c29 __WSAFDIsSet 47459->47460 47461 7ff731686c26 47459->47461 47460->47443 47461->47460 47463 7ff731678595 47462->47463 47464 7ff7316784a7 47462->47464 47463->47397 47465 7ff731678577 47464->47465 47466 7ff73167854a 47464->47466 47468 7ff73167852c 47464->47468 47507 7ff731686d80 583 API calls 47465->47507 47506 7ff7316873d0 610 API calls 47466->47506 47468->47466 47471 7ff731678531 47468->47471 47470 7ff731678590 47470->47397 47505 7ff7316762b0 19 API calls 47471->47505 47472 7ff731678572 47472->47397 47474 7ff731678540 47474->47397 47476 7ff7316785cd 47475->47476 47477 7ff7316785c0 47475->47477 47508 7ff731677c40 47476->47508 47538 7ff7316859d0 47477->47538 47482 7ff7316785e5 47482->47380 47483->47400 47484->47402 47485->47390 47487 7ff731676f50 closesocket 47486->47487 47489 7ff731676f25 47486->47489 47487->47391 47488 7ff731676f41 47552 7ff731666440 free 47488->47552 47489->47488 47491 7ff731676f66 47489->47491 47553 7ff731666440 free 47491->47553 47493 7ff731676f6e 47493->47391 47494->47396 47495->47400 47497 7ff7316aff49 47496->47497 47498 7ff731677845 47497->47498 47499 7ff7316b03e8 IsProcessorFeaturePresent 47497->47499 47498->47332 47498->47342 47500 7ff7316b0400 47499->47500 47554 7ff7316b05dc RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 47500->47554 47502 7ff7316b0413 47555 7ff7316b03b4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47502->47555 47505->47474 47506->47472 47507->47470 47509 7ff731677c77 47508->47509 47510 7ff731677e73 47508->47510 47509->47510 47512 7ff731677c91 getpeername 47509->47512 47511 7ff7316aff40 8 API calls 47510->47511 47513 7ff731677f5a 47511->47513 47514 7ff731677ced getsockname 47512->47514 47515 7ff731677cb6 WSAGetLastError 47512->47515 47541 7ff7316729e0 15 API calls 47513->47541 47516 7ff731677d77 47514->47516 47517 7ff731677d40 WSAGetLastError 47514->47517 47542 7ff731662e40 27 API calls 47515->47542 47546 7ff731676e70 19 API calls 47516->47546 47544 7ff731662e40 27 API calls 47517->47544 47521 7ff731677cd3 47543 7ff7316762b0 19 API calls 47521->47543 47522 7ff731677d5d 47545 7ff7316762b0 19 API calls 47522->47545 47523 7ff731677d99 47527 7ff731677ddd 47523->47527 47528 7ff731677d9d _errno _errno 47523->47528 47525 7ff731677ce8 47525->47510 47549 7ff731676e70 19 API calls 47527->47549 47547 7ff731662e40 27 API calls 47528->47547 47531 7ff731677e2f 47531->47510 47533 7ff731677e33 _errno _errno 47531->47533 47532 7ff731677dc3 47548 7ff7316762b0 19 API calls 47532->47548 47550 7ff731662e40 27 API calls 47533->47550 47536 7ff731677e59 47551 7ff7316762b0 19 API calls 47536->47551 47539 7ff73167e0f0 2 API calls 47538->47539 47540 7ff7316859ea 47539->47540 47540->47476 47541->47482 47542->47521 47543->47525 47544->47522 47545->47525 47546->47523 47547->47532 47548->47525 47549->47531 47550->47536 47551->47525 47552->47487 47553->47493 47554->47502 47557 7ff7316704d7 47556->47557 47558 7ff7316704de 47556->47558 47616 7ff731670e90 memset 47557->47616 47559 7ff731670504 47558->47559 47561 7ff73167050d 47558->47561 47562 7ff731670547 47558->47562 47617 7ff7316762b0 19 API calls 47559->47617 47580 7ff731689730 47561->47580 47598 7ff73168a3c0 47561->47598 47562->47407 47564 7ff731670532 47564->47562 47566 7ff7316859d0 2 API calls 47564->47566 47565 7ff731670557 47565->47562 47566->47562 47570 7ff731676439 47569->47570 47571 7ff73167658e 47569->47571 47578 7ff731676509 47570->47578 47824 7ff7316798c0 13 API calls 47570->47824 47571->47415 47573 7ff7316aff40 8 API calls 47573->47571 47574 7ff73167648c 47575 7ff7316764f1 47574->47575 47825 7ff7316797c0 47574->47825 47576 7ff73167653e fwrite fwrite 47575->47576 47575->47578 47576->47578 47578->47573 47579->47420 47581 7ff73168a3c0 47580->47581 47585 7ff73168a409 47581->47585 47593 7ff73168a43b 47581->47593 47618 7ff731677b30 47581->47618 47582 7ff73168a532 47582->47585 47746 7ff73168bb20 69 API calls 47582->47746 47584 7ff731677b30 10 API calls 47584->47593 47585->47564 47588 7ff73168a51c 47745 7ff7316762b0 19 API calls 47588->47745 47591 7ff731686920 19 API calls 47591->47593 47593->47582 47593->47584 47593->47585 47593->47588 47593->47591 47594 7ff73168a4fd WSAGetLastError 47593->47594 47596 7ff73168a4ec 47593->47596 47678 7ff73168b390 47593->47678 47744 7ff7316762b0 19 API calls 47594->47744 47596->47585 47596->47588 47597 7ff73168a515 47597->47585 47599 7ff73168a414 47598->47599 47603 7ff73168a409 47598->47603 47601 7ff731677b30 10 API calls 47599->47601 47612 7ff73168a43b 47599->47612 47600 7ff73168a532 47600->47603 47823 7ff73168bb20 69 API calls 47600->47823 47604 7ff73168a427 47601->47604 47602 7ff731677b30 10 API calls 47602->47612 47603->47564 47606 7ff73168a51c 47604->47606 47608 7ff73168a5b0 74 API calls 47604->47608 47822 7ff7316762b0 19 API calls 47606->47822 47608->47612 47609 7ff73168a515 47609->47603 47610 7ff731686920 19 API calls 47610->47612 47611 7ff73168b390 254 API calls 47611->47612 47612->47600 47612->47602 47612->47603 47612->47606 47612->47610 47612->47611 47613 7ff73168a4fd WSAGetLastError 47612->47613 47615 7ff73168a4ec 47612->47615 47821 7ff7316762b0 19 API calls 47613->47821 47615->47603 47615->47606 47616->47558 47617->47565 47619 7ff731677b7a 47618->47619 47620 7ff73167e0f0 2 API calls 47619->47620 47621 7ff731677b9a 47619->47621 47620->47621 47622 7ff7316aff40 8 API calls 47621->47622 47623 7ff731677c2e 47622->47623 47623->47588 47624 7ff73168a5b0 47623->47624 47625 7ff73168a622 47624->47625 47747 7ff731679140 47625->47747 47628 7ff73168a671 47630 7ff73168a67a GetModuleHandleA GetProcAddress 47628->47630 47634 7ff73168a6b8 47628->47634 47629 7ff731676430 15 API calls 47629->47628 47631 7ff73168a69c 47630->47631 47630->47634 47632 7ff731679140 14 API calls 47631->47632 47633 7ff73168a6b0 47632->47633 47633->47634 47635 7ff731679140 14 API calls 47634->47635 47646 7ff73168a715 47634->47646 47636 7ff73168a711 47635->47636 47637 7ff73168a722 47636->47637 47636->47646 47772 7ff7316762b0 19 API calls 47637->47772 47639 7ff73168b047 47755 7ff731688240 47639->47755 47641 7ff7316aff40 8 API calls 47643 7ff73168b34c 47641->47643 47642 7ff73168b05c 47644 7ff73168b06f 47642->47644 47647 7ff731688240 13 API calls 47642->47647 47643->47593 47648 7ff731676430 15 API calls 47644->47648 47651 7ff73168b082 47644->47651 47645 7ff73168a7d8 47773 7ff7316762b0 19 API calls 47645->47773 47646->47639 47646->47645 47647->47644 47648->47651 47653 7ff731676430 15 API calls 47651->47653 47656 7ff73168b0cb 47651->47656 47652 7ff73168b12d calloc 47654 7ff73168b1a0 47652->47654 47655 7ff73168b187 47652->47655 47653->47656 47658 7ff73168b209 free 47654->47658 47659 7ff73168b2ac 47654->47659 47676 7ff73168b196 47654->47676 47774 7ff7316762b0 19 API calls 47655->47774 47656->47652 47660 7ff73168b286 47658->47660 47661 7ff73168b23a 47658->47661 47769 7ff731676b70 47659->47769 47779 7ff731662650 22 API calls 47660->47779 47664 7ff73168b260 47661->47664 47665 7ff73168b242 47661->47665 47777 7ff731662650 22 API calls 47664->47777 47775 7ff731662650 22 API calls 47665->47775 47667 7ff73168b290 47780 7ff7316762b0 19 API calls 47667->47780 47669 7ff73168b26a 47778 7ff7316762b0 19 API calls 47669->47778 47671 7ff73168b249 47776 7ff7316762b0 19 API calls 47671->47776 47674 7ff73168a731 47674->47676 47676->47641 47679 7ff73168b400 47678->47679 47680 7ff73168baff 47679->47680 47681 7ff73168b4a2 47679->47681 47682 7ff73168b462 malloc 47679->47682 47683 7ff73168b4f3 47681->47683 47684 7ff73168b4a8 malloc 47681->47684 47682->47680 47682->47681 47685 7ff73168b506 realloc 47683->47685 47686 7ff73168b560 47683->47686 47684->47680 47684->47683 47685->47686 47687 7ff73168b522 47685->47687 47690 7ff73168b5a5 47686->47690 47803 7ff731676630 recv 47686->47803 47806 7ff7316762b0 19 API calls 47687->47806 47691 7ff73168b5ea malloc 47690->47691 47693 7ff73168b7fa 47690->47693 47700 7ff73168b531 47690->47700 47691->47680 47692 7ff73168b687 memcpy 47691->47692 47694 7ff73168b6a7 free 47692->47694 47692->47700 47807 7ff7316762b0 19 API calls 47693->47807 47694->47700 47701 7ff73168b719 47694->47701 47695 7ff7316aff40 8 API calls 47697 7ff73168b54d 47695->47697 47697->47593 47698 7ff73168b815 47698->47700 47700->47695 47702 7ff73168ba8c 47701->47702 47704 7ff73168b83d 47701->47704 47709 7ff73168b738 47701->47709 47702->47700 47703 7ff73168ba9a 47702->47703 47819 7ff731662650 22 API calls 47703->47819 47707 7ff73168b884 47704->47707 47708 7ff73168b846 47704->47708 47706 7ff73168baaf 47820 7ff7316762b0 19 API calls 47706->47820 47810 7ff731662650 22 API calls 47707->47810 47708->47703 47711 7ff73168b853 47708->47711 47713 7ff731676b70 48 API calls 47709->47713 47715 7ff73168b7a4 47709->47715 47719 7ff73168b8b2 47709->47719 47808 7ff731662650 22 API calls 47711->47808 47713->47709 47722 7ff73168b7d0 memcpy 47715->47722 47724 7ff73168b8d8 47715->47724 47716 7ff73168b89b 47811 7ff7316762b0 19 API calls 47716->47811 47718 7ff73168b868 47809 7ff7316762b0 19 API calls 47718->47809 47812 7ff7316762b0 19 API calls 47719->47812 47722->47693 47722->47724 47723 7ff73168ba60 47723->47700 47725 7ff73168ba7b 47723->47725 47724->47700 47724->47723 47727 7ff73168ba33 47724->47727 47728 7ff73168b989 47724->47728 47818 7ff7316a6410 91 API calls 47725->47818 47816 7ff731662650 22 API calls 47727->47816 47730 7ff73168b9fb 47728->47730 47734 7ff73168b997 memset 47728->47734 47732 7ff73168ba10 47730->47732 47733 7ff73168ba0a CertFreeCertificateContext 47730->47733 47731 7ff73168ba47 47817 7ff7316762b0 19 API calls 47731->47817 47732->47723 47736 7ff73168ba14 47732->47736 47733->47732 47737 7ff73168b9bc 47734->47737 47815 7ff7316762b0 19 API calls 47736->47815 47737->47730 47740 7ff73168b9cc 47737->47740 47743 7ff73168b9e6 47737->47743 47738 7ff73168ba59 47738->47730 47740->47743 47813 7ff73166fa20 255 API calls 47740->47813 47743->47730 47814 7ff7316762b0 19 API calls 47743->47814 47744->47597 47745->47597 47746->47585 47748 7ff73167916d 47747->47748 47749 7ff73167921f VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 47748->47749 47752 7ff731679185 47748->47752 47750 7ff731679274 VerifyVersionInfoA 47749->47750 47751 7ff731679262 VerSetConditionMask 47749->47751 47750->47752 47751->47750 47753 7ff7316aff40 8 API calls 47752->47753 47754 7ff7316792ab 47753->47754 47754->47628 47754->47629 47756 7ff73168824c 47755->47756 47761 7ff731688276 47755->47761 47757 7ff731688251 _errno 47756->47757 47767 7ff731688267 47756->47767 47757->47642 47758 7ff731688337 47758->47642 47759 7ff7316882d0 strchr 47759->47761 47760 7ff7316883e0 strchr 47762 7ff731688400 strchr 47760->47762 47760->47767 47761->47758 47761->47759 47762->47767 47763 7ff7316aff40 8 API calls 47764 7ff731688546 47763->47764 47764->47642 47765 7ff7316884f5 47766 7ff73168848d 47765->47766 47782 7ff731688290 strchr 47765->47782 47766->47763 47767->47760 47767->47765 47767->47766 47783 7ff731676810 47769->47783 47772->47674 47773->47674 47774->47676 47775->47671 47776->47674 47777->47669 47778->47674 47779->47667 47780->47674 47781 7ff7316762b0 19 API calls 47781->47676 47782->47766 47784 7ff731676917 send 47783->47784 47785 7ff73167687f 47783->47785 47786 7ff731676935 WSAGetLastError 47784->47786 47788 7ff731676944 47784->47788 47785->47784 47790 7ff731686920 19 API calls 47785->47790 47787 7ff731676950 47786->47787 47786->47788 47801 7ff731662e40 27 API calls 47787->47801 47791 7ff7316aff40 8 API calls 47788->47791 47793 7ff7316768b3 47790->47793 47794 7ff731676997 47791->47794 47792 7ff731676962 47802 7ff7316762b0 19 API calls 47792->47802 47793->47784 47797 7ff7316768bc 47793->47797 47794->47676 47794->47781 47796 7ff731676974 47796->47788 47798 7ff7316768c4 malloc 47797->47798 47799 7ff7316768f0 recv 47797->47799 47798->47799 47800 7ff73167690d 47798->47800 47799->47784 47799->47800 47800->47784 47801->47792 47802->47796 47804 7ff73167664b WSAGetLastError 47803->47804 47805 7ff731676672 47803->47805 47804->47690 47805->47690 47806->47700 47807->47698 47808->47718 47809->47698 47810->47716 47811->47698 47812->47698 47813->47743 47814->47730 47815->47698 47816->47731 47817->47738 47818->47698 47819->47706 47820->47698 47821->47609 47822->47609 47823->47603 47824->47574 47828 7ff73167a180 13 API calls 47825->47828 47827 7ff7316797f3 47827->47575 47828->47827 47829 7ff73166826b 47830 7ff731668281 47829->47830 47831 7ff7316682b2 47829->47831 47866 7ff73167fed0 47830->47866 47832 7ff73166835a 47831->47832 47837 7ff7316682b0 47831->47837 47834 7ff731668374 47832->47834 47838 7ff731668414 47832->47838 48147 7ff73167d150 24 API calls 47834->48147 47835 7ff73166829a 47839 7ff7316859d0 2 API calls 47835->47839 47840 7ff731667640 292 API calls 47837->47840 47863 7ff731667bbb 47837->47863 47841 7ff731667640 292 API calls 47838->47841 47838->47863 47839->47837 47840->47863 47841->47863 47842 7ff731668381 47844 7ff731667640 292 API calls 47842->47844 47843 7ff731668de0 17 API calls 47843->47863 47847 7ff7316683a1 47844->47847 47846 7ff731668c62 47848 7ff7316683aa 47847->47848 47849 7ff731668406 free 47847->47849 47851 7ff7316683c1 47848->47851 47853 7ff7316683b3 free 47848->47853 47849->47863 47850 7ff731668c53 48175 7ff7316762b0 19 API calls 47850->48175 48148 7ff73167c710 28 API calls 47851->48148 47853->47863 47857 7ff731677b30 10 API calls 47857->47863 47858 7ff7316683f7 free 47858->47863 47859 7ff7316683d2 47859->47858 47860 7ff731667c5e 47862 7ff7316762b0 19 API calls 47860->47862 47860->47863 47862->47860 47863->47843 47863->47846 47863->47850 47863->47857 47863->47860 48112 7ff7316762b0 19 API calls 47863->48112 48113 7ff731667640 47863->48113 48149 7ff731671d70 47863->48149 48173 7ff731666360 15 API calls 47863->48173 48174 7ff731685b20 22 API calls 47863->48174 47867 7ff73167ff68 47866->47867 47868 7ff73167ffa1 free _strdup 47867->47868 47871 7ff73167ffcb 47867->47871 48066 7ff73167ff7e 47867->48066 47868->47871 47868->48066 47869 7ff7316aff40 8 API calls 47870 7ff73166828b 47869->47870 47870->47831 47870->47835 47872 7ff731680095 47871->47872 47873 7ff731680081 free 47871->47873 47874 7ff7316800b4 47872->47874 48216 7ff7316796f0 15 API calls 47872->48216 47873->47872 47876 7ff7316800ff free 47874->47876 47877 7ff73168015d 47874->47877 47874->48066 47879 7ff731680112 free 47876->47879 47886 7ff7316801c1 47877->47886 48217 7ff731684dc0 337 API calls 47877->48217 47887 7ff731680263 47879->47887 47888 7ff73168028a 47879->47888 47880 7ff7316801a9 47884 7ff7316801b0 free 47880->47884 47880->47886 47883 7ff7316801fe free 47883->47879 47883->48066 47884->48066 47886->47883 48218 7ff731684dc0 337 API calls 47886->48218 47887->47888 48219 7ff7316796f0 15 API calls 47887->48219 47890 7ff731680346 free 47888->47890 47891 7ff73168030e free 47888->47891 47888->48066 47892 7ff731680335 47890->47892 48220 7ff7316796f0 15 API calls 47891->48220 47893 7ff73168037d 47892->47893 47900 7ff731680366 47892->47900 47892->48066 48221 7ff73166c540 6 API calls 47893->48221 47896 7ff731680389 48222 7ff7316a4860 59 API calls 47896->48222 47898 7ff73168036b 47903 7ff731680478 47898->47903 47915 7ff731680545 47898->47915 47898->48066 47899 7ff7316803a2 47899->47900 47899->48066 47900->47898 48223 7ff73166d4b0 free free 47900->48223 47901 7ff7316805ec free 47913 7ff73168060f 47901->47913 47905 7ff7316804bf strchr 47903->47905 47920 7ff731680491 47903->47920 47904 7ff731680410 48224 7ff73166c740 26 API calls 47904->48224 47907 7ff7316804d4 strchr 47905->47907 47905->47920 47912 7ff7316804e7 strchr 47907->47912 47907->47920 47908 7ff731680717 47918 7ff731680740 47908->47918 47919 7ff73168077b 47908->47919 47909 7ff7316805cc 48226 7ff7316762b0 19 API calls 47909->48226 47910 7ff731680425 48225 7ff73166d4b0 free free 47910->48225 47912->47920 47913->47908 47914 7ff731680645 47913->47914 48227 7ff7316829d0 strchr strchr strchr malloc memcpy 47914->48227 47915->47909 47915->47920 48229 7ff7316796f0 15 API calls 47918->48229 48230 7ff7316796f0 15 API calls 47919->48230 47920->47901 47921 7ff73168064d 47924 7ff73168066b 47921->47924 47925 7ff731680660 free 47921->47925 47921->48066 47928 7ff731680696 47924->47928 47931 7ff731680680 memcpy 47924->47931 47927 7ff7316806bf 47925->47927 47926 7ff731680779 47930 7ff7316806e3 47926->47930 47957 7ff73168099f 47926->47957 47926->48066 47927->47930 48228 7ff7316796f0 15 API calls 47927->48228 47929 7ff73168069b strchr 47928->47929 47932 7ff7316806ab free 47929->47932 47933 7ff7316806a8 47929->47933 47930->47926 47936 7ff7316805db 47930->47936 48231 7ff73169ee80 23 API calls 47930->48231 47931->47929 47932->47927 47933->47932 47936->48066 47937 7ff731680c30 calloc 47940 7ff731680c5f 47937->47940 47937->48066 47938 7ff731680992 47942 7ff73169ee50 13 API calls 47938->47942 47939 7ff7316809de 47946 7ff731680a1a free 47939->47946 47947 7ff731680b6e 47939->47947 47948 7ff731680a3a 47939->47948 48176 7ff7316822a0 47940->48176 47941 7ff731680a98 48242 7ff7316762b0 19 API calls 47941->48242 47942->47936 47945 7ff7316807f7 47945->47938 47945->48066 48232 7ff73169efc0 47945->48232 48241 7ff7316796f0 15 API calls 47946->48241 47947->47948 47953 7ff731680b92 free 47947->47953 47948->47937 47948->48066 47949 7ff731680c73 47958 7ff731680ce0 47949->47958 47964 7ff731680ca7 47949->47964 47949->48066 47951 7ff731680ab1 47961 7ff731680b52 47951->47961 47968 7ff731680b0f 47951->47968 47955 7ff731680bbd 47953->47955 47956 7ff731680bb0 47953->47956 47955->47956 47963 7ff731680bd0 47955->47963 48246 7ff7316796f0 15 API calls 47956->48246 47957->47939 47957->47941 47957->47951 47957->47968 47959 7ff731680d0e 47958->47959 47960 7ff731680ce5 47958->47960 48248 7ff731681ee0 7 API calls 47959->48248 47965 7ff7316822a0 25 API calls 47960->47965 48244 7ff7316762b0 19 API calls 47961->48244 47962 7ff7316808aa 48236 7ff73169ee50 47962->48236 48245 7ff7316796f0 15 API calls 47963->48245 48247 7ff731681ee0 7 API calls 47964->48247 47985 7ff731680d0c 47965->47985 47968->47939 47975 7ff731680b39 47968->47975 48243 7ff7316762b0 19 API calls 47975->48243 47976 7ff731680cc8 free 47976->47985 47977 7ff731680d2b 47982 7ff7316822a0 25 API calls 47977->47982 47977->47985 47977->48066 47979 7ff7316808b2 47979->47957 47980 7ff7316808da strstr 47979->47980 47981 7ff73168096f 47979->47981 47983 7ff7316808f2 47980->47983 47981->47957 47982->47985 47983->47981 47984 7ff7316797c0 13 API calls 47983->47984 47984->47981 47986 7ff7316822a0 25 API calls 47985->47986 47985->48066 47987 7ff731680f20 free free free 47986->47987 47989 7ff731680f5e 47987->47989 47987->48066 47988 7ff73168111b 47990 7ff731681261 47988->47990 47988->48066 48252 7ff7316885b0 _gmtime64 47988->48252 47989->47988 47992 7ff731680fc1 47989->47992 47996 7ff7316810a5 47989->47996 47989->48066 48186 7ff731682340 47990->48186 47991 7ff7316810f0 47991->47988 47998 7ff731681104 47991->47998 47991->48066 48249 7ff73166a360 62 API calls 47992->48249 47995 7ff73168114d 47999 7ff731681153 47995->47999 48017 7ff731681169 47995->48017 47996->47991 47997 7ff7316810c4 47996->47997 48000 7ff7316822a0 25 API calls 47996->48000 48001 7ff7316822a0 25 API calls 47997->48001 47997->48066 48251 7ff731681ee0 7 API calls 47998->48251 48253 7ff7316762b0 19 API calls 47999->48253 48000->47997 48001->47991 48005 7ff731681118 48005->47988 48006 7ff73168126f 48007 7ff7316812a0 48006->48007 48015 7ff73168168c 48006->48015 48006->48066 48009 7ff731681633 48007->48009 48010 7ff731681397 48007->48010 48011 7ff7316812b0 48007->48011 48008 7ff731681096 48008->47996 48263 7ff731681ee0 7 API calls 48009->48263 48013 7ff7316813a0 48010->48013 48032 7ff731681411 48010->48032 48011->48009 48030 7ff7316812ba 48011->48030 48016 7ff7316822a0 25 API calls 48013->48016 48014 7ff731681649 48021 7ff731682050 62 API calls 48014->48021 48014->48066 48024 7ff7316822a0 25 API calls 48015->48024 48028 7ff7316816e5 48015->48028 48019 7ff7316813b0 48016->48019 48017->47990 48025 7ff7316797c0 13 API calls 48017->48025 48017->48066 48018 7ff73168108e 48250 7ff73166a2d0 9 API calls 48018->48250 48036 7ff731682050 62 API calls 48019->48036 48019->48066 48020 7ff7316822a0 25 API calls 48031 7ff731681008 48020->48031 48029 7ff73168166c 48021->48029 48022 7ff73168130b 48033 7ff73168132f 48022->48033 48022->48066 48255 7ff7316848d0 28 API calls 48022->48255 48024->48028 48034 7ff731681235 48025->48034 48026 7ff7316814a4 48050 7ff731681581 48026->48050 48058 7ff7316814bf 48026->48058 48027 7ff731681711 48051 7ff731681801 48027->48051 48027->48066 48073 7ff731681734 48027->48073 48028->48027 48035 7ff7316822a0 25 API calls 48028->48035 48028->48066 48037 7ff731681676 48029->48037 48038 7ff7316813ef 48029->48038 48030->48022 48046 7ff7316822a0 25 API calls 48030->48046 48031->48008 48031->48018 48031->48020 48040 7ff7316822a0 25 API calls 48032->48040 48049 7ff731681460 48032->48049 48256 7ff731681ee0 7 API calls 48033->48256 48254 7ff731681ee0 7 API calls 48034->48254 48035->48027 48043 7ff7316813d3 48036->48043 48264 7ff7316762b0 19 API calls 48037->48264 48259 7ff73167d2e0 17 API calls 48038->48259 48040->48049 48042 7ff7316822a0 25 API calls 48042->48049 48043->48038 48052 7ff7316813d9 48043->48052 48046->48022 48047 7ff731681327 48047->48033 48047->48066 48049->48026 48049->48042 48049->48066 48075 7ff731681565 48050->48075 48260 7ff7316848d0 28 API calls 48050->48260 48087 7ff7316817ac 48051->48087 48265 7ff7316848d0 28 API calls 48051->48265 48258 7ff7316762b0 19 API calls 48052->48258 48057 7ff731681257 48057->47990 48057->48066 48063 7ff7316814ff strchr 48058->48063 48058->48075 48060 7ff731681345 48060->48066 48068 7ff731682050 62 API calls 48060->48068 48061 7ff731681837 48072 7ff731681851 48061->48072 48081 7ff731681928 48061->48081 48062 7ff7316819c1 48273 7ff731681ee0 7 API calls 48062->48273 48069 7ff731681514 strchr 48063->48069 48086 7ff731681534 48063->48086 48064 7ff731681777 strchr 48070 7ff73168178c strchr 48064->48070 48064->48087 48066->47869 48067 7ff731681408 48067->48066 48275 7ff731685b20 22 API calls 48067->48275 48071 7ff731681373 48068->48071 48074 7ff731681527 strchr 48069->48074 48069->48086 48076 7ff73168179f strchr 48070->48076 48070->48087 48077 7ff731681379 48071->48077 48078 7ff73168138f 48071->48078 48079 7ff73168185e 48072->48079 48072->48081 48073->48064 48073->48087 48074->48086 48261 7ff731681ee0 7 API calls 48075->48261 48076->48087 48257 7ff7316762b0 19 API calls 48077->48257 48274 7ff73167d2e0 17 API calls 48078->48274 48266 7ff731681ee0 7 API calls 48079->48266 48081->48066 48096 7ff731681898 48081->48096 48271 7ff731681ee0 7 API calls 48081->48271 48082 7ff7316815c0 48082->48066 48091 7ff731682050 62 API calls 48082->48091 48085 7ff731681983 48196 7ff731682050 48085->48196 48086->48066 48086->48075 48087->48061 48087->48062 48087->48066 48089 7ff731681a95 48089->48066 48097 7ff731676430 15 API calls 48089->48097 48093 7ff731681613 48091->48093 48092 7ff731681874 48092->48066 48094 7ff73168189d 48092->48094 48095 7ff731681885 48092->48095 48093->48078 48099 7ff73168161d 48093->48099 48102 7ff7316818e4 48094->48102 48105 7ff7316822a0 25 API calls 48094->48105 48267 7ff731681ee0 7 API calls 48095->48267 48096->48066 48096->48085 48097->48066 48262 7ff7316762b0 19 API calls 48099->48262 48102->48096 48270 7ff731681ee0 7 API calls 48102->48270 48104 7ff7316819ab 48272 7ff7316762b0 19 API calls 48104->48272 48108 7ff7316818b5 48105->48108 48108->48096 48268 7ff731681ee0 7 API calls 48108->48268 48110 7ff7316818cc 48110->48102 48269 7ff731681ee0 7 API calls 48110->48269 48112->47863 48114 7ff73166767c 48113->48114 48123 7ff731667752 48113->48123 48307 7ff73166b890 48114->48307 48116 7ff731667687 free free 48119 7ff7316676b7 48116->48119 48117 7ff7316aff40 8 API calls 48118 7ff731667787 48117->48118 48118->47863 48120 7ff7316676f5 48119->48120 48335 7ff731685600 22 API calls 48119->48335 48325 7ff731668de0 48120->48325 48123->48117 48124 7ff73166770f 48124->48123 48125 7ff7316677bc 48124->48125 48336 7ff73167f820 free free free free 48124->48336 48329 7ff73167ee60 48125->48329 48129 7ff7316677eb 48130 7ff7316677f0 free 48129->48130 48130->48130 48131 7ff73166780e 48130->48131 48132 7ff731667877 48131->48132 48134 7ff73166793b 48131->48134 48133 7ff7316797c0 13 API calls 48132->48133 48136 7ff7316678d6 48133->48136 48135 7ff731671d70 90 API calls 48134->48135 48137 7ff73166796d 48135->48137 48337 7ff73166f080 92 API calls 48136->48337 48340 7ff731671ef0 292 API calls 48137->48340 48140 7ff7316678f7 48141 7ff7316678fb 48140->48141 48142 7ff731667925 48140->48142 48144 7ff731676430 15 API calls 48141->48144 48339 7ff731671ef0 292 API calls 48142->48339 48145 7ff731667916 48144->48145 48338 7ff731671ef0 292 API calls 48145->48338 48147->47842 48148->47859 48150 7ff731671eac 48149->48150 48152 7ff731671d92 48149->48152 48150->47863 48151 7ff731671dbf 48154 7ff73167ee60 9 API calls 48151->48154 48152->48150 48152->48151 48349 7ff73167f820 free free free free 48152->48349 48155 7ff731671dd2 48154->48155 48346 7ff7316a1650 48155->48346 48173->47863 48174->47863 48175->47846 48276 7ff731679830 15 API calls 48176->48276 48178 7ff7316822c9 48179 7ff73168230a 48178->48179 48180 7ff7316822d1 48178->48180 48181 7ff731682329 48179->48181 48183 7ff731682317 free free 48179->48183 48277 7ff731681ee0 7 API calls 48180->48277 48181->47949 48183->48181 48185 7ff7316822f5 free 48185->47949 48193 7ff73168236b 48186->48193 48187 7ff7316823f0 strchr 48189 7ff731682409 strchr 48187->48189 48187->48193 48188 7ff73168264a 48188->48006 48189->48193 48190 7ff731682458 _strdup 48191 7ff731682669 48190->48191 48190->48193 48191->48188 48192 7ff731682673 free free 48191->48192 48192->48188 48193->48187 48193->48188 48193->48190 48194 7ff731682624 free 48193->48194 48195 7ff7316822a0 25 API calls 48193->48195 48194->48193 48195->48193 48197 7ff7316820b2 48196->48197 48198 7ff73168211a 48197->48198 48199 7ff7316820c4 48197->48199 48278 7ff731676b00 48198->48278 48281 7ff73167c9c0 malloc 48199->48281 48202 7ff7316820d9 48204 7ff7316820e0 48202->48204 48205 7ff7316820ff memcpy 48202->48205 48206 7ff7316820f7 48204->48206 48207 7ff7316820e5 free free 48204->48207 48205->48198 48208 7ff7316819a1 48206->48208 48207->48206 48208->48078 48208->48104 48209 7ff731682269 free free 48209->48208 48210 7ff73168217c 48282 7ff7316761f0 fwrite fwrite 48210->48282 48212 7ff7316821ae 48212->48208 48212->48209 48213 7ff73168218d 48214 7ff7316821a6 48213->48214 48283 7ff7316761f0 fwrite fwrite 48213->48283 48214->48212 48216->47874 48217->47880 48218->47883 48219->47888 48220->47892 48221->47896 48222->47899 48223->47904 48224->47910 48225->47898 48226->47936 48227->47921 48228->47930 48229->47926 48230->47926 48231->47945 48233 7ff73169f003 48232->48233 48234 7ff7316aff40 8 API calls 48233->48234 48235 7ff7316808a2 48234->48235 48235->47938 48235->47962 48237 7ff73169ee70 48236->48237 48238 7ff73169ee55 48236->48238 48237->47979 48306 7ff73169fe30 12 API calls 48238->48306 48241->47948 48242->47936 48243->47936 48244->47936 48245->47948 48246->47948 48247->47976 48248->47977 48249->48031 48250->48008 48251->48005 48252->47995 48253->47936 48254->48057 48255->48047 48256->48060 48257->48066 48258->47936 48259->48067 48260->48086 48261->48082 48262->47936 48263->48014 48264->47936 48265->48087 48266->48092 48267->48096 48268->48110 48269->48102 48270->48096 48271->48096 48272->47936 48273->48081 48274->48067 48275->48089 48276->48178 48277->48185 48284 7ff73168c5d0 48278->48284 48281->48202 48282->48213 48283->48214 48285 7ff73168c622 48284->48285 48286 7ff73168c649 malloc 48284->48286 48285->48286 48288 7ff73168c63c 48285->48288 48287 7ff73168c689 48286->48287 48286->48288 48289 7ff73168c6a9 memcpy 48287->48289 48290 7ff7316aff40 8 API calls 48288->48290 48298 7ff73168c72c 48289->48298 48291 7ff731676b30 48290->48291 48291->48210 48291->48212 48292 7ff73168c839 free 48292->48288 48293 7ff731677b30 10 API calls 48293->48298 48294 7ff73168c801 48305 7ff7316762b0 19 API calls 48294->48305 48295 7ff731686920 19 API calls 48295->48298 48297 7ff73168c813 48297->48292 48298->48292 48298->48293 48298->48294 48298->48295 48299 7ff73168c7db WSAGetLastError 48298->48299 48301 7ff731676b70 48 API calls 48298->48301 48303 7ff73168c7cd 48298->48303 48304 7ff7316762b0 19 API calls 48299->48304 48301->48298 48302 7ff73168c7f3 48302->48303 48303->48292 48304->48302 48305->48297 48308 7ff73166b8a5 48307->48308 48310 7ff73166b8b7 48307->48310 48309 7ff73166b8ab 48308->48309 48308->48310 48341 7ff7316896e0 WaitForSingleObjectEx CloseHandle 48309->48341 48311 7ff73166b9c8 EnterCriticalSection LeaveCriticalSection 48310->48311 48312 7ff73166ba54 free 48310->48312 48314 7ff73166ba0b 48311->48314 48315 7ff73166ba01 CloseHandle 48311->48315 48312->48116 48318 7ff73166ba19 48314->48318 48319 7ff73166ba11 48314->48319 48317 7ff73166ba2c 48315->48317 48316 7ff73166b8b0 48316->48310 48320 7ff73166ba41 closesocket 48317->48320 48344 7ff731666440 free 48317->48344 48343 7ff73166ba70 7 API calls 48318->48343 48342 7ff7316896e0 WaitForSingleObjectEx CloseHandle 48319->48342 48320->48312 48324 7ff73166ba22 free 48324->48317 48326 7ff731668e30 48325->48326 48327 7ff731668df7 48325->48327 48326->48124 48345 7ff731666130 17 API calls 48327->48345 48333 7ff73167ee81 48329->48333 48334 7ff73167eeda 48329->48334 48330 7ff7316aff40 8 API calls 48331 7ff7316677cb free 48330->48331 48331->48129 48331->48131 48332 7ff73167eea3 _time64 48332->48334 48333->48332 48333->48334 48334->48330 48335->48120 48336->48125 48337->48140 48341->48316 48342->48318 48343->48324 48344->48320 48345->48326 48350 7ff7316a4bd0 8 API calls 48346->48350 48348 7ff7316a1665 48349->48151 48350->48348 48351 7ff7316689f5 48352 7ff731668a04 48351->48352 48356 7ff731668a23 48351->48356 48353 7ff731668a15 48352->48353 48355 7ff731668de0 17 API calls 48352->48355 48354 7ff731667640 292 API calls 48353->48354 48354->48356 48355->48353 48369 7ff731667bbb 48356->48369 48372 7ff731666360 15 API calls 48356->48372 48359 7ff731668c53 48375 7ff7316762b0 19 API calls 48359->48375 48360 7ff731668de0 17 API calls 48360->48369 48362 7ff731668c62 48364 7ff731671d70 90 API calls 48364->48369 48365 7ff731677b30 10 API calls 48365->48369 48366 7ff7316762b0 19 API calls 48367 7ff731667c5e 48366->48367 48367->48366 48367->48369 48369->48359 48369->48360 48369->48362 48369->48364 48369->48365 48369->48367 48370 7ff731667640 292 API calls 48369->48370 48371 7ff7316762b0 19 API calls 48369->48371 48373 7ff731666360 15 API calls 48369->48373 48374 7ff731685b20 22 API calls 48369->48374 48370->48369 48371->48369 48372->48369 48373->48369 48374->48369 48375->48362 48376 7ff731667eb0 48377 7ff731667ec1 48376->48377 48404 7ff73167ed60 48377->48404 48379 7ff731667ef5 48380 7ff731667f27 48379->48380 48382 7ff731676430 15 API calls 48379->48382 48432 7ff73167f7b0 314 API calls 48380->48432 48384 7ff731667f21 48382->48384 48383 7ff731667f34 48385 7ff731667f37 48383->48385 48384->48380 48384->48385 48408 7ff731668e60 48385->48408 48392 7ff731668c62 48393 7ff731668c53 48435 7ff7316762b0 19 API calls 48393->48435 48394 7ff731668de0 17 API calls 48400 7ff731667bbb 48394->48400 48397 7ff731671d70 90 API calls 48397->48400 48398 7ff731677b30 10 API calls 48398->48400 48399 7ff731667c5e 48399->48400 48402 7ff7316762b0 19 API calls 48399->48402 48400->48392 48400->48393 48400->48394 48400->48397 48400->48398 48400->48399 48403 7ff731667640 292 API calls 48400->48403 48430 7ff7316762b0 19 API calls 48400->48430 48433 7ff731666360 15 API calls 48400->48433 48434 7ff731685b20 22 API calls 48400->48434 48402->48399 48403->48400 48405 7ff73167ed8a 48404->48405 48436 7ff73167f890 48405->48436 48407 7ff73167eda9 48407->48379 48419 7ff731668ec6 48408->48419 48409 7ff731669248 memcpy memcpy 48410 7ff731669130 48409->48410 48411 7ff7316aff40 8 API calls 48410->48411 48412 7ff731667f42 48411->48412 48412->48400 48424 7ff73167f480 48412->48424 48413 7ff73166900e calloc 48413->48410 48418 7ff731669028 48413->48418 48414 7ff731669244 48414->48409 48416 7ff73167e440 malloc memcpy 48416->48418 48417 7ff731669127 free 48417->48410 48418->48410 48418->48416 48418->48417 48418->48419 48421 7ff73166911f 48418->48421 48451 7ff73167e780 48418->48451 48419->48413 48419->48418 48420 7ff73166913a 48419->48420 48420->48409 48420->48414 48457 7ff73167e710 free 48420->48457 48456 7ff73167e710 free 48421->48456 48425 7ff73167f499 48424->48425 48458 7ff7316727d0 48425->48458 48427 7ff73167f4b0 48428 7ff731667e4c 48427->48428 48429 7ff731671d70 90 API calls 48427->48429 48428->48400 48431 7ff73167bec0 free 48428->48431 48429->48428 48430->48400 48431->48400 48432->48383 48433->48400 48434->48400 48435->48392 48437 7ff73167f8d0 48436->48437 48438 7ff73167f90b 48437->48438 48439 7ff73167f8f6 tolower 48437->48439 48440 7ff7316797c0 13 API calls 48438->48440 48439->48438 48439->48439 48441 7ff73167f922 48440->48441 48442 7ff73167f968 tolower 48441->48442 48448 7ff73167f98c 48441->48448 48450 7ff73167fa01 48441->48450 48445 7ff7316797c0 13 API calls 48442->48445 48443 7ff73167f9c6 _time64 48446 7ff73167f9e5 48443->48446 48443->48450 48444 7ff7316aff40 8 API calls 48447 7ff73167fa2c 48444->48447 48445->48448 48449 7ff731676430 15 API calls 48446->48449 48446->48450 48447->48407 48448->48443 48448->48450 48449->48450 48450->48444 48452 7ff73167e797 48451->48452 48453 7ff73167e836 48451->48453 48452->48453 48454 7ff73167e7b7 malloc 48452->48454 48453->48418 48455 7ff73167e7e6 48454->48455 48455->48418 48456->48417 48457->48420 48459 7ff7316859d0 2 API calls 48458->48459 48460 7ff7316727f5 48459->48460 48461 7ff731672805 48460->48461 48462 7ff73167282e free 48460->48462 48463 7ff731672859 48460->48463 48461->48427 48493 7ff7316796f0 15 API calls 48462->48493 48465 7ff73167e0f0 2 API calls 48463->48465 48467 7ff731672865 48463->48467 48466 7ff73167288f 48465->48466 48468 7ff7316728a3 48466->48468 48469 7ff7316728d1 48466->48469 48467->48427 48482 7ff7316770c0 48468->48482 48470 7ff7316859d0 2 API calls 48469->48470 48472 7ff7316728de 48470->48472 48476 7ff731672901 48472->48476 48477 7ff7316859d0 2 API calls 48472->48477 48473 7ff7316728b9 48474 7ff7316728c1 48473->48474 48475 7ff73167e0f0 2 API calls 48473->48475 48474->48427 48478 7ff731672994 48475->48478 48479 7ff731677c40 47 API calls 48476->48479 48477->48476 48478->48427 48480 7ff73167291a 48479->48480 48480->48473 48481 7ff731676430 15 API calls 48480->48481 48481->48473 48483 7ff73167e0f0 2 API calls 48482->48483 48484 7ff7316770e3 48483->48484 48485 7ff73167715b 48484->48485 48492 7ff731677174 48484->48492 48559 7ff7316762b0 19 API calls 48485->48559 48487 7ff73167716a 48488 7ff731677281 48487->48488 48488->48473 48489 7ff73167727d 48489->48488 48560 7ff731666130 17 API calls 48489->48560 48492->48489 48494 7ff731678600 48492->48494 48493->48463 48495 7ff73167866f memcpy 48494->48495 48497 7ff7316786d8 socket 48495->48497 48500 7ff7316786ab 48495->48500 48497->48500 48499 7ff7316aff40 8 API calls 48501 7ff731678bab 48499->48501 48503 7ff731678717 48500->48503 48552 7ff731678a34 48500->48552 48581 7ff7316855d0 ioctlsocket 48500->48581 48501->48492 48502 7ff731678b3a _errno _errno _errno 48586 7ff731662e40 27 API calls 48502->48586 48503->48502 48561 7ff7316a1b00 48503->48561 48506 7ff731678b6b 48587 7ff7316762b0 19 API calls 48506->48587 48507 7ff731678764 48507->48502 48509 7ff73167876d htons 48507->48509 48510 7ff731676430 15 API calls 48509->48510 48512 7ff73167878e 48510->48512 48511 7ff731678b80 48513 7ff731676f10 2 API calls 48511->48513 48515 7ff731678809 48512->48515 48516 7ff7316787af setsockopt 48512->48516 48514 7ff731678a15 48513->48514 48514->48552 48521 7ff731679140 14 API calls 48515->48521 48525 7ff731678841 48515->48525 48516->48515 48517 7ff7316787dd WSAGetLastError 48516->48517 48582 7ff731662e40 27 API calls 48517->48582 48518 7ff731678845 48527 7ff7316788ca setsockopt 48518->48527 48531 7ff731678909 48518->48531 48519 7ff731678862 getsockopt 48522 7ff731678889 48519->48522 48523 7ff731678893 setsockopt 48519->48523 48521->48525 48522->48518 48522->48523 48523->48518 48524 7ff7316787f7 48528 7ff731676430 15 API calls 48524->48528 48525->48518 48525->48519 48526 7ff7316789d7 48530 7ff7316789e8 48526->48530 48533 7ff731678a3e 48526->48533 48529 7ff7316788f7 48527->48529 48537 7ff73167890e 48527->48537 48528->48515 48532 7ff731676430 15 API calls 48529->48532 48583 7ff731677f70 596 API calls 48530->48583 48531->48526 48548 7ff731678a29 48531->48548 48532->48531 48580 7ff7316855d0 ioctlsocket 48533->48580 48536 7ff731678a4b 48540 7ff73167e0f0 2 API calls 48536->48540 48538 7ff73167893c WSAIoctl 48537->48538 48538->48531 48541 7ff731678984 WSAGetLastError 48538->48541 48539 7ff731678a04 48539->48533 48542 7ff731678a0a 48539->48542 48543 7ff731678a55 48540->48543 48545 7ff731676430 15 API calls 48541->48545 48546 7ff731676f10 2 API calls 48542->48546 48544 7ff731678a7f 48543->48544 48584 7ff731666130 17 API calls 48543->48584 48550 7ff731678ac8 WSAGetLastError 48544->48550 48551 7ff731678a9f connect 48544->48551 48544->48552 48545->48531 48546->48514 48549 7ff731676f10 2 API calls 48548->48549 48549->48552 48550->48552 48553 7ff731678ad5 48550->48553 48551->48550 48551->48552 48552->48499 48553->48552 48585 7ff731662e40 27 API calls 48553->48585 48555 7ff731678af1 48556 7ff731676430 15 API calls 48555->48556 48557 7ff731678b07 48556->48557 48558 7ff731676f10 2 API calls 48557->48558 48558->48552 48559->48487 48560->48488 48562 7ff7316a1b0f 48561->48562 48563 7ff7316a1b39 48561->48563 48564 7ff7316a1b14 _errno 48562->48564 48572 7ff7316a1b27 48562->48572 48565 7ff7316797c0 13 API calls 48563->48565 48564->48507 48566 7ff7316a1ba8 48565->48566 48567 7ff7316a1bf4 _errno 48566->48567 48568 7ff7316a1bc7 48566->48568 48567->48568 48569 7ff7316aff40 8 API calls 48568->48569 48570 7ff7316a1c0f 48569->48570 48570->48507 48571 7ff7316797c0 13 API calls 48571->48572 48572->48571 48573 7ff7316a1e9a 48572->48573 48577 7ff7316a1e20 48572->48577 48588 7ff7316a1b50 14 API calls 48573->48588 48575 7ff7316a1eb3 _errno 48576 7ff7316a1e49 48575->48576 48578 7ff7316aff40 8 API calls 48576->48578 48577->48575 48577->48576 48579 7ff7316a1e87 48578->48579 48579->48507 48580->48536 48581->48503 48582->48524 48583->48539 48584->48544 48585->48555 48586->48506 48587->48511 48588->48577 48589 7ff731681dd0 48590 7ff7316704b0 255 API calls 48589->48590 48591 7ff731681de7 48590->48591 48592 7ff73166b550 48593 7ff73166b594 48592->48593 48594 7ff73166b5a4 48592->48594 48637 7ff73167ea30 48593->48637 48596 7ff73167e0f0 2 API calls 48594->48596 48597 7ff73166b5e6 48596->48597 48603 7ff73166bbf0 calloc 48597->48603 48600 7ff73166b60e 48644 7ff7316762b0 19 API calls 48600->48644 48601 7ff73166b605 48604 7ff73166bd7e _errno 48603->48604 48605 7ff73166bc41 malloc 48603->48605 48606 7ff73166b601 48604->48606 48607 7ff73166bccc InitializeCriticalSectionEx 48605->48607 48608 7ff73166bcf7 48605->48608 48606->48600 48606->48601 48645 7ff7316853a0 socket 48607->48645 48610 7ff73166bd20 free 48608->48610 48611 7ff73166bd10 DeleteCriticalSection free 48608->48611 48613 7ff73166bd38 48610->48613 48614 7ff73166bd33 48610->48614 48611->48610 48617 7ff73166bd48 free 48613->48617 48618 7ff73166bd42 closesocket 48613->48618 48665 7ff731688fc0 free free free 48614->48665 48615 7ff73166bda6 _strdup 48615->48608 48619 7ff73166bdc0 free _strdup 48615->48619 48617->48604 48618->48617 48620 7ff73166be0e 48619->48620 48621 7ff73166bde2 48619->48621 48623 7ff73166be1a EnterCriticalSection LeaveCriticalSection 48620->48623 48624 7ff73166be91 free 48620->48624 48664 7ff731689690 _beginthreadex 48621->48664 48626 7ff73166be55 48623->48626 48627 7ff73166be44 CloseHandle 48623->48627 48624->48604 48625 7ff73166bdf6 48625->48606 48628 7ff73166bdfe _errno 48625->48628 48629 7ff73166be5a 48626->48629 48630 7ff73166be62 48626->48630 48633 7ff73166be78 48627->48633 48628->48620 48666 7ff7316896e0 WaitForSingleObjectEx CloseHandle 48629->48666 48667 7ff73166ba70 7 API calls 48630->48667 48634 7ff73166be88 closesocket 48633->48634 48668 7ff731666440 free 48633->48668 48634->48624 48635 7ff73166be6b free 48635->48633 48638 7ff73167ea39 48637->48638 48639 7ff73167ea4f socket 48637->48639 48638->48594 48640 7ff73167ea6c 48639->48640 48641 7ff73167ea65 48639->48641 48642 7ff731676f10 2 API calls 48640->48642 48641->48594 48643 7ff73167ea76 48642->48643 48643->48594 48644->48601 48646 7ff7316853f5 htonl setsockopt 48645->48646 48647 7ff7316853f0 48645->48647 48648 7ff73168557b closesocket closesocket closesocket 48646->48648 48649 7ff731685454 bind 48646->48649 48650 7ff7316aff40 8 API calls 48647->48650 48648->48647 48649->48648 48651 7ff73168546f getsockname 48649->48651 48652 7ff73166bcef 48650->48652 48651->48648 48653 7ff73168548b listen 48651->48653 48652->48608 48652->48615 48653->48648 48654 7ff7316854a0 socket 48653->48654 48654->48648 48655 7ff7316854bb connect 48654->48655 48655->48648 48656 7ff7316854d6 accept 48655->48656 48656->48648 48657 7ff7316854f2 48656->48657 48658 7ff7316797c0 13 API calls 48657->48658 48659 7ff731685509 send 48658->48659 48659->48648 48661 7ff73168553a recv 48659->48661 48661->48648 48662 7ff731685558 memcmp 48661->48662 48662->48648 48663 7ff73168556e closesocket 48662->48663 48663->48647 48664->48625 48665->48613 48666->48630 48667->48635 48668->48634 48669 7ff731667d7c 48670 7ff7316859d0 2 API calls 48669->48670 48671 7ff731667d89 48670->48671 48672 7ff731667da5 48671->48672 48727 7ff731666130 17 API calls 48671->48727 48674 7ff731667dc1 48672->48674 48728 7ff731666130 17 API calls 48672->48728 48696 7ff731671ad0 free free 48674->48696 48677 7ff731667dd1 48678 7ff731676430 15 API calls 48677->48678 48681 7ff731667e27 48677->48681 48688 7ff731667bbb 48677->48688 48679 7ff731667e1b 48678->48679 48680 7ff731668de0 17 API calls 48679->48680 48680->48681 48681->48688 48729 7ff73167bec0 free 48681->48729 48683 7ff731668de0 17 API calls 48683->48688 48685 7ff731668c62 48686 7ff731668c53 48732 7ff7316762b0 19 API calls 48686->48732 48688->48683 48688->48685 48688->48686 48690 7ff731671d70 90 API calls 48688->48690 48691 7ff731677b30 10 API calls 48688->48691 48692 7ff731667c5e 48688->48692 48695 7ff731667640 292 API calls 48688->48695 48726 7ff7316762b0 19 API calls 48688->48726 48730 7ff731666360 15 API calls 48688->48730 48731 7ff731685b20 22 API calls 48688->48731 48690->48688 48691->48688 48692->48688 48694 7ff7316762b0 19 API calls 48692->48694 48694->48692 48695->48688 48733 7ff7316718b0 48696->48733 48699 7ff7316718b0 292 API calls 48700 7ff731671b36 memset 48699->48700 48766 7ff731673260 48700->48766 48702 7ff731671b7d 48702->48677 48704 7ff731671d70 90 API calls 48704->48702 48705 7ff7316859d0 2 API calls 48706 7ff731671b9f 48705->48706 48706->48702 48707 7ff731671bcb free 48706->48707 48708 7ff731671bf2 48706->48708 48856 7ff7316796f0 15 API calls 48707->48856 48710 7ff73167e0f0 2 API calls 48708->48710 48712 7ff731671bfe 48708->48712 48711 7ff731671c40 48710->48711 48713 7ff731671c7d 48711->48713 48714 7ff731671c54 48711->48714 48712->48702 48712->48704 48715 7ff7316859d0 2 API calls 48713->48715 48716 7ff7316770c0 616 API calls 48714->48716 48718 7ff731671c8a 48715->48718 48717 7ff731671c6a 48716->48717 48717->48712 48719 7ff731671d37 48717->48719 48721 7ff731671cad 48718->48721 48722 7ff7316859d0 2 API calls 48718->48722 48720 7ff73167e0f0 2 API calls 48719->48720 48720->48702 48723 7ff731677c40 47 API calls 48721->48723 48722->48721 48724 7ff731671cc7 48723->48724 48724->48719 48725 7ff731676430 15 API calls 48724->48725 48725->48719 48726->48688 48727->48672 48728->48674 48729->48688 48730->48688 48731->48688 48732->48685 48734 7ff731671abb 48733->48734 48735 7ff7316718bf 48733->48735 48734->48699 48735->48734 48857 7ff731666360 15 API calls 48735->48857 48737 7ff7316718dd 48739 7ff7316718f1 48737->48739 48858 7ff731667270 292 API calls 48737->48858 48740 7ff731671902 48739->48740 48859 7ff731666f60 292 API calls 48739->48859 48742 7ff731671926 free 48740->48742 48743 7ff731671933 48740->48743 48742->48743 48860 7ff731671ef0 292 API calls 48743->48860 48767 7ff7316732a5 48766->48767 48855 7ff7316732c9 48767->48855 48861 7ff731672a60 calloc 48767->48861 48769 7ff7316732db 48769->48855 48876 7ff731674ed0 48769->48876 48770 7ff7316aff40 8 API calls 48771 7ff731671b65 48770->48771 48771->48702 48771->48705 48771->48712 48774 7ff731673324 48776 7ff731673342 48774->48776 48777 7ff731673330 _strdup 48774->48777 48775 7ff731673312 _strdup 48775->48774 48775->48855 48926 7ff731673c70 48776->48926 48777->48776 48777->48855 48781 7ff7316797c0 13 API calls 48782 7ff7316733b5 48781->48782 48782->48855 48985 7ff7316744c0 48782->48985 48783 7ff731673407 48784 7ff73167344c _strdup 48783->48784 48785 7ff731673462 48783->48785 48783->48855 48784->48785 48784->48855 48786 7ff73167346c _strdup 48785->48786 48787 7ff731673485 48785->48787 48786->48787 48786->48855 49001 7ff731674930 48787->49001 48792 7ff7316734d2 48794 7ff7316734f4 48792->48794 48795 7ff731672000 38 API calls 48792->48795 48792->48855 48793 7ff731672000 38 API calls 48793->48792 48796 7ff731672000 38 API calls 48794->48796 48797 7ff731673516 48794->48797 48794->48855 48795->48794 48796->48797 48798 7ff7316736af 48797->48798 48801 7ff731673614 48797->48801 48797->48855 49023 7ff73166f7e0 48798->49023 48800 7ff73167384a 48802 7ff73166f7e0 8 API calls 48800->48802 48800->48855 48803 7ff731673634 48801->48803 48804 7ff73167369f 48801->48804 48805 7ff731673861 48802->48805 49103 7ff73166e720 17 API calls 48803->49103 48806 7ff7316720d0 2 API calls 48804->48806 48805->48855 49047 7ff731675390 48805->49047 48806->48855 48808 7ff73167364a 48811 7ff731675e00 17 API calls 48808->48811 48808->48855 48817 7ff73167365c 48811->48817 48812 7ff731673954 48816 7ff731673a01 48812->48816 49107 7ff73166ecc0 13 API calls 48812->49107 48814 7ff731673662 48814->48855 48815 7ff7316738b9 48815->48812 48818 7ff7316738c1 48815->48818 48819 7ff731676430 15 API calls 48816->48819 48817->48814 49104 7ff73167d2e0 17 API calls 48817->49104 49106 7ff731675ab0 34 API calls 48818->49106 48823 7ff731673a10 48819->48823 49109 7ff731672ef0 44 API calls 48823->49109 48824 7ff7316738d1 free free 48826 7ff7316738f8 48824->48826 48830 7ff731676430 15 API calls 48826->48830 48827 7ff7316739a6 48834 7ff7316739eb 48827->48834 49108 7ff73166ea70 QueryPerformanceCounter GetTickCount 48827->49108 48828 7ff731673a8c 49111 7ff73166e720 17 API calls 48828->49111 48833 7ff73167394f 48830->48833 48832 7ff7316739cd 48839 7ff7316739ed 48832->48839 48840 7ff7316739e0 48832->48840 49066 7ff7316720d0 48833->49066 48834->48828 49110 7ff73166eb40 QueryPerformanceCounter GetTickCount 48834->49110 48838 7ff731673ac1 48838->48833 48850 7ff731676430 15 API calls 48838->48850 48842 7ff731676430 15 API calls 48839->48842 48841 7ff731671d70 90 API calls 48840->48841 48841->48834 48842->48816 48843 7ff731673a75 48846 7ff731673c5b 48843->48846 48847 7ff731673a81 48843->48847 48845 7ff731673a9b 48845->48838 48849 7ff731676430 15 API calls 48845->48849 48845->48855 48852 7ff731676430 15 API calls 48846->48852 48851 7ff731671d70 90 API calls 48847->48851 48849->48838 48853 7ff731673aef 48850->48853 48851->48828 48852->48816 48853->48833 48855->48770 48856->48708 48857->48737 48858->48739 48859->48740 48862 7ff731672a85 48861->48862 48863 7ff731672a90 calloc 48861->48863 48862->48769 48864 7ff731672aba 48863->48864 48865 7ff731672d01 free 48863->48865 48866 7ff73167e0f0 2 API calls 48864->48866 48865->48769 48867 7ff731672b51 48866->48867 48868 7ff73167e0f0 2 API calls 48867->48868 48869 7ff731672b65 48868->48869 48870 7ff731672d3d 48869->48870 48871 7ff731672cc7 _strdup 48869->48871 48872 7ff73167e0f0 2 API calls 48870->48872 48871->48870 48874 7ff731672cd9 48871->48874 48873 7ff731672d7d 48872->48873 48873->48769 48875 7ff731672ce7 free free 48874->48875 48875->48865 49112 7ff731675eb0 8 API calls 48876->49112 48879 7ff731674ef7 49116 7ff73169ee40 calloc 48879->49116 48880 7ff731674ef0 49115 7ff73169ee80 23 API calls 48880->49115 48883 7ff731674ef5 48884 7ff731674efc 48883->48884 48889 7ff731674f72 48884->48889 48898 7ff7316732fc 48884->48898 49117 7ff73169eab0 tolower 48884->49117 48885 7ff731675035 48887 7ff73169efc0 8 API calls 48885->48887 48900 7ff73167505e 48887->48900 48888 7ff731674f3f 48888->48889 48890 7ff731674f4b free 48888->48890 48891 7ff731674f58 48888->48891 48889->48885 48893 7ff73169efc0 8 API calls 48889->48893 48889->48898 48890->48891 49118 7ff7316796f0 15 API calls 48891->49118 48896 7ff73167501c 48893->48896 48894 7ff73167509c 49119 7ff7316762b0 19 API calls 48894->49119 48896->48885 48896->48898 48899 7ff731675028 free 48896->48899 48897 7ff7316750ae 48897->48898 48898->48774 48898->48775 48898->48855 48899->48885 48900->48894 48900->48898 48901 7ff7316750d4 48900->48901 48902 7ff73169efc0 8 API calls 48901->48902 48903 7ff7316750fb 48902->48903 48904 7ff731675122 48903->48904 48905 7ff731675105 _strdup 48903->48905 48904->48898 48906 7ff73169efc0 8 API calls 48904->48906 48905->48898 48905->48904 48907 7ff731675145 48906->48907 48908 7ff73167514f _strdup 48907->48908 48909 7ff731675168 48907->48909 48908->48898 48908->48909 48909->48898 48910 7ff73169efc0 8 API calls 48909->48910 48911 7ff731675188 48910->48911 48912 7ff73167521d 48911->48912 48913 7ff731675192 _strdup 48911->48913 48912->48898 48914 7ff73169efc0 8 API calls 48912->48914 48913->48898 48913->48912 48915 7ff731675238 48914->48915 48915->48898 48916 7ff73169efc0 8 API calls 48915->48916 48917 7ff73167526d 48916->48917 48917->48898 48918 7ff73169efc0 8 API calls 48917->48918 48919 7ff7316752b1 48918->48919 48920 7ff7316752b5 48919->48920 48921 7ff7316752d1 strtoul 48919->48921 48920->48898 48922 7ff73169efc0 8 API calls 48920->48922 48921->48920 48924 7ff731675310 48922->48924 48923 7ff73167534d _strdup 48923->48898 48924->48923 48924->48924 49120 7ff731675f80 20 API calls 48924->49120 48927 7ff731673d8d 48926->48927 48928 7ff731673cbd memset memset 48926->48928 48929 7ff731673d99 _strdup 48927->48929 48930 7ff731673dc0 48927->48930 48931 7ff731673d08 48928->48931 48932 7ff731673cf0 strncpy 48928->48932 48929->48930 48935 7ff731673da7 48929->48935 48936 7ff731673dcc _strdup 48930->48936 48937 7ff731673ddf 48930->48937 48933 7ff731673d14 strncpy 48931->48933 48934 7ff731673d2f 48931->48934 48932->48931 48933->48934 49121 7ff73168c9c0 malloc strtoul free 48934->49121 49123 7ff7316762b0 19 API calls 48935->49123 48936->48935 48936->48937 48960 7ff731673e3e 48937->48960 49124 7ff73168c880 realloc GetEnvironmentVariableA realloc free 48937->49124 48941 7ff731673d4f 48944 7ff731673d7c 48941->48944 49122 7ff73168c9c0 malloc strtoul free 48941->49122 48942 7ff731673db6 48945 7ff7316742e7 free free 48942->48945 48943 7ff731673e00 48946 7ff731673e1c 48943->48946 49125 7ff73168c880 realloc GetEnvironmentVariableA realloc free 48943->49125 48944->48927 48944->48945 48949 7ff7316aff40 8 API calls 48945->48949 48953 7ff731676430 15 API calls 48946->48953 48946->48960 48948 7ff7316740a1 free 48950 7ff7316740de 48948->48950 48951 7ff7316740b1 48948->48951 48954 7ff731673357 48949->48954 48956 7ff731674108 48950->48956 48961 7ff7316740f8 free 48950->48961 48951->48950 48955 7ff7316740d2 free 48951->48955 48953->48960 48954->48781 48954->48782 48954->48855 48955->48950 48962 7ff73167410d 48956->48962 49130 7ff731674b80 47 API calls 48956->49130 48957 7ff731673fe9 49126 7ff73168c880 realloc GetEnvironmentVariableA realloc free 48957->49126 48958 7ff731673f96 48958->48948 48958->48957 48963 7ff731673fd0 tolower 48958->48963 48959 7ff731674124 free free free 48970 7ff731674117 48959->48970 48960->48958 48960->48959 48960->48960 48967 7ff731673eae strchr 48960->48967 48968 7ff731673ec7 48960->48968 48961->48956 48962->48970 48972 7ff7316741c1 48962->48972 49131 7ff731674b80 47 API calls 48962->49131 48963->48957 48963->48963 48966 7ff73167416f free 48966->48962 48966->48970 48967->48958 48967->48968 48968->48958 48968->48959 48968->48968 48978 7ff731673ef0 strchr 48968->48978 48981 7ff731673f20 strchr 48968->48981 48970->48945 48971 7ff7316741a3 free 48971->48970 48971->48972 48972->48970 48983 7ff731674237 free 48972->48983 48974 7ff731676430 15 API calls 48975 7ff73167409c 48974->48975 48975->48948 48976 7ff731674010 48984 7ff73167404c 48976->48984 49127 7ff73168c880 realloc GetEnvironmentVariableA realloc free 48976->49127 48977 7ff731674068 48982 7ff73167407f 48977->48982 49129 7ff73168c880 realloc GetEnvironmentVariableA realloc free 48977->49129 48978->48968 48981->48968 48982->48974 48982->48975 48983->48970 48984->48982 49128 7ff73168c880 realloc GetEnvironmentVariableA realloc free 48984->49128 48986 7ff731674524 48985->48986 48987 7ff7316744f1 48985->48987 48988 7ff731674539 free _strdup 48986->48988 48989 7ff73167455b 48986->48989 48987->48986 48990 7ff731674504 free 48987->48990 48991 7ff731674510 48987->48991 48988->48989 48998 7ff731674658 48988->48998 48992 7ff731674591 48989->48992 48993 7ff73167456f free _strdup 48989->48993 48990->48991 48991->48986 48995 7ff731674518 free 48991->48995 48994 7ff7316745a5 free _strdup 48992->48994 48996 7ff7316745cf 48992->48996 48993->48992 48993->48998 48994->48996 48994->48998 48995->48986 48996->48998 49132 7ff7316a0d70 36 API calls 48996->49132 48998->48783 48999 7ff73167463e 48999->48998 49000 7ff731676430 15 API calls 48999->49000 49000->48998 49008 7ff731674960 49001->49008 49003 7ff731674a38 strchr 49004 7ff731674a4d strtol 49003->49004 49003->49008 49004->49008 49006 7ff731673497 49006->48855 49011 7ff731672000 49006->49011 49007 7ff731674ada free 49007->49008 49008->49003 49008->49006 49008->49007 49009 7ff731676430 15 API calls 49008->49009 49010 7ff731674a07 free 49008->49010 49133 7ff7316796f0 15 API calls 49008->49133 49134 7ff731674730 22 API calls 49008->49134 49009->49008 49010->49007 49010->49008 49012 7ff73167204f 49011->49012 49013 7ff731672035 49011->49013 49014 7ff7316aff40 8 API calls 49012->49014 49013->49012 49135 7ff7316a0cc0 18 API calls 49013->49135 49015 7ff731672061 49014->49015 49015->48792 49015->48793 49015->48855 49017 7ff731672088 49017->49012 49018 7ff73167209b GetLastError 49017->49018 49136 7ff731662f80 21 API calls 49018->49136 49020 7ff7316720b3 49137 7ff7316762b0 19 API calls 49020->49137 49022 7ff7316720c9 49022->49012 49024 7ff73166f845 49023->49024 49025 7ff73166f826 _strdup 49023->49025 49027 7ff73166f871 49024->49027 49028 7ff73166f852 _strdup 49024->49028 49025->49024 49026 7ff73166f835 49025->49026 49026->48800 49030 7ff73166f89d 49027->49030 49031 7ff73166f87e _strdup 49027->49031 49028->49027 49029 7ff73166f861 49028->49029 49029->48800 49033 7ff73166f8c9 49030->49033 49034 7ff73166f8aa _strdup 49030->49034 49031->49030 49032 7ff73166f88d 49031->49032 49032->48800 49036 7ff73166f8f5 49033->49036 49037 7ff73166f8d6 _strdup 49033->49037 49034->49033 49035 7ff73166f8b9 49034->49035 49035->48800 49039 7ff73166f921 49036->49039 49040 7ff73166f902 _strdup 49036->49040 49037->49036 49038 7ff73166f8e5 49037->49038 49038->48800 49042 7ff73166f94d 49039->49042 49043 7ff73166f92e _strdup 49039->49043 49040->49039 49041 7ff73166f911 49040->49041 49041->48800 49045 7ff73166f95a _strdup 49042->49045 49046 7ff73166f969 49042->49046 49043->49042 49044 7ff73166f93d 49043->49044 49044->48800 49045->49046 49046->48800 49048 7ff73167e0f0 2 API calls 49047->49048 49057 7ff7316753a3 49048->49057 49049 7ff731673877 49049->48812 49105 7ff731670f40 15 API calls 49049->49105 49051 7ff73167ee60 9 API calls 49051->49057 49052 7ff7316a1650 8 API calls 49052->49057 49054 7ff731676430 15 API calls 49054->49057 49056 7ff731676f10 closesocket free 49056->49057 49057->49049 49057->49051 49057->49052 49057->49054 49057->49056 49058 7ff731675516 30 API calls 49057->49058 49138 7ff73167f820 free free free free 49057->49138 49139 7ff7316a1260 49057->49139 49142 7ff73166b540 49057->49142 49156 7ff7316731e0 free free 49058->49156 49060 7ff731675776 49061 7ff731675784 free 49060->49061 49157 7ff73166f990 8 API calls 49061->49157 49063 7ff7316757a4 49158 7ff73166f990 8 API calls 49063->49158 49065 7ff7316757b0 free free free 49065->49057 49067 7ff7316720de 49066->49067 49068 7ff73167e0f0 2 API calls 49067->49068 49103->48808 49104->48804 49105->48815 49106->48824 49107->48827 49108->48832 49109->48855 49110->48843 49111->48845 49113 7ff73169ee50 13 API calls 49112->49113 49114 7ff731674ee4 49113->49114 49114->48879 49114->48880 49115->48883 49117->48888 49118->48889 49119->48897 49120->48923 49121->48941 49122->48944 49123->48942 49124->48943 49125->48946 49126->48976 49127->48984 49128->48977 49129->48982 49130->48966 49131->48971 49132->48999 49133->49008 49134->49008 49135->49017 49136->49020 49137->49022 49138->49057 49159 7ff7316a5180 7 API calls 49139->49159 49141 7ff7316a127e 49143 7ff73166b9b0 49142->49143 49144 7ff73166b9c8 EnterCriticalSection LeaveCriticalSection 49143->49144 49145 7ff73166ba54 free 49143->49145 49146 7ff73166ba0b 49144->49146 49147 7ff73166ba01 CloseHandle 49144->49147 49145->49057 49149 7ff73166ba19 49146->49149 49150 7ff73166ba11 49146->49150 49148 7ff73166ba2c 49147->49148 49151 7ff73166ba41 closesocket 49148->49151 49162 7ff731666440 free 49148->49162 49161 7ff73166ba70 7 API calls 49149->49161 49160 7ff7316896e0 WaitForSingleObjectEx CloseHandle 49150->49160 49151->49145 49155 7ff73166ba22 free 49155->49148 49156->49060 49157->49063 49158->49065 49159->49141 49160->49149 49161->49155 49162->49151 49168 7ff731689b20 49171 7ff7316a2dc0 49168->49171 49172 7ff7316a2dce 49171->49172 49178 7ff731689b29 49171->49178 49173 7ff731679140 14 API calls 49172->49173 49174 7ff7316a2de1 49173->49174 49179 7ff731678fa0 GetModuleHandleA 49174->49179 49176 7ff7316a2dfa 49177 7ff7316a2e06 GetProcAddressForCaller 49176->49177 49176->49178 49177->49178 49180 7ff731678fca GetProcAddress strpbrk 49179->49180 49181 7ff731678fc2 49179->49181 49182 7ff73167902e 49180->49182 49183 7ff731678ff7 49180->49183 49181->49176 49184 7ff731679066 GetSystemDirectoryA 49182->49184 49185 7ff731679033 GetProcAddress 49182->49185 49186 7ff731679018 LoadLibraryA 49183->49186 49187 7ff731678fff 49183->49187 49189 7ff731679128 49184->49189 49190 7ff731679080 malloc 49184->49190 49185->49184 49188 7ff731679048 LoadLibraryExA 49185->49188 49186->49176 49187->49176 49188->49176 49189->49176 49192 7ff7316790ad GetSystemDirectoryA 49190->49192 49193 7ff73167911a free 49190->49193 49192->49193 49194 7ff7316790bd 49192->49194 49193->49189 49195 7ff731679106 49194->49195 49196 7ff731679111 LoadLibraryA 49194->49196 49195->49193 49196->49195 49197 7ff7316680bb 49198 7ff7316680ce 49197->49198 49199 7ff731668187 49198->49199 49201 7ff73167c010 407 API calls 49198->49201 49202 7ff7316680d6 49198->49202 49200 7ff731668113 49199->49200 49199->49202 49204 7ff731667640 292 API calls 49200->49204 49205 7ff73166810d 49201->49205 49206 7ff731667bbb 49202->49206 49239 7ff73167bec0 free 49202->49239 49204->49206 49205->49199 49205->49200 49205->49202 49220 7ff731681c10 49205->49220 49208 7ff731668c62 49206->49208 49209 7ff731668c53 49206->49209 49210 7ff731668de0 17 API calls 49206->49210 49213 7ff731671d70 90 API calls 49206->49213 49214 7ff731677b30 10 API calls 49206->49214 49215 7ff731667c5e 49206->49215 49218 7ff731667640 292 API calls 49206->49218 49238 7ff7316762b0 19 API calls 49206->49238 49240 7ff731666360 15 API calls 49206->49240 49241 7ff731685b20 22 API calls 49206->49241 49242 7ff7316762b0 19 API calls 49209->49242 49210->49206 49213->49206 49214->49206 49215->49206 49217 7ff7316762b0 19 API calls 49215->49217 49217->49215 49218->49206 49221 7ff731681c3c 49220->49221 49222 7ff73167c010 407 API calls 49221->49222 49225 7ff731681c46 49222->49225 49223 7ff7316aff40 8 API calls 49224 7ff731681da2 49223->49224 49224->49199 49226 7ff731681d5c 49225->49226 49227 7ff731681c97 49225->49227 49230 7ff731681d76 49225->49230 49228 7ff7316704b0 255 API calls 49226->49228 49226->49230 49229 7ff7316797c0 13 API calls 49227->49229 49228->49230 49231 7ff731681d08 calloc 49229->49231 49230->49223 49232 7ff731681d27 49231->49232 49233 7ff731681d20 49231->49233 49234 7ff7316822a0 25 API calls 49232->49234 49233->49230 49235 7ff731681d36 49234->49235 49235->49230 49236 7ff731682050 62 API calls 49235->49236 49237 7ff731681d58 49236->49237 49237->49226 49237->49230 49238->49206 49239->49206 49240->49206 49241->49206 49242->49208 49243 7ff7316897a0 49244 7ff7316897b5 49243->49244 49245 7ff731670d10 49243->49245 49248 7ff7316897f0 49245->49248 49249 7ff73168983c 49248->49249 49250 7ff731676430 15 API calls 49249->49250 49252 7ff731689880 49250->49252 49251 7ff7316899f5 49255 7ff731689a0f free 49251->49255 49259 7ff731689a32 49251->49259 49252->49251 49256 7ff7316898e4 49252->49256 49267 7ff731689907 49252->49267 49253 7ff731689ac0 49257 7ff73168990c 49253->49257 49258 7ff731689ac9 free 49253->49258 49254 7ff731689a87 free 49254->49253 49255->49259 49271 7ff731662650 22 API calls 49256->49271 49263 7ff7316aff40 8 API calls 49257->49263 49258->49257 49261 7ff731689a65 49259->49261 49266 7ff731689a5c free 49259->49266 49261->49253 49261->49254 49262 7ff7316898f5 49272 7ff7316762b0 19 API calls 49262->49272 49265 7ff731670d2c 49263->49265 49266->49261 49267->49251 49267->49257 49268 7ff731676b70 48 API calls 49267->49268 49269 7ff7316899b4 49268->49269 49269->49251 49270 7ff731676430 15 API calls 49269->49270 49270->49251 49271->49262 49272->49267 49273 7ff73168a945 49274 7ff73168a949 49273->49274 49284 7ff73168aa17 49274->49284 49302 7ff73168a9d0 strtol 49274->49302 49309 7ff73168a9f2 strchr 49274->49309 49328 7ff73168aa77 49274->49328 49379 7ff731689d70 62 API calls 49274->49379 49275 7ff73168aed5 calloc 49277 7ff73168af78 49275->49277 49278 7ff73168aefc 49275->49278 49276 7ff73168aa36 strchr 49279 7ff73168aa4f strncmp 49276->49279 49280 7ff73168ab9b 49276->49280 49290 7ff73168afd4 CertFreeCertificateContext 49277->49290 49291 7ff73168afda 49277->49291 49385 7ff7316762b0 19 API calls 49278->49385 49282 7ff73168aa90 strncmp 49279->49282 49283 7ff73168aa6c 49279->49283 49285 7ff73168af5b 49280->49285 49286 7ff73168acae fopen 49280->49286 49282->49283 49289 7ff73168aab2 strncmp 49282->49289 49288 7ff73168ab69 strchr 49283->49288 49284->49275 49284->49276 49387 7ff7316762b0 19 API calls 49285->49387 49286->49285 49292 7ff73168acc7 fseek 49286->49292 49287 7ff73168af0b 49293 7ff73168af19 CertFreeCertificateContext 49287->49293 49377 7ff73168b196 49287->49377 49288->49280 49294 7ff73168ab83 _strdup 49288->49294 49289->49283 49296 7ff73168aad4 strncmp 49289->49296 49290->49291 49297 7ff73168b043 49291->49297 49298 7ff73168afde 49291->49298 49299 7ff73168acf1 ftell 49292->49299 49300 7ff73168acfd 49292->49300 49293->49377 49294->49280 49301 7ff73168aba3 49294->49301 49296->49283 49303 7ff73168aaf3 strncmp 49296->49303 49311 7ff731688240 13 API calls 49297->49311 49388 7ff731662650 22 API calls 49298->49388 49299->49300 49307 7ff73168af29 fclose 49300->49307 49308 7ff73168ad0e fseek 49300->49308 49301->49280 49322 7ff73168abc4 CertOpenStore 49301->49322 49302->49274 49302->49309 49303->49288 49304 7ff73168ab0a strncmp 49303->49304 49304->49283 49310 7ff73168ab29 strncmp 49304->49310 49305 7ff7316aff40 8 API calls 49312 7ff73168b34c 49305->49312 49386 7ff7316762b0 19 API calls 49307->49386 49308->49307 49315 7ff73168ad2b malloc 49308->49315 49309->49274 49309->49284 49310->49283 49317 7ff73168ab48 strncmp 49310->49317 49318 7ff73168b05c 49311->49318 49313 7ff73168aff2 49389 7ff7316762b0 19 API calls 49313->49389 49315->49307 49321 7ff73168ad44 fread 49315->49321 49317->49280 49317->49283 49323 7ff73168b06f 49318->49323 49331 7ff731688240 13 API calls 49318->49331 49320 7ff73168af48 free 49320->49377 49321->49307 49325 7ff73168ad62 fclose 49321->49325 49326 7ff73168ac17 free CryptStringToBinaryA 49322->49326 49327 7ff73168abe7 GetLastError 49322->49327 49333 7ff731676430 15 API calls 49323->49333 49342 7ff73168b082 49323->49342 49324 7ff73168b004 free 49375 7ff73168aa86 49324->49375 49324->49377 49334 7ff73168ad8f malloc 49325->49334 49335 7ff73168ad7f 49325->49335 49329 7ff73168aea1 CertCloseStore 49326->49329 49330 7ff73168ac62 CertFindCertificateInStore 49326->49330 49381 7ff7316762b0 19 API calls 49327->49381 49380 7ff7316762b0 19 API calls 49328->49380 49329->49377 49340 7ff73168ac94 49330->49340 49341 7ff73168aeba CertCloseStore 49330->49341 49331->49323 49333->49342 49338 7ff73168ada9 MultiByteToWideChar 49334->49338 49339 7ff73168add3 PFXImportCertStore free free 49334->49339 49335->49334 49337 7ff73168ac06 free 49337->49377 49338->49339 49348 7ff73168ae04 GetLastError 49339->49348 49349 7ff73168ae5a CertFindCertificateInStore 49339->49349 49340->49329 49341->49275 49345 7ff731676430 15 API calls 49342->49345 49350 7ff73168b0cb 49342->49350 49343 7ff73168b12d calloc 49346 7ff73168b1a0 49343->49346 49347 7ff73168b187 49343->49347 49345->49350 49359 7ff73168b209 free 49346->49359 49360 7ff73168b2ac 49346->49360 49346->49377 49390 7ff7316762b0 19 API calls 49347->49390 49352 7ff73168ae41 49348->49352 49353 7ff73168ae19 49348->49353 49354 7ff73168ae82 GetLastError 49349->49354 49355 7ff73168aeb6 49349->49355 49350->49343 49383 7ff7316762b0 19 API calls 49352->49383 49382 7ff7316762b0 19 API calls 49353->49382 49384 7ff7316762b0 19 API calls 49354->49384 49355->49341 49361 7ff73168b286 49359->49361 49362 7ff73168b23a 49359->49362 49363 7ff731676b70 48 API calls 49360->49363 49395 7ff731662650 22 API calls 49361->49395 49365 7ff73168b260 49362->49365 49366 7ff73168b242 49362->49366 49367 7ff73168b2cd 49363->49367 49393 7ff731662650 22 API calls 49365->49393 49391 7ff731662650 22 API calls 49366->49391 49367->49377 49397 7ff7316762b0 19 API calls 49367->49397 49369 7ff73168b290 49396 7ff7316762b0 19 API calls 49369->49396 49371 7ff73168b26a 49394 7ff7316762b0 19 API calls 49371->49394 49373 7ff73168b249 49392 7ff7316762b0 19 API calls 49373->49392 49375->49377 49377->49305 49379->49274 49380->49375 49381->49337 49382->49375 49383->49375 49384->49329 49385->49287 49386->49320 49387->49375 49388->49313 49389->49324 49390->49377 49391->49373 49392->49375 49393->49371 49394->49375 49395->49369 49396->49375 49397->49377 49398 7ff731668738 49399 7ff731668751 49398->49399 49400 7ff7316687df 49399->49400 49403 7ff7316689b4 49399->49403 49439 7ff73167ce50 49400->49439 49483 7ff731666130 17 API calls 49403->49483 49406 7ff731668804 49407 7ff7316688a0 49406->49407 49410 7ff73166880e 49406->49410 49412 7ff731668835 49406->49412 49408 7ff731668951 49407->49408 49411 7ff7316688a8 49407->49411 49416 7ff731667bbb 49408->49416 49482 7ff731666130 17 API calls 49408->49482 49413 7ff731667640 292 API calls 49410->49413 49411->49412 49417 7ff7316688be 49411->49417 49418 7ff73166892b free 49411->49418 49419 7ff731667640 292 API calls 49412->49419 49413->49416 49415 7ff731668c62 49416->49415 49421 7ff731668c53 49416->49421 49424 7ff731668de0 17 API calls 49416->49424 49431 7ff731671d70 90 API calls 49416->49431 49433 7ff731677b30 10 API calls 49416->49433 49435 7ff731667c5e 49416->49435 49438 7ff731667640 292 API calls 49416->49438 49478 7ff7316762b0 19 API calls 49416->49478 49484 7ff731666360 15 API calls 49416->49484 49485 7ff731685b20 22 API calls 49416->49485 49417->49416 49422 7ff7316688cb free 49417->49422 49418->49412 49420 7ff731668853 49419->49420 49480 7ff73167c710 28 API calls 49420->49480 49486 7ff7316762b0 19 API calls 49421->49486 49481 7ff73167c710 28 API calls 49422->49481 49424->49416 49427 7ff7316688f3 free 49427->49416 49430 7ff731668909 49427->49430 49429 7ff731668884 free 49429->49416 49434 7ff731667640 292 API calls 49430->49434 49431->49416 49432 7ff731668862 49432->49429 49433->49416 49434->49416 49435->49416 49437 7ff7316762b0 19 API calls 49435->49437 49437->49435 49438->49416 49440 7ff73167cea1 49439->49440 49441 7ff73167ceef 49440->49441 49442 7ff731686920 19 API calls 49440->49442 49443 7ff73167cf0d 49441->49443 49444 7ff73167cef6 49441->49444 49442->49441 49446 7ff73167cf39 49443->49446 49487 7ff73167d560 49443->49487 49520 7ff7316762b0 19 API calls 49444->49520 49447 7ff73167cf6e 49446->49447 49448 7ff73167cf56 49446->49448 49452 7ff7316687f3 49446->49452 49451 7ff73167e0f0 2 API calls 49447->49451 49521 7ff73167dcb0 90 API calls 49448->49521 49449 7ff73167cf05 49449->49452 49460 7ff73167cf78 49451->49460 49452->49406 49479 7ff73167d150 24 API calls 49452->49479 49454 7ff73167cf66 49454->49447 49454->49452 49455 7ff73167cfe8 49522 7ff731685b20 22 API calls 49455->49522 49457 7ff73167cff0 49457->49452 49523 7ff731686c90 23 API calls 49457->49523 49459 7ff73167d00e 49459->49452 49462 7ff73167d022 49459->49462 49468 7ff73167d0a2 49459->49468 49460->49455 49461 7ff731676430 15 API calls 49460->49461 49461->49455 49464 7ff731677b30 10 API calls 49462->49464 49463 7ff73167d109 49528 7ff731685b20 22 API calls 49463->49528 49467 7ff73167d031 49464->49467 49466 7ff73167d0e0 49466->49463 49471 7ff73167d0f3 49466->49471 49467->49452 49469 7ff73167d03a 49467->49469 49468->49463 49468->49466 49470 7ff73167d0c7 49468->49470 49474 7ff73167d08c 49469->49474 49475 7ff73167d071 49469->49475 49526 7ff7316762b0 19 API calls 49470->49526 49527 7ff7316762b0 19 API calls 49471->49527 49525 7ff7316762b0 19 API calls 49474->49525 49524 7ff7316762b0 19 API calls 49475->49524 49478->49416 49479->49406 49480->49432 49481->49427 49482->49416 49483->49416 49484->49416 49485->49416 49486->49415 49515 7ff73167d5b0 49487->49515 49489 7ff7316859d0 2 API calls 49489->49515 49490 7ff73167daea 49493 7ff731676430 15 API calls 49490->49493 49512 7ff73167db03 49490->49512 49491 7ff73167e0f0 2 API calls 49491->49515 49493->49512 49494 7ff73167dac7 49494->49490 49496 7ff731676430 15 API calls 49494->49496 49495 7ff73167d840 49495->49515 49533 7ff7316761f0 fwrite fwrite 49495->49533 49534 7ff7316761f0 fwrite fwrite 49495->49534 49496->49490 49500 7ff73167db81 49501 7ff73167db9d 49500->49501 49502 7ff73167db86 49500->49502 49539 7ff7316762b0 19 API calls 49501->49539 49538 7ff7316762b0 19 API calls 49502->49538 49503 7ff73167daef 49506 7ff73167daf7 49503->49506 49507 7ff73167db23 49503->49507 49505 7ff731676430 15 API calls 49505->49515 49509 7ff731676430 15 API calls 49506->49509 49537 7ff7316762b0 19 API calls 49507->49537 49508 7ff73167db2f 49508->49512 49509->49512 49512->49446 49513 7ff73167d81c 49514 7ff731676430 15 API calls 49513->49514 49516 7ff73167db48 49514->49516 49515->49489 49515->49490 49515->49491 49515->49494 49515->49495 49515->49500 49515->49503 49515->49505 49515->49512 49515->49513 49517 7ff7316761d0 23 API calls 49515->49517 49529 7ff7316765a0 49515->49529 49532 7ff7316831d0 192 API calls 49515->49532 49535 7ff7316a2ed0 23 API calls 49515->49535 49536 7ff73168f9f0 23 API calls 49515->49536 49519 7ff731676430 15 API calls 49516->49519 49517->49515 49519->49512 49520->49449 49521->49454 49522->49457 49523->49459 49524->49449 49525->49449 49526->49449 49527->49449 49528->49452 49540 7ff73168bf00 49529->49540 49532->49515 49533->49495 49534->49515 49535->49515 49536->49515 49537->49508 49538->49508 49539->49508 49541 7ff73168bf7f 49540->49541 49542 7ff73168bf9e 49540->49542 49541->49542 49545 7ff73168bf85 49541->49545 49543 7ff73168bfc2 49542->49543 49544 7ff73168bfa5 49542->49544 49547 7ff73168bfc8 49543->49547 49552 7ff73168bfe1 49543->49552 49546 7ff731676430 15 API calls 49544->49546 49548 7ff731676430 15 API calls 49545->49548 49553 7ff73168bf94 49546->49553 49549 7ff731676430 15 API calls 49547->49549 49548->49553 49549->49553 49550 7ff73168c436 49557 7ff73168c535 memcpy memcpy 49550->49557 49561 7ff73168c57b 49550->49561 49551 7ff73168c010 realloc 49554 7ff73168c05e 49551->49554 49555 7ff73168c03d 49551->49555 49552->49551 49552->49554 49574 7ff73168c0d9 49552->49574 49553->49550 49560 7ff731679140 14 API calls 49553->49560 49556 7ff731676630 2 API calls 49554->49556 49586 7ff7316762b0 19 API calls 49555->49586 49559 7ff73168c0a7 49556->49559 49557->49561 49567 7ff73168c0cd 49559->49567 49568 7ff73168c29e 49559->49568 49559->49574 49563 7ff73168c426 49560->49563 49564 7ff7316aff40 8 API calls 49561->49564 49562 7ff73168c054 49562->49553 49563->49550 49569 7ff731676430 15 API calls 49563->49569 49566 7ff7316765fb 49564->49566 49565 7ff731676430 15 API calls 49565->49574 49566->49515 49571 7ff731676430 15 API calls 49567->49571 49570 7ff731676430 15 API calls 49568->49570 49569->49550 49570->49574 49571->49574 49572 7ff731676430 15 API calls 49572->49553 49573 7ff73168a3c0 255 API calls 49573->49574 49574->49553 49574->49565 49574->49573 49575 7ff73168c3be 49574->49575 49576 7ff73168c447 49574->49576 49577 7ff73168c1e0 realloc 49574->49577 49581 7ff73168c22b memcpy 49574->49581 49583 7ff73168c27b memcpy 49574->49583 49575->49553 49575->49572 49576->49575 49579 7ff73168c476 49576->49579 49577->49574 49578 7ff73168c4a6 49577->49578 49588 7ff7316762b0 19 API calls 49578->49588 49587 7ff731662650 22 API calls 49579->49587 49581->49574 49583->49574 49584 7ff73168c48f 49585 7ff731676430 15 API calls 49584->49585 49585->49553 49586->49562 49587->49584 49588->49562 49589 7ff73167f520 49590 7ff73167f56e 49589->49590 49591 7ff73167f890 18 API calls 49590->49591 49592 7ff73167f58b 49591->49592 49593 7ff731676430 15 API calls 49592->49593 49596 7ff73167f5a7 49592->49596 49593->49596 49594 7ff731688240 13 API calls 49597 7ff73167f626 49594->49597 49595 7ff7316aff40 8 API calls 49598 7ff73167f722 49595->49598 49596->49594 49622 7ff73167f6f5 49596->49622 49599 7ff73167f64b 49597->49599 49600 7ff73167f62a 49597->49600 49602 7ff731688240 13 API calls 49599->49602 49623 7ff7316891f0 15 API calls 49600->49623 49604 7ff73167f65d 49602->49604 49603 7ff73167f63f 49603->49599 49605 7ff73167f73a 49603->49605 49606 7ff73167f661 49604->49606 49612 7ff73167f682 49604->49612 49607 7ff73167f744 49605->49607 49624 7ff7316891f0 15 API calls 49606->49624 49628 7ff73167eaa0 27 API calls 49607->49628 49610 7ff73167f676 49610->49605 49610->49612 49611 7ff73167f766 49617 7ff73167f6ee 49611->49617 49629 7ff731688fc0 free free free 49611->49629 49614 7ff73167f6b3 49612->49614 49612->49622 49625 7ff7316a32f0 534 API calls 49612->49625 49614->49605 49616 7ff73167f6d0 49614->49616 49618 7ff73167f6e9 49616->49618 49619 7ff73167f6f0 49616->49619 49616->49622 49617->49622 49626 7ff7316a34f0 314 API calls 49618->49626 49627 7ff73166b740 51 API calls 49619->49627 49622->49595 49623->49603 49624->49610 49625->49614 49626->49617 49627->49622 49628->49611 49629->49617 49630 7ff7316b021c 49631 7ff7316b0235 49630->49631 49632 7ff7316b0373 49631->49632 49633 7ff7316b023d __scrt_acquire_startup_lock 49631->49633 49712 7ff7316b06ac 9 API calls 49632->49712 49635 7ff7316b037d 49633->49635 49641 7ff7316b025b __scrt_release_startup_lock 49633->49641 49713 7ff7316b06ac 9 API calls 49635->49713 49637 7ff7316b0388 49639 7ff7316b0390 _exit 49637->49639 49638 7ff7316b0280 49640 7ff7316b0306 _get_initial_narrow_environment __p___argv __p___argc 49650 7ff731661e70 49640->49650 49641->49638 49641->49640 49644 7ff7316b02fe _register_thread_local_exe_atexit_callback 49641->49644 49644->49640 49714 7ff7316afb48 49650->49714 49654 7ff731661ee8 49656 7ff73166238e ?_Throw_Cpp_error@std@@YAXH 49654->49656 49657 7ff731661ef3 _Thrd_detach 49654->49657 49655 7ff731662399 ?_Throw_Cpp_error@std@@YAXH 49656->49655 49657->49656 49658 7ff731661f10 16 API calls 49657->49658 49723 7ff731652ae0 49658->49723 49712->49635 49713->49637 49715 7ff7316afb62 malloc 49714->49715 49716 7ff731661e9f _beginthreadex 49715->49716 49718 7ff7316afb53 49715->49718 49716->49654 49716->49655 49717 7ff7316afb72 49719 7ff7316afb7d 49717->49719 49812 7ff7316b0670 _CxxThrowException std::bad_alloc::bad_alloc 49717->49812 49718->49715 49718->49717 49813 7ff731651a30 49719->49813 49722 7ff7316afb83 49816 7ff731652880 49723->49816 49725 7ff731652b2a 49726 7ff7316530e8 49725->49726 49829 7ff7316531a0 49725->49829 49945 7ff731653160 7 API calls 49726->49945 49728 7ff731653144 Sleep exit 49730 7ff731653158 49728->49730 49733 7ff731651a30 Concurrency::cancel_current_task __std_exception_copy 49730->49733 49731 7ff731652baf 49841 7ff731653c70 49731->49841 49735 7ff73165315d 49733->49735 49734 7ff731652bbc 49848 7ff731653310 49734->49848 49737 7ff731652bec 49738 7ff731653c70 10 API calls 49737->49738 49739 7ff731652bf8 49738->49739 49856 7ff731653410 49739->49856 49741 7ff731652c2b 49742 7ff731653c70 10 API calls 49741->49742 49743 7ff731652c38 49742->49743 49744 7ff731652c8f 49743->49744 49747 7ff731652c88 _invalid_parameter_noinfo_noreturn 49743->49747 49745 7ff731652cdf 49744->49745 49748 7ff731652cd8 _invalid_parameter_noinfo_noreturn 49744->49748 49746 7ff731652d1e 49745->49746 49750 7ff731652d17 _invalid_parameter_noinfo_noreturn 49745->49750 49749 7ff731652d6c 49746->49749 49752 7ff731652d65 _invalid_parameter_noinfo_noreturn 49746->49752 49747->49744 49748->49745 49753 7ff731652da4 _invalid_parameter_noinfo_noreturn 49749->49753 49757 7ff731652dab 49749->49757 49750->49746 49751 7ff731652df9 49864 7ff731653590 49751->49864 49752->49749 49753->49757 49754 7ff731652e5f 49755 7ff731652e4a memcpy 49754->49755 49758 7ff7316afb48 3 API calls 49754->49758 49755->49751 49757->49730 49757->49751 49757->49754 49761 7ff7316afb48 3 API calls 49757->49761 49758->49755 49763 7ff731652e42 49761->49763 49763->49755 49764 7ff731652e58 _invalid_parameter_noinfo_noreturn 49763->49764 49764->49754 49814 7ff731651a3e Concurrency::cancel_current_task 49813->49814 49815 7ff731651a4f __std_exception_copy 49814->49815 49815->49722 49817 7ff7316528d0 49816->49817 49817->49817 49818 7ff7316528e0 system 49817->49818 49819 7ff731652940 49818->49819 49819->49819 49820 7ff731652950 system 49819->49820 49821 7ff7316529a0 49820->49821 49821->49821 49822 7ff7316529b0 system 49821->49822 49823 7ff7316529f0 49822->49823 49823->49823 49824 7ff731652a00 system 49823->49824 49825 7ff731652a40 49824->49825 49825->49825 49826 7ff731652a50 system 49825->49826 49827 7ff731652ab0 49826->49827 49827->49827 49828 7ff731652ac0 system 49827->49828 49828->49725 49831 7ff7316531be 49829->49831 49830 7ff731653208 49833 7ff731653267 49830->49833 49834 7ff731654350 7 API calls 49830->49834 49831->49830 49832 7ff731654350 7 API calls 49831->49832 49832->49830 49946 7ff731655e10 49833->49946 49834->49833 49837 7ff7316532b6 49838 7ff7316532f7 49837->49838 49840 7ff7316532f0 _invalid_parameter_noinfo_noreturn 49837->49840 49838->49731 49839 7ff7316532af _invalid_parameter_noinfo_noreturn 49839->49837 49840->49838 49842 7ff731653c8d 49841->49842 49843 7ff731653ce8 49842->49843 49844 7ff731653ca3 memcpy 49842->49844 49972 7ff731654ef0 9 API calls Concurrency::cancel_current_task 49843->49972 49844->49734 49847 7ff731653cfb 49847->49734 49849 7ff73165332e 49848->49849 49850 7ff731653378 49849->49850 49851 7ff731654350 7 API calls 49849->49851 49973 7ff731656e10 49850->49973 49851->49850 49853 7ff731653394 49854 7ff7316533f7 49853->49854 49855 7ff7316533f0 _invalid_parameter_noinfo_noreturn 49853->49855 49854->49737 49855->49854 49858 7ff73165342e 49856->49858 49857 7ff731653478 49860 7ff731656e10 12 API calls 49857->49860 49858->49857 49859 7ff731654350 7 API calls 49858->49859 49859->49857 49861 7ff731653494 49860->49861 49862 7ff7316534f7 49861->49862 49863 7ff7316534f0 _invalid_parameter_noinfo_noreturn 49861->49863 49862->49741 49863->49862 49865 7ff731652880 6 API calls 49864->49865 49866 7ff7316535cc 49865->49866 49980 7ff731662410 49866->49980 49868 7ff7316535d1 49869 7ff7316535dd 49868->49869 49874 7ff731653672 49868->49874 49870 7ff731654350 7 API calls 49869->49870 49988 7ff7316624d0 49874->49988 49945->49728 49947 7ff731655e5a 49946->49947 49948 7ff731655eaf 49946->49948 49947->49948 49949 7ff731655e5f memcpy 49947->49949 49950 7ff731655eb7 memcpy 49948->49950 49958 7ff731655f0b 49948->49958 49954 7ff73165327a 49949->49954 49952 7ff731655ef4 memcpy 49950->49952 49953 7ff731655ef1 49950->49953 49951 7ff731655ff1 49971 7ff731651ad0 ?_Xlength_error@std@@YAXPEBD 49951->49971 49952->49954 49953->49952 49954->49837 49954->49839 49957 7ff731655f89 49962 7ff731655f74 memcpy 49957->49962 49966 7ff7316afb48 3 API calls 49957->49966 49958->49951 49958->49957 49960 7ff731655fec 49958->49960 49961 7ff731655f67 49958->49961 49964 7ff731651a30 Concurrency::cancel_current_task __std_exception_copy 49960->49964 49965 7ff7316afb48 3 API calls 49961->49965 49967 7ff731655fc3 memcpy 49962->49967 49968 7ff731655fc0 49962->49968 49964->49951 49969 7ff731655f6f 49965->49969 49966->49962 49967->49954 49968->49967 49969->49962 49970 7ff731655f82 _invalid_parameter_noinfo_noreturn 49969->49970 49970->49957 49972->49847 49974 7ff731656ed5 49973->49974 49977 7ff731656e40 memcpy memcpy memcpy 49973->49977 49979 7ff73165c640 9 API calls Concurrency::cancel_current_task 49974->49979 49976 7ff731656eea 49976->49853 49977->49853 49979->49976 49981 7ff73166241d calloc 49980->49981 49987 7ff731662480 49980->49987 49982 7ff731662472 49981->49982 49985 7ff7316624ac 49982->49985 50009 7ff7316792c0 49982->50009 49984 7ff7316624a1 49984->49868 49985->49868 49987->49985 50040 7ff7316721f0 calloc 49987->50040 50010 7ff7316792de WSAStartup 50009->50010 50011 7ff731679326 50009->50011 50013 7ff731679309 50010->50013 50014 7ff7316792f2 50010->50014 50012 7ff7316a2dc0 26 API calls 50011->50012 50014->50011 50041 7ff731672225 50040->50041 50042 7ff731672216 50040->50042 50059 7ff73166b710 calloc 50041->50059 50042->49984 50044 7ff731672248 50059->50044 50327 7ff73166bae0 50328 7ff7316797c0 13 API calls 50327->50328 50329 7ff73166bb1f 50328->50329 50346 7ff731689010 getaddrinfo 50329->50346 50332 7ff73166bb5d EnterCriticalSection 50336 7ff73166bb6c LeaveCriticalSection 50332->50336 50337 7ff73166bb88 50332->50337 50333 7ff73166bb3b WSAGetLastError 50334 7ff73166bb5a 50333->50334 50335 7ff73166bb45 WSAGetLastError 50333->50335 50334->50332 50335->50332 50364 7ff73166ba70 7 API calls 50336->50364 50339 7ff73166bbb6 LeaveCriticalSection 50337->50339 50340 7ff73166bb92 send 50337->50340 50341 7ff73166bbc6 50339->50341 50340->50339 50343 7ff73166bbad WSAGetLastError 50340->50343 50344 7ff7316aff40 8 API calls 50341->50344 50342 7ff73166bb7d free 50342->50341 50343->50339 50345 7ff73166bbd5 50344->50345 50348 7ff73166bb35 50346->50348 50349 7ff731689043 50346->50349 50347 7ff7316891b4 WSASetLastError 50347->50348 50348->50332 50348->50333 50349->50347 50350 7ff73168912e 50349->50350 50353 7ff731689099 malloc 50349->50353 50351 7ff731689171 freeaddrinfo 50350->50351 50352 7ff731689177 50350->50352 50351->50352 50354 7ff7316891af 50352->50354 50355 7ff73168917c 50352->50355 50356 7ff7316890b0 malloc 50353->50356 50357 7ff73168915c 50353->50357 50354->50347 50354->50348 50355->50348 50358 7ff731689181 free free free 50355->50358 50359 7ff7316890e7 memcpy 50356->50359 50360 7ff73168914b free 50356->50360 50357->50350 50358->50348 50358->50358 50361 7ff7316890ff _strdup 50359->50361 50362 7ff73168910e 50359->50362 50360->50350 50361->50362 50363 7ff731689130 free free 50361->50363 50362->50349 50363->50350 50364->50342
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$strchr$_strdup$callocmemcpystrstr
                                          • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                          • API String ID: 2045874074-4264080130
                                          • Opcode ID: df388712e8186f415a9c3d512b14d34def9028130db4415460419967b26806f6
                                          • Instruction ID: 6d435507c752b3a3359c3769fb40fd4d4d1013968a3049a3c941cc9b8bdc61ca
                                          • Opcode Fuzzy Hash: df388712e8186f415a9c3d512b14d34def9028130db4415460419967b26806f6
                                          • Instruction Fuzzy Hash: 8903D231E08BA2E5FB54EBA5D4103B9A7A2AF45B88F844435CE1D17B95DFBCE441E320

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 689 7ff731661e70-7ff731661ea2 call 7ff7316afb48 692 7ff731661ea4-7ff731661eae 689->692 693 7ff731661eb0 689->693 694 7ff731661eb3-7ff731661ee2 _beginthreadex 692->694 693->694 695 7ff731661ee8-7ff731661eed 694->695 696 7ff731662399-7ff7316623a7 ?_Throw_Cpp_error@std@@YAXH@Z 694->696 697 7ff73166238e-7ff731662398 ?_Throw_Cpp_error@std@@YAXH@Z 695->697 698 7ff731661ef3-7ff731661f0a _Thrd_detach 695->698 697->696 698->697 699 7ff731661f10-7ff731662260 GetStdHandle GetConsoleMode SetConsoleMode GetStdHandle GetConsoleScreenBufferInfoEx SetConsoleScreenBufferInfoEx GetConsoleMode SetConsoleMode GetConsoleWindow GetWindowLongA SetWindowLongA GetConsoleWindow GetWindowRect MoveWindow GetStdHandle SetConsoleTextAttribute call 7ff731652ae0 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 * 2 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 GetStdHandle SetConsoleTextAttribute call 7ff7316623b0 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 698->699 734 7ff7316622dd-7ff7316622e0 699->734 735 7ff731662262-7ff7316622dc call 7ff731653d70 * 2 call 7ff731653b50 * 2 URLDownloadToFileA system * 2 Sleep exit 699->735 737 7ff73166235d-7ff731662362 734->737 738 7ff7316622e2-7ff73166235c call 7ff731653d70 * 2 call 7ff731653b50 * 2 URLDownloadToFileA system * 2 Sleep exit 734->738 735->734 741 7ff73166236b-7ff73166238d call 7ff7316aff40 737->741 742 7ff731662364-7ff73166236a terminate 737->742 738->737 742->741
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Console$Handle$AttributeText$Window$Modesystem$BufferCpp_error@std@@DownloadFileInfoLongScreenSleepThrow_exit$??5?$basic_istream@D@std@@@std@@MoveRectThrd_detachU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintf_beginthreadexmallocterminate
                                          • String ID: Iniciar Valorant Aim (HVCI DESLIGADO): $ Iniciar Valorant Aim (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$C:\Windows\System32\config\SeiebingsHosDialog.exe$C:\Windows\System32\config\SerceubetisHostDialog.exe$[ Selecione uma opcao: ]$cd C:\$http://167.114.85.75/aimhvcioffbronkzatualizadoh97.exe$http://167.114.85.75/aimhvcionattprivatestore674.exe$start C:\Windows\System32\config\SeiebingsHosDialog.exe$start C:\Windows\System32\config\SerceubetisHostDialog.exe
                                          • API String ID: 3379756739-3340239426
                                          • Opcode ID: 5881214bdcecccd07407780c68f0ed9ff0d7f6a6fe0d88e462e8c414fdabbda1
                                          • Instruction ID: f9f0aa7c300a9b0b33ccc4e4099b222883173d95c7204868ce9f680e551cbe13
                                          • Opcode Fuzzy Hash: 5881214bdcecccd07407780c68f0ed9ff0d7f6a6fe0d88e462e8c414fdabbda1
                                          • Instruction Fuzzy Hash: 36D13721E08913E2EB04FBA1E814179B3A2FF88755F808639D51F466B5DFBCF545A3A0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupstrncmpstrtol
                                          • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                          • API String ID: 707411602-3372543188
                                          • Opcode ID: 3b907009211ff7cb2198ef5d328b79b85d72c5b5477c74e40b21cd7e234a9625
                                          • Instruction ID: c74b8ba80262b19c8f6604e224bd19788298ad31f2634c9650e5fef2841d9547
                                          • Opcode Fuzzy Hash: 3b907009211ff7cb2198ef5d328b79b85d72c5b5477c74e40b21cd7e234a9625
                                          • Instruction Fuzzy Hash: 0742C471E08B62E1EB64AF92D8502B9A3A6FF45784F805135CE5E07B90DFBCE544E720

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 939 7ff7316792c0-7ff7316792dc 940 7ff7316792de-7ff7316792f0 WSAStartup 939->940 941 7ff731679326-7ff73167932d call 7ff7316a2dc0 939->941 943 7ff731679309-7ff731679325 call 7ff7316aff40 940->943 944 7ff7316792f2-7ff7316792f9 940->944 950 7ff731679333-7ff731679360 GetModuleHandleA 941->950 951 7ff7316795ef-7ff731679606 call 7ff7316aff40 941->951 947 7ff7316792fb-7ff731679301 944->947 948 7ff731679303 WSACleanup 944->948 947->941 947->948 948->943 953 7ff73167936e-7ff7316793a3 GetProcAddress strpbrk 950->953 954 7ff731679362-7ff731679369 950->954 957 7ff7316793cb-7ff7316793ce 953->957 958 7ff7316793a5-7ff7316793ab 953->958 956 7ff7316794f3-7ff7316795e7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 954->956 956->951 959 7ff7316793fa-7ff731679411 GetSystemDirectoryA 957->959 960 7ff7316793d0-7ff7316793e3 GetProcAddress 957->960 961 7ff7316793bd-7ff7316793c6 LoadLibraryA 958->961 962 7ff7316793ad-7ff7316793b8 958->962 964 7ff731679417-7ff73167942a malloc 959->964 965 7ff7316794b2 959->965 960->959 963 7ff7316793e5-7ff7316793f5 LoadLibraryExA 960->963 966 7ff7316794ba-7ff7316794cc 961->966 962->966 963->966 967 7ff73167942c-7ff73167943a GetSystemDirectoryA 964->967 968 7ff7316794a9-7ff7316794ac free 964->968 965->966 966->956 969 7ff7316794ce-7ff7316794ec GetProcAddress 966->969 967->968 971 7ff73167943c-7ff731679446 967->971 968->965 969->956 972 7ff731679450-7ff731679459 971->972 972->972 973 7ff73167945b-7ff731679460 972->973 974 7ff731679464-7ff73167946b 973->974 974->974 975 7ff73167946d-7ff731679476 974->975 976 7ff731679480-7ff73167948c 975->976 976->976 977 7ff73167948e-7ff731679494 976->977 978 7ff731679496-7ff73167949e 977->978 979 7ff7316794a0 LoadLibraryA 977->979 980 7ff7316794a6 978->980 979->980 980->968
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                          • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                          • API String ID: 2612373469-2794540096
                                          • Opcode ID: eeb22dd33ee6f1824ceccbff02a487c861c0f39535903402c4be651aa8da3d3c
                                          • Instruction ID: 82f2ecfad4f15e1e920289d512aca022613e133ebd6d2a55d87e4050c2744094
                                          • Opcode Fuzzy Hash: eeb22dd33ee6f1824ceccbff02a487c861c0f39535903402c4be651aa8da3d3c
                                          • Instruction Fuzzy Hash: 9591A535E097A2D1EB20EB52E4043B9A3E2FF89B94F849135CA4E06754EFBCE045D720

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1236 7ff731678600-7ff73167866d 1237 7ff731678672-7ff731678682 1236->1237 1238 7ff73167866f 1236->1238 1239 7ff731678684-7ff73167868c 1237->1239 1240 7ff731678691-7ff7316786a9 memcpy 1237->1240 1238->1237 1239->1240 1241 7ff7316786ab-7ff7316786d6 call 7ff731666bd0 * 2 1240->1241 1242 7ff7316786d8-7ff7316786eb socket 1240->1242 1243 7ff7316786ee-7ff7316786fa 1241->1243 1242->1243 1245 7ff731678700-7ff731678708 1243->1245 1246 7ff731678b8f 1243->1246 1248 7ff73167870a-7ff731678712 call 7ff7316855d0 1245->1248 1249 7ff731678717-7ff731678720 1245->1249 1250 7ff731678b94-7ff731678bbd call 7ff7316aff40 1246->1250 1248->1249 1252 7ff731678722-7ff73167872d 1249->1252 1253 7ff731678730-7ff731678739 1249->1253 1252->1253 1256 7ff73167874c-7ff731678750 1253->1256 1257 7ff73167873b-7ff73167873e 1253->1257 1263 7ff731678755-7ff731678767 call 7ff7316a1b00 1256->1263 1261 7ff731678b3a-7ff731678b8d _errno * 3 call 7ff731662e40 call 7ff7316762b0 call 7ff731676f10 1257->1261 1262 7ff731678744-7ff73167874a 1257->1262 1261->1250 1262->1263 1263->1261 1269 7ff73167876d-7ff731678795 htons call 7ff731676430 1263->1269 1274 7ff73167879c-7ff7316787a1 1269->1274 1275 7ff731678797-7ff73167879a 1269->1275 1277 7ff73167880e 1274->1277 1278 7ff7316787a3-7ff7316787ad 1274->1278 1275->1274 1275->1277 1279 7ff731678811-7ff73167882d 1277->1279 1278->1279 1280 7ff7316787af-7ff7316787db setsockopt 1278->1280 1283 7ff73167885d-7ff731678860 1279->1283 1284 7ff73167882f-7ff731678843 call 7ff731679140 1279->1284 1281 7ff7316787dd-7ff731678804 WSAGetLastError call 7ff731662e40 call 7ff731676430 1280->1281 1282 7ff731678809-7ff73167880c 1280->1282 1281->1282 1282->1279 1285 7ff7316788b4-7ff7316788b7 1283->1285 1286 7ff731678862-7ff731678887 getsockopt 1283->1286 1295 7ff731678845-7ff73167884f 1284->1295 1296 7ff731678851-7ff73167885b 1284->1296 1291 7ff7316788bd-7ff7316788c4 1285->1291 1292 7ff73167899f-7ff7316789a6 1285->1292 1289 7ff731678889-7ff731678891 1286->1289 1290 7ff731678893-7ff7316788ae setsockopt 1286->1290 1289->1285 1289->1290 1290->1285 1291->1292 1299 7ff7316788ca-7ff7316788f5 setsockopt 1291->1299 1297 7ff7316789da-7ff7316789e1 1292->1297 1298 7ff7316789a8-7ff7316789d5 call 7ff731666bd0 * 2 1292->1298 1295->1285 1296->1286 1304 7ff7316789e8-7ff731678a08 call 7ff7316a1a70 call 7ff731677f70 1297->1304 1305 7ff7316789e3-7ff7316789e6 1297->1305 1331 7ff7316789d7 1298->1331 1332 7ff731678a25-7ff731678a27 1298->1332 1302 7ff73167890e-7ff731678982 call 7ff731678cb0 * 2 WSAIoctl 1299->1302 1303 7ff7316788f7-7ff731678909 call 7ff731676430 1299->1303 1302->1292 1323 7ff731678984-7ff73167899a WSAGetLastError call 7ff731676430 1302->1323 1303->1292 1309 7ff731678a3e-7ff731678a68 call 7ff7316855d0 call 7ff73167e0f0 1304->1309 1324 7ff731678a0a-7ff731678a18 call 7ff731676f10 1304->1324 1305->1304 1305->1309 1327 7ff731678a6a-7ff731678a7a call 7ff731666130 1309->1327 1328 7ff731678a7f-7ff731678a82 1309->1328 1323->1292 1324->1246 1339 7ff731678a1e-7ff731678a20 1324->1339 1327->1328 1334 7ff731678a88-7ff731678a90 1328->1334 1335 7ff731678b2f-7ff731678b38 1328->1335 1331->1297 1332->1297 1337 7ff731678a29-7ff731678a39 call 7ff731676f10 1332->1337 1334->1335 1338 7ff731678a96-7ff731678a9d 1334->1338 1335->1250 1337->1250 1341 7ff731678ac8-7ff731678ad3 WSAGetLastError 1338->1341 1342 7ff731678a9f-7ff731678ab4 connect 1338->1342 1339->1250 1345 7ff731678ad5-7ff731678ade 1341->1345 1346 7ff731678b22-7ff731678b24 1341->1346 1342->1341 1344 7ff731678ab6-7ff731678ab8 1342->1344 1347 7ff731678b2b-7ff731678b2d 1344->1347 1348 7ff731678aba-7ff731678ac3 1344->1348 1345->1346 1349 7ff731678ae0-7ff731678b20 call 7ff731662e40 call 7ff731676430 call 7ff731676f10 1345->1349 1346->1347 1347->1250 1348->1250 1349->1250
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                          • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                          • API String ID: 3453287622-3868455274
                                          • Opcode ID: 2f9119e324de080cc09b2f9ffb043b1f18a9a114bed014c39b0810f39b736cae
                                          • Instruction ID: 5e47ffc36285ada6b89cfb1f26c994662e743660b6dd38197c39d2e6fe022dbc
                                          • Opcode Fuzzy Hash: 2f9119e324de080cc09b2f9ffb043b1f18a9a114bed014c39b0810f39b736cae
                                          • Instruction Fuzzy Hash: CBF10671E08262E6F710EBA5D4542BDA3A6FB44B48FC05035DA4E47B94DFBCE944EB20

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1893 7ff7316853a0-7ff7316853ee socket 1894 7ff7316853f5-7ff73168544e htonl setsockopt 1893->1894 1895 7ff7316853f0 1893->1895 1897 7ff73168557b-7ff731685597 closesocket * 3 1894->1897 1898 7ff731685454-7ff731685469 bind 1894->1898 1896 7ff7316855a4-7ff7316855c2 call 7ff7316aff40 1895->1896 1899 7ff73168559c 1897->1899 1898->1897 1901 7ff73168546f-7ff731685485 getsockname 1898->1901 1899->1896 1901->1897 1903 7ff73168548b-7ff73168549a listen 1901->1903 1903->1897 1904 7ff7316854a0-7ff7316854b5 socket 1903->1904 1904->1897 1905 7ff7316854bb-7ff7316854d0 connect 1904->1905 1905->1897 1906 7ff7316854d6-7ff7316854ec accept 1905->1906 1906->1897 1907 7ff7316854f2-7ff73168550e call 7ff7316797c0 1906->1907 1910 7ff731685515-7ff73168551c 1907->1910 1910->1910 1911 7ff73168551e-7ff731685538 send 1910->1911 1911->1897 1912 7ff73168553a-7ff731685556 recv 1911->1912 1912->1897 1913 7ff731685558-7ff73168556c memcmp 1912->1913 1913->1897 1914 7ff73168556e-7ff731685579 closesocket 1913->1914 1914->1899
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                          • String ID:
                                          • API String ID: 3699910901-0
                                          • Opcode ID: 18acca75b82256b36fd27439601572a11a61d7d3643b22be5c7afa3228a250b6
                                          • Instruction ID: 23267bef7a12b1b10ecf9e73a9440d76d6a16db604f4533d91c9122c893ecd01
                                          • Opcode Fuzzy Hash: 18acca75b82256b36fd27439601572a11a61d7d3643b22be5c7afa3228a250b6
                                          • Instruction Fuzzy Hash: AD517032A08A51D1D710EF65E464179B3A2EB44BB4F908734EA7B43AE4DFBCE449D720

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1915 7ff7316772c0-7ff73167730d 1916 7ff731677318-7ff731677353 call 7ff73167e0f0 1915->1916 1917 7ff73167730f-7ff731677313 1915->1917 1923 7ff731677358-7ff73167735b 1916->1923 1924 7ff731677355 1916->1924 1918 7ff731677836-7ff731677854 call 7ff7316aff40 1917->1918 1925 7ff73167735d-7ff731677360 1923->1925 1926 7ff731677378 1923->1926 1924->1923 1927 7ff731677373-7ff731677376 1925->1927 1928 7ff731677362-7ff731677365 1925->1928 1929 7ff73167737b-7ff7316773a7 call 7ff73167e180 1926->1929 1927->1929 1928->1929 1930 7ff731677367-7ff731677371 1928->1930 1933 7ff7316773a9-7ff7316773bd call 7ff7316762b0 1929->1933 1934 7ff7316773c2-7ff7316773ca 1929->1934 1930->1929 1941 7ff731677826-7ff73167782e 1933->1941 1936 7ff7316773cc-7ff7316773de call 7ff731678490 1934->1936 1937 7ff7316773f9-7ff731677417 1934->1937 1946 7ff7316773f2-7ff7316773f4 1936->1946 1947 7ff7316773e0-7ff7316773e2 1936->1947 1940 7ff731677420-7ff731677435 1937->1940 1943 7ff73167743b-7ff73167744f call 7ff731686920 1940->1943 1944 7ff7316776ba 1940->1944 1941->1918 1952 7ff731677455-7ff731677480 call 7ff73167e180 1943->1952 1953 7ff7316775d0-7ff7316775d3 1943->1953 1945 7ff7316776be-7ff7316776cf 1944->1945 1945->1940 1949 7ff7316776d5-7ff7316776d7 1945->1949 1946->1941 1947->1946 1950 7ff7316773e4-7ff7316773ed call 7ff7316785a0 1947->1950 1954 7ff7316776dd-7ff7316776f4 call 7ff731678bc0 1949->1954 1955 7ff73167781c 1949->1955 1950->1946 1967 7ff731677499-7ff73167749c 1952->1967 1968 7ff731677482-7ff731677494 call 7ff731676430 1952->1968 1958 7ff7316775d5-7ff7316775dc 1953->1958 1959 7ff731677644-7ff73167768a SleepEx getsockopt 1953->1959 1971 7ff7316776fa-7ff731677701 1954->1971 1972 7ff7316777a7-7ff7316777a9 1954->1972 1961 7ff73167781e 1955->1961 1958->1959 1963 7ff7316775de-7ff7316775e0 1958->1963 1965 7ff73167768c-7ff731677694 WSAGetLastError 1959->1965 1966 7ff731677696 1959->1966 1961->1941 1969 7ff7316775e6-7ff73167762c SleepEx getsockopt 1963->1969 1970 7ff7316774ef-7ff7316774f1 1963->1970 1973 7ff73167769a-7ff73167769c 1965->1973 1966->1973 1979 7ff73167749e-7ff7316774a5 1967->1979 1980 7ff7316774eb 1967->1980 1968->1967 1975 7ff73167762e-7ff731677636 WSAGetLastError 1969->1975 1976 7ff73167763b-7ff73167763f 1969->1976 1970->1944 1983 7ff7316774f7-7ff73167750c WSASetLastError 1970->1983 1977 7ff7316777ab-7ff7316777b2 1971->1977 1978 7ff731677707-7ff73167770e 1971->1978 1972->1961 1981 7ff73167769e-7ff7316776a4 1973->1981 1982 7ff731677713-7ff731677761 1973->1982 1975->1970 1976->1970 1985 7ff7316777bd-7ff7316777c4 1977->1985 1986 7ff7316777b4-7ff7316777bb 1977->1986 1988 7ff7316777d6-7ff731677819 call 7ff731662e40 call 7ff7316762b0 1978->1988 1979->1980 1989 7ff7316774a7-7ff7316774d3 call 7ff73167e180 1979->1989 1980->1970 1981->1982 1992 7ff7316776a6-7ff7316776b5 call 7ff731676430 1981->1992 1990 7ff731677776-7ff73167778b call 7ff731678490 1982->1990 1991 7ff731677763-7ff73167776b call 7ff731676f10 1982->1991 1983->1944 1984 7ff731677512-7ff73167757c call 7ff73167f4e0 call 7ff731662e40 call 7ff731676430 1983->1984 2018 7ff73167759e-7ff7316775b4 call 7ff731678bc0 1984->2018 2019 7ff73167757e-7ff731677585 1984->2019 1994 7ff7316777c6-7ff7316777cd 1985->1994 1995 7ff7316777cf 1985->1995 1986->1988 1988->1955 1989->1980 2009 7ff7316774d5-7ff7316774e6 call 7ff731678bc0 1989->2009 1990->1961 2010 7ff731677791-7ff731677793 1990->2010 1991->1990 1992->1944 1994->1988 1995->1988 2009->1980 2010->1961 2014 7ff731677799-7ff7316777a2 call 7ff7316785a0 2010->2014 2014->1972 2025 7ff7316775c7-7ff7316775cb 2018->2025 2026 7ff7316775b6-7ff7316775c1 2018->2026 2019->2018 2020 7ff731677587-7ff73167758e 2019->2020 2022 7ff731677590-7ff731677593 2020->2022 2022->2018 2024 7ff731677595-7ff73167759c 2022->2024 2024->2018 2024->2022 2025->1945 2026->1944 2026->2025
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                          • API String ID: 0-3307081561
                                          • Opcode ID: 5f6f60715a206276a7ad46beb51eba481cecc6ffeb3571600683a81ee718a552
                                          • Instruction ID: a062dbabbb9523cd83995048a0d31c4b9d0a7b3f70aac8036efa3d67c73b24d5
                                          • Opcode Fuzzy Hash: 5f6f60715a206276a7ad46beb51eba481cecc6ffeb3571600683a81ee718a552
                                          • Instruction Fuzzy Hash: 8DE10431F086A2E2E764ABA5D4482BDA7A2FB487A4F804235DB5D077C5DFBCE401D710
                                          APIs
                                            • Part of subcall function 00007FF731660920: memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7316511FC), ref: 00007FF731660958
                                          • SleepEx.KERNELBASE ref: 00007FF731661C8F
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731661D03
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731661D44
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731661D7C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$Sleepmemcpy
                                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$PRIVATE STORE -
                                          • API String ID: 18138616-2486835083
                                          • Opcode ID: f62d194c9a5506e1bc40a120267c7f5705a5248675cb0b804e02d88154972be3
                                          • Instruction ID: 2042b677351a8e5b8ee7b61f1f9de2e696be6c5acff2ce59384fe5e9808f92a9
                                          • Opcode Fuzzy Hash: f62d194c9a5506e1bc40a120267c7f5705a5248675cb0b804e02d88154972be3
                                          • Instruction Fuzzy Hash: B581F672E18691E6EB10EB65E4402BDA363FBD9394F805331EA9D02AD9DFBCD080D710

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 982 7ff731652ae0-7ff731652b2f call 7ff731652880 985 7ff7316530e8-7ff731653157 call 7ff731653160 Sleep exit 982->985 986 7ff731652b35-7ff731652b3a 982->986 991 7ff731653158-7ff73165315f call 7ff731651a30 985->991 986->985 988 7ff731652b40-7ff731652c5e call 7ff7316531a0 call 7ff731653c70 call 7ff731653310 call 7ff731653c70 call 7ff731653410 call 7ff731653c70 986->988 1005 7ff731652c94-7ff731652cad 988->1005 1006 7ff731652c60-7ff731652c71 988->1006 1007 7ff731652ce5-7ff731652ced 1005->1007 1008 7ff731652caf-7ff731652cc1 1005->1008 1009 7ff731652c73-7ff731652c86 1006->1009 1010 7ff731652c8f call 7ff7316afb84 1006->1010 1013 7ff731652d23-7ff731652d3b 1007->1013 1014 7ff731652cef-7ff731652d00 1007->1014 1011 7ff731652cc3-7ff731652cd6 1008->1011 1012 7ff731652cdf-7ff731652ce4 call 7ff7316afb84 1008->1012 1009->1010 1015 7ff731652c88-7ff731652c8e _invalid_parameter_noinfo_noreturn 1009->1015 1010->1005 1011->1012 1017 7ff731652cd8-7ff731652cde _invalid_parameter_noinfo_noreturn 1011->1017 1012->1007 1021 7ff731652d3d-7ff731652d4e 1013->1021 1022 7ff731652d72-7ff731652d7a 1013->1022 1019 7ff731652d1e call 7ff7316afb84 1014->1019 1020 7ff731652d02-7ff731652d15 1014->1020 1015->1010 1017->1012 1019->1013 1020->1019 1026 7ff731652d17-7ff731652d1d _invalid_parameter_noinfo_noreturn 1020->1026 1028 7ff731652d6c-7ff731652d71 call 7ff7316afb84 1021->1028 1029 7ff731652d50-7ff731652d63 1021->1029 1023 7ff731652d7c-7ff731652d8d 1022->1023 1024 7ff731652db0-7ff731652df7 1022->1024 1031 7ff731652dab call 7ff7316afb84 1023->1031 1032 7ff731652d8f-7ff731652da2 1023->1032 1033 7ff731652e08-7ff731652e2b 1024->1033 1034 7ff731652df9-7ff731652e06 1024->1034 1026->1019 1028->1022 1029->1028 1035 7ff731652d65-7ff731652d6b _invalid_parameter_noinfo_noreturn 1029->1035 1031->1024 1032->1031 1037 7ff731652da4-7ff731652daa _invalid_parameter_noinfo_noreturn 1032->1037 1040 7ff731652e2d-7ff731652e34 1033->1040 1041 7ff731652e5f-7ff731652e62 1033->1041 1039 7ff731652e82-7ff731652ed8 call 7ff731653590 call 7ff731652880 call 7ff731654c10 call 7ff731654900 1034->1039 1035->1028 1037->1031 1060 7ff731652ede-7ff731652eed call 7ff731654900 1039->1060 1061 7ff731652fe3-7ff731653053 call 7ff731654900 call 7ff7316afb48 call 7ff731654350 call 7ff731655a40 call 7ff731653e90 1039->1061 1040->991 1045 7ff731652e3a-7ff731652e48 call 7ff7316afb48 1040->1045 1042 7ff731652e6b 1041->1042 1043 7ff731652e64-7ff731652e69 call 7ff7316afb48 1041->1043 1047 7ff731652e6e-7ff731652e7d memcpy 1042->1047 1043->1047 1053 7ff731652e58-7ff731652e5e _invalid_parameter_noinfo_noreturn 1045->1053 1054 7ff731652e4a-7ff731652e56 1045->1054 1047->1039 1053->1041 1054->1047 1066 7ff731652ef5 1060->1066 1067 7ff731652eef-7ff731652ef3 1060->1067 1087 7ff731653055-7ff7316530a0 call 7ff731654900 call 7ff7316549e0 call 7ff731653b50 ShellExecuteA exit 1061->1087 1088 7ff7316530a1-7ff7316530e7 call 7ff731654900 call 7ff731654d40 call 7ff731653b50 MessageBoxA call 7ff731653d10 exit 1061->1088 1069 7ff731652ef8-7ff731652f01 1066->1069 1067->1069 1072 7ff731652f03 1069->1072 1073 7ff731652f06-7ff731652f29 call 7ff731654350 call 7ff731653e90 1069->1073 1072->1073 1083 7ff731652f2b-7ff731652f3c 1073->1083 1084 7ff731652f5f-7ff731652f73 1073->1084 1089 7ff731652f3e-7ff731652f51 1083->1089 1090 7ff731652f5a call 7ff7316afb84 1083->1090 1085 7ff731652fa9-7ff731652fe2 call 7ff7316aff40 1084->1085 1086 7ff731652f75-7ff731652f83 1084->1086 1092 7ff731652f85-7ff731652f98 1086->1092 1093 7ff731652fa1-7ff731652fa4 call 7ff7316afb84 1086->1093 1087->1088 1088->985 1089->1090 1097 7ff731652f53-7ff731652f59 _invalid_parameter_noinfo_noreturn 1089->1097 1090->1084 1092->1093 1098 7ff731652f9a-7ff731652fa0 _invalid_parameter_noinfo_noreturn 1092->1098 1093->1085 1097->1090 1098->1093
                                          APIs
                                            • Part of subcall function 00007FF731652880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316528E7
                                            • Part of subcall function 00007FF731652880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652957
                                            • Part of subcall function 00007FF731652880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316529B7
                                            • Part of subcall function 00007FF731652880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652A07
                                            • Part of subcall function 00007FF731652880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652A57
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652C88
                                            • Part of subcall function 00007FF731654900: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316549C0
                                            • Part of subcall function 00007FF7316AFB48: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF73165442E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF7316AFB62
                                            • Part of subcall function 00007FF731654350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF731654381
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652CD8
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652D17
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652D65
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652DA4
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652E58
                                          • memcpy.VCRUNTIME140 ref: 00007FF731652E7D
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652F53
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652F9A
                                          • ShellExecuteA.SHELL32 ref: 00007FF731653092
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165309A
                                          • MessageBoxA.USER32 ref: 00007FF7316530D0
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316530E1
                                          • Sleep.KERNEL32 ref: 00007FF731653149
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731653151
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF731653158
                                            • Part of subcall function 00007FF7316531A0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316532AF
                                            • Part of subcall function 00007FF7316531A0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316532F0
                                            • Part of subcall function 00007FF731653C70: memcpy.VCRUNTIME140 ref: 00007FF731653CC3
                                            • Part of subcall function 00007FF731653310: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316533F0
                                            • Part of subcall function 00007FF731653410: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316534F0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                          • String ID: Failure$download$invalidver$message$open$sessionid$success
                                          • API String ID: 3283070336-3881042241
                                          • Opcode ID: 48964f434a99398b1488b2b580d5da66e7d6d207f2f7662726f7a427ccfb5c37
                                          • Instruction ID: db268cfac2364a5e374ea392af53e57a02dd24fc2b4a7a2cd39da7644a49033d
                                          • Opcode Fuzzy Hash: 48964f434a99398b1488b2b580d5da66e7d6d207f2f7662726f7a427ccfb5c37
                                          • Instruction Fuzzy Hash: 9802F7B2E08792E1EB00EBA5E4543ADA762FF85794F805235DA5D03AD6DFBCE084D350

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1113 7ff73168bf00-7ff73168bf7d 1114 7ff73168bf7f-7ff73168bf83 1113->1114 1115 7ff73168bf9e-7ff73168bfa3 1113->1115 1114->1115 1118 7ff73168bf85-7ff73168bf99 call 7ff731676430 1114->1118 1116 7ff73168bfc2-7ff73168bfc6 1115->1116 1117 7ff73168bfa5-7ff73168bfbd call 7ff731676430 1115->1117 1120 7ff73168bfe1-7ff73168bfe4 1116->1120 1121 7ff73168bfc8-7ff73168bfdc call 7ff731676430 1116->1121 1128 7ff73168c3e3-7ff73168c3e6 1117->1128 1131 7ff73168c3ec-7ff73168c3f9 1118->1131 1125 7ff73168c2fa 1120->1125 1126 7ff73168bfea-7ff73168bfee 1120->1126 1121->1128 1134 7ff73168c302-7ff73168c30a 1125->1134 1126->1125 1130 7ff73168bff4-7ff73168c009 1126->1130 1128->1131 1132 7ff73168c505-7ff73168c50b 1128->1132 1135 7ff73168c010-7ff73168c03b realloc 1130->1135 1136 7ff73168c00b-7ff73168c00e 1130->1136 1131->1132 1133 7ff73168c3ff-7ff73168c403 1131->1133 1138 7ff73168c51d-7ff73168c533 1132->1138 1139 7ff73168c50d-7ff73168c510 1132->1139 1133->1132 1137 7ff73168c409-7ff73168c40d 1133->1137 1140 7ff73168c30e 1134->1140 1142 7ff73168c03d-7ff73168c059 call 7ff7316762b0 1135->1142 1143 7ff73168c05e-7ff73168c08b 1135->1143 1136->1135 1141 7ff73168c08d-7ff73168c0a2 call 7ff731676630 1136->1141 1137->1132 1145 7ff73168c413-7ff73168c428 call 7ff731679140 1137->1145 1148 7ff73168c535-7ff73168c579 memcpy * 2 1138->1148 1149 7ff73168c57b-7ff73168c581 1138->1149 1139->1138 1146 7ff73168c512-7ff73168c51a 1139->1146 1147 7ff73168c316-7ff73168c31c 1140->1147 1151 7ff73168c0a7-7ff73168c0ad 1141->1151 1142->1131 1143->1141 1173 7ff73168c4ee-7ff73168c500 call 7ff731676430 1145->1173 1174 7ff73168c42e-7ff73168c430 1145->1174 1146->1138 1153 7ff73168c3b2-7ff73168c3b8 1147->1153 1154 7ff73168c322-7ff73168c337 call 7ff731676430 1147->1154 1155 7ff73168c5a5-7ff73168c5c7 call 7ff7316aff40 1148->1155 1157 7ff73168c583-7ff73168c586 1149->1157 1158 7ff73168c595-7ff73168c598 1149->1158 1162 7ff73168c2b2-7ff73168c2ba 1151->1162 1163 7ff73168c0b3-7ff73168c0bf 1151->1163 1166 7ff73168c0e0-7ff73168c0ef 1153->1166 1167 7ff73168c3be-7ff73168c3ce 1153->1167 1186 7ff73168c342-7ff73168c352 1154->1186 1187 7ff73168c339-7ff73168c33c 1154->1187 1157->1158 1159 7ff73168c588-7ff73168c590 1157->1159 1160 7ff73168c5a0-7ff73168c5a2 1158->1160 1161 7ff73168c59a-7ff73168c59e 1158->1161 1159->1158 1160->1155 1161->1160 1169 7ff73168c2d2 1162->1169 1170 7ff73168c2bc-7ff73168c2cd 1162->1170 1171 7ff73168c0c1-7ff73168c0c7 1163->1171 1172 7ff73168c0d9-7ff73168c0de 1163->1172 1166->1128 1176 7ff73168c0f5-7ff73168c0f7 1166->1176 1167->1128 1177 7ff73168c3d0-7ff73168c3d4 1167->1177 1169->1172 1181 7ff73168c2d8-7ff73168c2f5 1169->1181 1170->1166 1179 7ff73168c0cd-7ff73168c0d4 call 7ff731676430 1171->1179 1180 7ff73168c29e-7ff73168c2ad call 7ff731676430 1171->1180 1172->1166 1173->1132 1174->1173 1182 7ff73168c436-7ff73168c442 1174->1182 1176->1128 1184 7ff73168c0fd-7ff73168c100 1176->1184 1185 7ff73168c3db 1177->1185 1179->1172 1180->1172 1181->1166 1182->1132 1193 7ff73168c112-7ff73168c190 call 7ff731678d00 1184->1193 1194 7ff73168c102-7ff73168c106 1184->1194 1195 7ff73168c3de call 7ff731676430 1185->1195 1190 7ff73168c358-7ff73168c399 call 7ff731676430 call 7ff73168a3c0 1186->1190 1191 7ff73168c4da-7ff73168c4e9 1186->1191 1187->1186 1188 7ff73168c4c2-7ff73168c4c9 1187->1188 1188->1185 1208 7ff73168c39f-7ff73168c3ad call 7ff731676430 1190->1208 1209 7ff73168c4ce-7ff73168c4d5 1190->1209 1191->1195 1206 7ff73168c192-7ff73168c197 1193->1206 1207 7ff73168c1a4-7ff73168c1a9 1193->1207 1194->1193 1198 7ff73168c108-7ff73168c10c 1194->1198 1195->1128 1198->1128 1198->1193 1206->1207 1210 7ff73168c199-7ff73168c19e 1206->1210 1211 7ff73168c1af-7ff73168c1d9 1207->1211 1212 7ff73168c24e-7ff73168c252 1207->1212 1208->1166 1209->1195 1210->1207 1214 7ff73168c447-7ff73168c44d 1210->1214 1215 7ff73168c1e0-7ff73168c1fb realloc 1211->1215 1216 7ff73168c1db-7ff73168c1de 1211->1216 1212->1134 1218 7ff73168c258-7ff73168c25d 1212->1218 1222 7ff73168c44f-7ff73168c460 1214->1222 1223 7ff73168c476-7ff73168c4a1 call 7ff731662650 call 7ff731676430 1214->1223 1220 7ff73168c201-7ff73168c221 1215->1220 1221 7ff73168c4a6-7ff73168c4bd call 7ff7316762b0 1215->1221 1216->1215 1219 7ff73168c225-7ff73168c229 1216->1219 1218->1134 1224 7ff73168c263-7ff73168c275 1218->1224 1226 7ff73168c22b-7ff73168c248 memcpy 1219->1226 1227 7ff73168c24c 1219->1227 1220->1219 1221->1128 1228 7ff73168c462 1222->1228 1229 7ff73168c46a-7ff73168c471 1222->1229 1223->1128 1224->1147 1231 7ff73168c27b-7ff73168c29c memcpy 1224->1231 1226->1227 1227->1212 1228->1229 1229->1185 1231->1140
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memcpy
                                          • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                          • API String ID: 3510742995-857957974
                                          • Opcode ID: 66a31f3b8282b5844e5921c489c9b9307312f9f7db6f704572f5908f00d00f68
                                          • Instruction ID: 4e3d0708584ebefac6bfb45afde1c9983fe8a4b4063acc34fbbea02765d8108c
                                          • Opcode Fuzzy Hash: 66a31f3b8282b5844e5921c489c9b9307312f9f7db6f704572f5908f00d00f68
                                          • Instruction Fuzzy Hash: 0D020372E08B61D6EB60EB9AD4843B9A7A6FB44B94F904136DE4D83B90CFBCD441D710

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1356 7ff73168b390-7ff73168b3fe 1357 7ff73168b420 1356->1357 1358 7ff73168b400-7ff73168b415 1356->1358 1359 7ff73168b427-7ff73168b441 1357->1359 1358->1357 1360 7ff73168b417-7ff73168b41e 1358->1360 1361 7ff73168b447-7ff73168b44c 1359->1361 1362 7ff73168bb0b 1359->1362 1360->1359 1361->1362 1363 7ff73168b452-7ff73168b460 1361->1363 1364 7ff73168b4a2-7ff73168b4a6 1363->1364 1365 7ff73168b462-7ff73168b49c malloc 1363->1365 1367 7ff73168b4f3-7ff73168b504 1364->1367 1368 7ff73168b4a8-7ff73168b4ed malloc 1364->1368 1365->1364 1366 7ff73168baff 1365->1366 1366->1362 1369 7ff73168b506-7ff73168b520 realloc 1367->1369 1370 7ff73168b578-7ff73168b57a 1367->1370 1368->1366 1368->1367 1373 7ff73168b560-7ff73168b576 1369->1373 1374 7ff73168b522-7ff73168b52c call 7ff7316762b0 1369->1374 1371 7ff73168b5da-7ff73168b681 call 7ff731678d00 malloc 1370->1371 1372 7ff73168b57c-7ff73168b5a0 call 7ff731676630 1370->1372 1371->1366 1383 7ff73168b687-7ff73168b6a1 memcpy 1371->1383 1378 7ff73168b5a5-7ff73168b5a8 1372->1378 1373->1370 1380 7ff73168b531 1374->1380 1381 7ff73168b81f-7ff73168b826 1378->1381 1382 7ff73168b5ae-7ff73168b5b0 1378->1382 1384 7ff73168b536-7ff73168b55f call 7ff7316aff40 1380->1384 1387 7ff73168baf8-7ff73168bafa 1381->1387 1388 7ff73168b82c-7ff73168b838 1381->1388 1385 7ff73168b806-7ff73168b81a call 7ff7316762b0 1382->1385 1386 7ff73168b5b6-7ff73168b5be 1382->1386 1383->1380 1389 7ff73168b6a7-7ff73168b713 free 1383->1389 1385->1384 1386->1385 1392 7ff73168b5c4-7ff73168b5d6 1386->1392 1387->1384 1388->1384 1396 7ff73168bae3-7ff73168baea 1389->1396 1397 7ff73168b719-7ff73168b720 1389->1397 1392->1371 1398 7ff73168baee 1396->1398 1399 7ff73168b726-7ff73168b72d 1397->1399 1400 7ff73168ba8c-7ff73168ba98 1397->1400 1398->1387 1403 7ff73168b72f-7ff73168b732 1399->1403 1404 7ff73168b738-7ff73168b73f 1399->1404 1401 7ff73168ba9a-7ff73168bac6 call 7ff731662650 call 7ff7316762b0 1400->1401 1402 7ff73168bacb-7ff73168bade 1400->1402 1401->1384 1402->1384 1403->1404 1405 7ff73168b83d-7ff73168b844 1403->1405 1406 7ff73168b740-7ff73168b744 1404->1406 1411 7ff73168b884-7ff73168b8ad call 7ff731662650 call 7ff7316762b0 1405->1411 1412 7ff73168b846-7ff73168b84d 1405->1412 1408 7ff73168b783-7ff73168b78a 1406->1408 1409 7ff73168b746-7ff73168b74a 1406->1409 1415 7ff73168b799-7ff73168b7a2 1408->1415 1416 7ff73168b78c 1408->1416 1409->1408 1413 7ff73168b74c-7ff73168b767 call 7ff731676b70 1409->1413 1411->1380 1412->1401 1417 7ff73168b853-7ff73168b87f call 7ff731662650 call 7ff7316762b0 1412->1417 1425 7ff73168b76c-7ff73168b772 1413->1425 1415->1406 1422 7ff73168b7a4-7ff73168b7a8 1415->1422 1416->1415 1417->1384 1427 7ff73168b8d8-7ff73168b8df 1422->1427 1428 7ff73168b7ae-7ff73168b7b3 1422->1428 1430 7ff73168b8b2-7ff73168b8d3 call 7ff7316762b0 1425->1430 1431 7ff73168b778-7ff73168b77d 1425->1431 1432 7ff73168b8e7-7ff73168b8ee 1427->1432 1428->1427 1434 7ff73168b7b9-7ff73168b7ca 1428->1434 1430->1384 1431->1408 1431->1430 1432->1398 1436 7ff73168b8f4-7ff73168b8f7 1432->1436 1434->1432 1438 7ff73168b7d0-7ff73168b7f4 memcpy 1434->1438 1440 7ff73168b903-7ff73168b90b 1436->1440 1441 7ff73168b8f9 1436->1441 1438->1436 1442 7ff73168b7fa-7ff73168b7ff 1438->1442 1443 7ff73168b933 1440->1443 1444 7ff73168b90d-7ff73168b927 1440->1444 1441->1440 1442->1385 1446 7ff73168b93b-7ff73168b93e 1443->1446 1444->1443 1445 7ff73168b929-7ff73168b931 1444->1445 1445->1446 1447 7ff73168ba60-7ff73168ba68 1446->1447 1448 7ff73168b944-7ff73168b975 1446->1448 1447->1387 1449 7ff73168ba6e-7ff73168ba79 1447->1449 1453 7ff73168ba33-7ff73168ba5e call 7ff731662650 call 7ff7316762b0 1448->1453 1454 7ff73168b97b-7ff73168b983 1448->1454 1449->1387 1451 7ff73168ba7b-7ff73168ba87 call 7ff7316a6410 1449->1451 1451->1384 1458 7ff73168ba05-7ff73168ba08 1453->1458 1454->1453 1456 7ff73168b989-7ff73168b98c 1454->1456 1456->1458 1459 7ff73168b98e-7ff73168b995 1456->1459 1461 7ff73168ba10-7ff73168ba12 1458->1461 1462 7ff73168ba0a CertFreeCertificateContext 1458->1462 1463 7ff73168ba00 1459->1463 1464 7ff73168b997-7ff73168b9be memset call 7ff7316a8df0 1459->1464 1461->1447 1466 7ff73168ba14-7ff73168ba25 call 7ff7316762b0 1461->1466 1462->1461 1463->1458 1472 7ff73168b9c0-7ff73168b9ca 1464->1472 1473 7ff73168b9fb 1464->1473 1466->1384 1474 7ff73168ba2a-7ff73168ba31 1472->1474 1475 7ff73168b9cc-7ff73168b9d6 1472->1475 1473->1463 1476 7ff73168b9f3-7ff73168b9f6 call 7ff7316762b0 1474->1476 1475->1474 1477 7ff73168b9d8-7ff73168b9ea call 7ff73166fa20 1475->1477 1476->1473 1477->1473 1481 7ff73168b9ec 1477->1481 1481->1476
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                          • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                          • API String ID: 860210379-3059304359
                                          • Opcode ID: 490e22f11895540a16886b2f19630deea4581af9f1cb7349150999466fba332e
                                          • Instruction ID: f73dccf6d4e0b7687bf51c577a595ef2e7bd5c92430932b1390b801cb6f71eb9
                                          • Opcode Fuzzy Hash: 490e22f11895540a16886b2f19630deea4581af9f1cb7349150999466fba332e
                                          • Instruction Fuzzy Hash: 68129172E08B91D5EB60DF9AD8503AEB7A2FB44B84F904139CA6D47B90DFB8D441D710

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1482 7ff73168a5b0-7ff73168a620 1483 7ff73168a63f 1482->1483 1484 7ff73168a622-7ff73168a634 1482->1484 1486 7ff73168a646-7ff73168a660 call 7ff731679140 1483->1486 1484->1483 1485 7ff73168a636-7ff73168a63d 1484->1485 1485->1486 1489 7ff73168a671-7ff73168a678 1486->1489 1490 7ff73168a662-7ff73168a66c call 7ff731676430 1486->1490 1492 7ff73168a6b8 1489->1492 1493 7ff73168a67a-7ff73168a69a GetModuleHandleA GetProcAddress 1489->1493 1490->1489 1495 7ff73168a6ba-7ff73168a6cb 1492->1495 1493->1492 1494 7ff73168a69c-7ff73168a6b2 call 7ff731679140 1493->1494 1494->1492 1502 7ff73168a6b4-7ff73168a6b6 1494->1502 1497 7ff73168a6f0 1495->1497 1498 7ff73168a6cd-7ff73168a6e5 1495->1498 1501 7ff73168a6f7-7ff73168a6fa 1497->1501 1498->1497 1500 7ff73168a6e7-7ff73168a6ee 1498->1500 1500->1501 1503 7ff73168a73b-7ff73168a742 1501->1503 1504 7ff73168a6fc-7ff73168a713 call 7ff731679140 1501->1504 1502->1495 1505 7ff73168a746-7ff73168a757 1503->1505 1510 7ff73168a722-7ff73168a736 call 7ff7316762b0 1504->1510 1511 7ff73168a715-7ff73168a720 1504->1511 1508 7ff73168a759-7ff73168a771 1505->1508 1509 7ff73168a77c 1505->1509 1508->1509 1512 7ff73168a773-7ff73168a77a 1508->1512 1513 7ff73168a783-7ff73168a785 1509->1513 1522 7ff73168b33d-7ff73168b366 call 7ff7316aff40 1510->1522 1511->1505 1512->1513 1515 7ff73168a787-7ff73168a7a3 call 7ff731670ca0 call 7ff7316706c0 1513->1515 1516 7ff73168a7c8-7ff73168a7d2 1513->1516 1540 7ff73168a7c0-7ff73168a7c3 call 7ff731670cd0 1515->1540 1541 7ff73168a7a5-7ff73168a7bd 1515->1541 1518 7ff73168b047-7ff73168b05e call 7ff731688240 1516->1518 1519 7ff73168a7d8-7ff73168a803 1516->1519 1533 7ff73168b060-7ff73168b071 call 7ff731688240 1518->1533 1534 7ff73168b073-7ff73168b07d call 7ff731676430 1518->1534 1523 7ff73168a805-7ff73168a81c 1519->1523 1524 7ff73168a83b 1519->1524 1528 7ff73168a825-7ff73168a82c 1523->1528 1529 7ff73168a81e-7ff73168a823 1523->1529 1530 7ff73168a840-7ff73168a84a 1524->1530 1535 7ff73168a835-7ff73168a839 1528->1535 1536 7ff73168a82e-7ff73168a833 1528->1536 1529->1530 1537 7ff73168a852-7ff73168a85d 1530->1537 1538 7ff73168a84c-7ff73168a84f 1530->1538 1533->1534 1549 7ff73168b082-7ff73168b08d 1533->1549 1534->1549 1535->1530 1536->1530 1544 7ff73168b02f-7ff73168b03e call 7ff7316762b0 1537->1544 1545 7ff73168a863-7ff73168a878 1537->1545 1538->1537 1540->1516 1541->1540 1554 7ff73168b338 1544->1554 1545->1544 1551 7ff73168b093-7ff73168b114 call 7ff731676430 call 7ff731678cc0 1549->1551 1552 7ff73168b116-7ff73168b128 1549->1552 1553 7ff73168b12d-7ff73168b185 calloc 1551->1553 1552->1553 1556 7ff73168b1a0-7ff73168b1a3 1553->1556 1557 7ff73168b187-7ff73168b191 call 7ff7316762b0 1553->1557 1554->1522 1560 7ff73168b1a5-7ff73168b203 1556->1560 1561 7ff73168b196-7ff73168b19b 1556->1561 1557->1561 1565 7ff73168b209-7ff73168b238 free 1560->1565 1566 7ff73168b2ac-7ff73168b2c8 call 7ff731676b70 1560->1566 1561->1522 1567 7ff73168b286-7ff73168b2a7 call 7ff731662650 call 7ff7316762b0 1565->1567 1568 7ff73168b23a-7ff73168b240 1565->1568 1573 7ff73168b2cd-7ff73168b2ea 1566->1573 1567->1522 1571 7ff73168b260-7ff73168b281 call 7ff731662650 call 7ff7316762b0 1568->1571 1572 7ff73168b242-7ff73168b25b call 7ff731662650 call 7ff7316762b0 1568->1572 1571->1522 1572->1554 1581 7ff73168b329-7ff73168b330 1573->1581 1582 7ff73168b2ec-7ff73168b2ef 1573->1582 1581->1554 1588 7ff73168b333 call 7ff7316762b0 1581->1588 1582->1581 1587 7ff73168b2f1-7ff73168b327 1582->1587 1587->1522 1588->1554
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                          • API String ID: 1646373207-2477831187
                                          • Opcode ID: 1c50b0e86c0dfb581e2f1436c7238595f97150c7056481b8677d10f7589f3bf5
                                          • Instruction ID: b1826221506f0a420c24e0f02b5a947f10c38ea407e8dbeaa34a9272a9322db0
                                          • Opcode Fuzzy Hash: 1c50b0e86c0dfb581e2f1436c7238595f97150c7056481b8677d10f7589f3bf5
                                          • Instruction Fuzzy Hash: DF02E072E08BA1D6E720ABA5D8402BE77A6FB44788F804139DE5D47B91DFBCD441E710

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1590 7ff73166bbf0-7ff73166bc3b calloc 1591 7ff73166bd7e-7ff73166bd87 _errno 1590->1591 1592 7ff73166bc41-7ff73166bcca malloc 1590->1592 1593 7ff73166bd89-7ff73166bda5 1591->1593 1594 7ff73166bccc-7ff73166bcf1 InitializeCriticalSectionEx call 7ff7316853a0 1592->1594 1595 7ff73166bd07-7ff73166bd0e 1592->1595 1602 7ff73166bcf7-7ff73166bcff 1594->1602 1603 7ff73166bda6-7ff73166bdba _strdup 1594->1603 1597 7ff73166bd20-7ff73166bd31 free 1595->1597 1598 7ff73166bd10-7ff73166bd1a DeleteCriticalSection free 1595->1598 1600 7ff73166bd38-7ff73166bd40 1597->1600 1601 7ff73166bd33 call 7ff731688fc0 1597->1601 1598->1597 1605 7ff73166bd48-7ff73166bd78 free 1600->1605 1606 7ff73166bd42 closesocket 1600->1606 1601->1600 1602->1595 1603->1595 1607 7ff73166bdc0-7ff73166bde0 free _strdup 1603->1607 1605->1591 1606->1605 1608 7ff73166be0e-7ff73166be18 1607->1608 1609 7ff73166bde2-7ff73166bdf1 call 7ff731689690 1607->1609 1611 7ff73166be1a-7ff73166be42 EnterCriticalSection LeaveCriticalSection 1608->1611 1612 7ff73166be91-7ff73166beac free 1608->1612 1613 7ff73166bdf6-7ff73166bdfc 1609->1613 1614 7ff73166be55-7ff73166be58 1611->1614 1615 7ff73166be44-7ff73166be4c CloseHandle 1611->1615 1612->1591 1616 7ff73166be4e-7ff73166be50 1613->1616 1617 7ff73166bdfe-7ff73166be0b _errno 1613->1617 1619 7ff73166be5a-7ff73166be5d call 7ff7316896e0 1614->1619 1620 7ff73166be62-7ff73166be72 call 7ff73166ba70 free 1614->1620 1618 7ff73166be78-7ff73166be7b 1615->1618 1616->1593 1617->1608 1623 7ff73166be7d-7ff73166be83 call 7ff731666440 1618->1623 1624 7ff73166be88-7ff73166be8b closesocket 1618->1624 1619->1620 1620->1618 1623->1624 1624->1612
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                          • String ID:
                                          • API String ID: 259767416-0
                                          • Opcode ID: 3ff14ab7fd73e1196f0c363a5ae2acba01a7f4db7ebc729dc49ae69849a598b5
                                          • Instruction ID: c6164abe7f7a8e6aa689e668c8f1b3c846a9f3c0a49725c9774f5e4f6578f642
                                          • Opcode Fuzzy Hash: 3ff14ab7fd73e1196f0c363a5ae2acba01a7f4db7ebc729dc49ae69849a598b5
                                          • Instruction Fuzzy Hash: BC815C22E09B91D2E724EF61E850269B371FB99B54F405239CB9E027A2DFB8F4D4D310
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                          • API String ID: 0-760484938
                                          • Opcode ID: 5cb594704e5a14a3a99ff94c5cd79eddc6f9554907c6ec994f531ed743c6ce03
                                          • Instruction ID: 956f7e663496a88187aebfd04eeff803d89ed29cbb0248fd882416d86e28cc70
                                          • Opcode Fuzzy Hash: 5cb594704e5a14a3a99ff94c5cd79eddc6f9554907c6ec994f531ed743c6ce03
                                          • Instruction Fuzzy Hash: 3342D262E09BD2E1EB59EB6595503B8E3A2FB85B84F884135CE5D47385DFBCE060D320

                                          Control-flow Graph

                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316624A1,?,?,?,?,00007FF7316535D1), ref: 00007FF731672208
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF731672251
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: callocfree
                                          • String ID: <$<$<$`$v
                                          • API String ID: 306872129-2056843887
                                          • Opcode ID: 96fc72d4107bc01bf252997c18d8b870d50ec99ce162ed03cf5650f0768a792d
                                          • Instruction ID: 1722787ff7730c73ddcc71bb7cd3064199015d6d1442dc41a43343bb1f2db81e
                                          • Opcode Fuzzy Hash: 96fc72d4107bc01bf252997c18d8b870d50ec99ce162ed03cf5650f0768a792d
                                          • Instruction Fuzzy Hash: 7F913872908BC1C6E310DF34D4043E877A1FB99B5CF485239DE991A39ADFBAA095D720

                                          Control-flow Graph

                                          APIs
                                          • GetModuleHandleA.KERNEL32(?,?,?,00007FF7316A2DFA,?,?,?,?,00007FF73167932B), ref: 00007FF731678FB4
                                          • GetProcAddress.KERNEL32(?,?,00007FF7316A2DFA,?,?,?,?,00007FF73167932B), ref: 00007FF731678FD9
                                          • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF7316A2DFA,?,?,?,?,00007FF73167932B), ref: 00007FF731678FEC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProcstrpbrk
                                          • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                          • API String ID: 27745253-3327535076
                                          • Opcode ID: ed8c58319feda3e2ef0bf4467202deb353ecfa3ac03bdd26cde5824d9b1eb468
                                          • Instruction ID: 18ccd383b23ebed198eb9eced6751f4662b7bdec0bab2d976e62cae40598d08e
                                          • Opcode Fuzzy Hash: ed8c58319feda3e2ef0bf4467202deb353ecfa3ac03bdd26cde5824d9b1eb468
                                          • Instruction Fuzzy Hash: BA41B716F09662E5FB15AF96A410139A7E2EF46BE1F888134CE1D03790DE7DE486D720

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_errnogetpeernamegetsockname
                                          • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                          • API String ID: 2911674258-670633250
                                          • Opcode ID: 1d68d23901f2bc99712f764ecee20f1df52790d8a263a8a7c26a230ac7d5d946
                                          • Instruction ID: 86debbe0a237b7115ab3b8c697766980139d7b3cea07660b222537f9639b8ff8
                                          • Opcode Fuzzy Hash: 1d68d23901f2bc99712f764ecee20f1df52790d8a263a8a7c26a230ac7d5d946
                                          • Instruction Fuzzy Hash: 7A91BB32E08AD1D2E710DF65C5542E9B3A1FB8CB88F849236DE4C47616EF78E185CB20

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2062 7ff731689010-7ff73168903d getaddrinfo 2063 7ff731689043-7ff731689055 2062->2063 2064 7ff7316891d4-7ff7316891e1 2062->2064 2065 7ff7316891b4-7ff7316891bd WSASetLastError 2063->2065 2066 7ff73168905b 2063->2066 2067 7ff7316891c3-7ff7316891d0 2065->2067 2068 7ff731689060-7ff731689066 2066->2068 2067->2064 2069 7ff731689068-7ff73168906b 2068->2069 2070 7ff73168906d-7ff731689070 2068->2070 2073 7ff731689079-7ff73168907d 2069->2073 2071 7ff731689121-7ff731689128 2070->2071 2072 7ff731689076 2070->2072 2071->2068 2075 7ff73168912e 2071->2075 2072->2073 2073->2071 2074 7ff731689083-7ff73168908a 2073->2074 2074->2071 2076 7ff731689090-7ff731689093 2074->2076 2077 7ff731689162-7ff73168916f 2075->2077 2076->2071 2080 7ff731689099-7ff7316890aa malloc 2076->2080 2078 7ff731689171 freeaddrinfo 2077->2078 2079 7ff731689177-7ff73168917a 2077->2079 2078->2079 2081 7ff7316891af-7ff7316891b2 2079->2081 2082 7ff73168917c-7ff73168917f 2079->2082 2083 7ff7316890b0-7ff7316890e5 malloc 2080->2083 2084 7ff73168915c 2080->2084 2081->2065 2081->2067 2085 7ff731689181-7ff7316891a8 free * 3 2082->2085 2086 7ff7316891aa-7ff7316891ad 2082->2086 2087 7ff7316890e7-7ff7316890fd memcpy 2083->2087 2088 7ff73168914b-7ff73168915a free 2083->2088 2084->2077 2085->2085 2085->2086 2086->2067 2089 7ff7316890ff-7ff73168910c _strdup 2087->2089 2090 7ff73168910e-7ff731689118 2087->2090 2088->2077 2089->2090 2091 7ff731689130-7ff731689149 free * 2 2089->2091 2092 7ff73168911a 2090->2092 2093 7ff73168911e 2090->2093 2091->2077 2092->2093 2093->2071
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                          • String ID:
                                          • API String ID: 2364279375-0
                                          • Opcode ID: 1fb9b7d07c9e8a83ca4e6813051c7f37d9c67e9dd09fc361b0a1b938884a6115
                                          • Instruction ID: a374fcaeb4052ce630f88dd9597aeba245794260d9a1e60943c36512666d7e59
                                          • Opcode Fuzzy Hash: 1fb9b7d07c9e8a83ca4e6813051c7f37d9c67e9dd09fc361b0a1b938884a6115
                                          • Instruction Fuzzy Hash: BD514C36E09B51D2EB65AF92A554139F7A2FB88B95F844039CE8E13B50CF7CE444E720

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2094 7ff731674ed0-7ff731674eee call 7ff731675eb0 2097 7ff731674ef7 call 7ff73169ee40 2094->2097 2098 7ff731674ef0-7ff731674ef5 call 7ff73169ee80 2094->2098 2102 7ff731674efc-7ff731674f1d 2097->2102 2098->2102 2103 7ff7316751ab 2102->2103 2104 7ff731674f23-7ff731674f2b 2102->2104 2105 7ff7316751b0-7ff7316751cc 2103->2105 2106 7ff731674f2d-7ff731674f41 call 7ff73169eab0 2104->2106 2107 7ff731674f89-7ff731674f91 2104->2107 2106->2107 2116 7ff731674f43-7ff731674f49 2106->2116 2108 7ff731674f97-7ff731674fd1 call 7ff73169f5e0 2107->2108 2109 7ff731675048-7ff731675060 call 7ff73169efc0 2107->2109 2119 7ff73167500a-7ff73167501e call 7ff73169efc0 2108->2119 2120 7ff731674fd3-7ff731674fd6 2108->2120 2109->2120 2121 7ff731675066-7ff73167507e 2109->2121 2117 7ff731674f4b-7ff731674f52 free 2116->2117 2118 7ff731674f58-7ff731674f75 call 7ff7316796f0 2116->2118 2117->2118 2118->2103 2136 7ff731674f7b-7ff731674f82 2118->2136 2119->2120 2137 7ff731675020-7ff731675026 2119->2137 2124 7ff731674ffe 2120->2124 2125 7ff731674fd8-7ff731674fdb 2120->2125 2126 7ff73167509c-7ff7316750b3 call 7ff7316762b0 2121->2126 2127 7ff731675080-7ff73167508d call 7ff73167abe0 2121->2127 2128 7ff731675003-7ff731675005 2124->2128 2132 7ff731674fdd 2125->2132 2133 7ff731674ff2-7ff731674ff9 2125->2133 2126->2105 2144 7ff7316750b8-7ff7316750c1 2127->2144 2145 7ff73167508f-7ff73167509a 2127->2145 2128->2105 2138 7ff731674fe0 2132->2138 2133->2105 2136->2107 2140 7ff731675028-7ff73167502f free 2137->2140 2141 7ff731675035-7ff731675041 2137->2141 2142 7ff731674fe6-7ff731674fed 2138->2142 2143 7ff731675214-7ff73167521b 2138->2143 2140->2141 2141->2109 2142->2105 2143->2105 2144->2126 2146 7ff7316750c3-7ff7316750ca 2144->2146 2145->2126 2145->2127 2147 7ff7316750cc-7ff7316750d2 2146->2147 2148 7ff7316750d4-7ff7316750ff call 7ff73169efc0 2146->2148 2147->2126 2147->2148 2151 7ff7316751cd-7ff7316751d0 2148->2151 2152 7ff731675105-7ff73167511c _strdup 2148->2152 2153 7ff731675129-7ff731675149 call 7ff73169efc0 2151->2153 2154 7ff7316751d6-7ff7316751d9 2151->2154 2152->2103 2155 7ff731675122 2152->2155 2160 7ff73167514f-7ff731675166 _strdup 2153->2160 2161 7ff7316751f0-7ff7316751f3 2153->2161 2154->2124 2156 7ff7316751df-7ff7316751e2 2154->2156 2155->2153 2156->2133 2158 7ff7316751e8-7ff7316751eb 2156->2158 2158->2138 2160->2103 2164 7ff731675168 2160->2164 2162 7ff7316751f9-7ff7316751fc 2161->2162 2163 7ff73167516f-7ff73167518c call 7ff73169efc0 2161->2163 2162->2124 2166 7ff731675202-7ff731675205 2162->2166 2169 7ff73167521d-7ff731675220 2163->2169 2170 7ff731675192-7ff7316751a9 _strdup 2163->2170 2164->2163 2166->2133 2168 7ff73167520b-7ff73167520e 2166->2168 2168->2128 2168->2143 2169->2162 2171 7ff731675222-7ff73167523a call 7ff73169efc0 2169->2171 2170->2103 2170->2171 2174 7ff73167523c-7ff731675251 call 7ff73167abe0 2171->2174 2175 7ff731675257-7ff73167526f call 7ff73169efc0 2171->2175 2174->2103 2174->2175 2180 7ff731675298-7ff7316752b3 call 7ff73169efc0 2175->2180 2181 7ff731675271-7ff731675274 2175->2181 2187 7ff7316752b5-7ff7316752ca call 7ff73167abe0 2180->2187 2188 7ff7316752d1-7ff7316752f4 strtoul call 7ff731678cc0 2180->2188 2181->2124 2182 7ff73167527a-7ff73167527d 2181->2182 2182->2133 2184 7ff731675283-7ff731675286 2182->2184 2184->2128 2186 7ff73167528c-7ff731675293 2184->2186 2186->2105 2193 7ff7316752cc 2187->2193 2194 7ff7316752fa-7ff73167531a call 7ff73169efc0 2187->2194 2188->2194 2193->2103 2197 7ff73167534d-7ff73167536b _strdup 2194->2197 2198 7ff73167531c-7ff73167531f 2194->2198 2197->2103 2200 7ff731675371-7ff731675380 2197->2200 2198->2197 2199 7ff731675321-7ff73167532b 2198->2199 2203 7ff731675332-7ff73167533b 2199->2203 2201 7ff731675388-7ff73167538a 2200->2201 2202 7ff731675382 2200->2202 2201->2105 2202->2201 2203->2203 2204 7ff73167533d-7ff731675348 call 7ff731675f80 2203->2204 2204->2197
                                          APIs
                                            • Part of subcall function 00007FF731675EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF731675EC4
                                            • Part of subcall function 00007FF731675EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF731675EDA
                                            • Part of subcall function 00007FF731675EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF731675EEE
                                            • Part of subcall function 00007FF731675EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF731675F02
                                            • Part of subcall function 00007FF731675EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF731675F16
                                            • Part of subcall function 00007FF731675EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF731675F2A
                                            • Part of subcall function 00007FF731675EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF731675F3E
                                            • Part of subcall function 00007FF731675EB0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF731675F52
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF731674F52
                                            • Part of subcall function 00007FF73169EE80: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF731674EF5,?,?,?,?,?,00007FF7316732FC), ref: 00007FF73169EE95
                                            • Part of subcall function 00007FF73169EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF731674EF5,?,?,?,?,?,00007FF7316732FC), ref: 00007FF73169EEAF
                                            • Part of subcall function 00007FF73169EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF731674EF5,?,?,?,?,?,00007FF7316732FC), ref: 00007FF73169EECA
                                            • Part of subcall function 00007FF73169EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF731674EF5,?,?,?,?,?,00007FF7316732FC), ref: 00007FF73169EEE6
                                            • Part of subcall function 00007FF73169EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF731674EF5,?,?,?,?,?,00007FF7316732FC), ref: 00007FF73169EF02
                                            • Part of subcall function 00007FF73169EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF731674EF5,?,?,?,?,?,00007FF7316732FC), ref: 00007FF73169EF1A
                                            • Part of subcall function 00007FF73169EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF731674EF5,?,?,?,?,?,00007FF7316732FC), ref: 00007FF73169EF32
                                            • Part of subcall function 00007FF73169EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF731674EF5,?,?,?,?,?,00007FF7316732FC), ref: 00007FF73169EF4A
                                            • Part of subcall function 00007FF73169EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF731674EF5,?,?,?,?,?,00007FF7316732FC), ref: 00007FF73169EF62
                                            • Part of subcall function 00007FF73169EE80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF731674EF5,?,?,?,?,?,00007FF7316732FC), ref: 00007FF73169EF7A
                                            • Part of subcall function 00007FF73169EE80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF731674EF5,?,?,?,?,?,00007FF7316732FC), ref: 00007FF73169EF94
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF731675156
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF731675199
                                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF7316752DE
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73167535B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdup$free$callocstrtoul
                                          • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$file
                                          • API String ID: 954404409-4150109901
                                          • Opcode ID: 0ac8339ab56343dfb0608ee691da3d5eeb1b2d07e07abf4930b7335b89ee0e18
                                          • Instruction ID: e758cff7dcef0a73f71b18c75cdc09be7e854ce75983ef3862807c5f46dda430
                                          • Opcode Fuzzy Hash: 0ac8339ab56343dfb0608ee691da3d5eeb1b2d07e07abf4930b7335b89ee0e18
                                          • Instruction Fuzzy Hash: 66C1E432F08A92E2FB69ABA5D9547F9A392FB84345F844471CB0D47685DFBCE410E360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: 7e3a5c8391cbd2fe5a66151918e3f45155f736d235638181fdd996934fd2847e
                                          • Instruction ID: c08e85e15a8d7e44b9b121f0a2ce7049ff48190d2eaf3fb9aa12304078add93d
                                          • Opcode Fuzzy Hash: 7e3a5c8391cbd2fe5a66151918e3f45155f736d235638181fdd996934fd2847e
                                          • Instruction Fuzzy Hash: 9691FC31F0C6A6E6EB64AE9599502B9E397FB44758F904134DD1E86FC4DFBCE900A210
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: calloc
                                          • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                          • API String ID: 2635317215-3812100122
                                          • Opcode ID: eff8b956742bb68419ca025f1cdfc5da50cfc823b85c2868b4250ee5da627a45
                                          • Instruction ID: 39e9250858bfa058a9040e57293f6dc054dc7a56be4229e337b9dbd845220c68
                                          • Opcode Fuzzy Hash: eff8b956742bb68419ca025f1cdfc5da50cfc823b85c2868b4250ee5da627a45
                                          • Instruction Fuzzy Hash: 1A51E422F0CBA2E6F75AABA594A0379A792FB44780F940075DF5D43390DF7CE451A720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: system
                                          • String ID: .8$h%49
                                          • API String ID: 3377271179-4206735779
                                          • Opcode ID: 23d25a257ec8e6a06825ac2238ab2d79f1aaa4dbc3fa61955fb06a3204d1439f
                                          • Instruction ID: 320db0828e208702339eec594c83345976692fcc3cc5da8b286588c781630d28
                                          • Opcode Fuzzy Hash: 23d25a257ec8e6a06825ac2238ab2d79f1aaa4dbc3fa61955fb06a3204d1439f
                                          • Instruction Fuzzy Hash: DB617D26E18BE6D9F301DBB8E8051BCB772BB8D708F805338CEC925A15EFA81148D754
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                          • String ID:
                                          • API String ID: 1133592946-0
                                          • Opcode ID: 53dfa699f0e776e93b8434ed3c0ad4270c14bc29c46198c7798260165ce92bd4
                                          • Instruction ID: aa4525f22ce8e49489e5076c05bf0f4bc360cbe810e31dc674bef3abe38d4c01
                                          • Opcode Fuzzy Hash: 53dfa699f0e776e93b8434ed3c0ad4270c14bc29c46198c7798260165ce92bd4
                                          • Instruction Fuzzy Hash: A8316121E0DA23E2FB10FBE294553BA97A3AF44784FC48035E54E472D3DEADA444E271
                                          APIs
                                            • Part of subcall function 00007FF731689010: getaddrinfo.WS2_32 ref: 00007FF731689032
                                            • Part of subcall function 00007FF731689010: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73166BB35), ref: 00007FF73168909E
                                            • Part of subcall function 00007FF731689010: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73166BB35), ref: 00007FF7316890D8
                                            • Part of subcall function 00007FF731689010: memcpy.VCRUNTIME140(?,?,?,00007FF73166BB35), ref: 00007FF7316890F1
                                            • Part of subcall function 00007FF731689010: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF73166BB35), ref: 00007FF7316890FF
                                            • Part of subcall function 00007FF731689010: freeaddrinfo.WS2_32(?,?,?,00007FF73166BB35), ref: 00007FF731689171
                                            • Part of subcall function 00007FF731689010: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73166BB35), ref: 00007FF731689185
                                            • Part of subcall function 00007FF731689010: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73166BB35), ref: 00007FF73168918F
                                            • Part of subcall function 00007FF731689010: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73166BB35), ref: 00007FF73168919C
                                          • WSAGetLastError.WS2_32 ref: 00007FF73166BB3B
                                          • WSAGetLastError.WS2_32 ref: 00007FF73166BB45
                                          • EnterCriticalSection.KERNEL32 ref: 00007FF73166BB60
                                          • LeaveCriticalSection.KERNEL32 ref: 00007FF73166BB6F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73166BB80
                                          • send.WS2_32 ref: 00007FF73166BBA3
                                          • WSAGetLastError.WS2_32 ref: 00007FF73166BBAD
                                          • LeaveCriticalSection.KERNEL32 ref: 00007FF73166BBC0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                          • String ID:
                                          • API String ID: 506363382-0
                                          • Opcode ID: 2cc453d08f745c6a3c59f832767adf90c4defb3494f8eef72683afc19a1c4f9f
                                          • Instruction ID: 26dbd0ac452b9ad0c1f5d0004227c25ac26a2f6a5de01f20d3d58b9a17a4a9a6
                                          • Opcode Fuzzy Hash: 2cc453d08f745c6a3c59f832767adf90c4defb3494f8eef72683afc19a1c4f9f
                                          • Instruction Fuzzy Hash: 9B318432F08652D2EB50EF65E450269B3A1FB88B98F804135D65F83698DFBCE445D760
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: 8a5b4f1b789db9ccb89845b8f97dcc9209c77af34dde97e523798634a5c91cdc
                                          • Instruction ID: e80fe13217d1277031bf236eee7a5968298ae26d0991d920735e86f9eca6a2c5
                                          • Opcode Fuzzy Hash: 8a5b4f1b789db9ccb89845b8f97dcc9209c77af34dde97e523798634a5c91cdc
                                          • Instruction Fuzzy Hash: 2BA14A71E286BAD2EB696F559400379A396FF44B54F904234EE1E46FC4EFBDD4009360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                          • API String ID: 1294909896-116363806
                                          • Opcode ID: 7efc566423fa0d197834d59ee1389c6d4582752e74dfab533cafd7e8b38643b5
                                          • Instruction ID: c6027884496752a28cab7fafe5f7be499fb4b633f3f02ed6ffac5180bff3278b
                                          • Opcode Fuzzy Hash: 7efc566423fa0d197834d59ee1389c6d4582752e74dfab533cafd7e8b38643b5
                                          • Instruction Fuzzy Hash: 34916832A08F91D6EB109F66D8806ADB7B5FB88B88F840135CE8D47B64DF78D445DB20
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpy
                                          • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                          • API String ID: 3056473165-3891197721
                                          • Opcode ID: 5e927313b045fb50520b99f68cdb8cb6e07c988077a1b5e64f35ee76836d8337
                                          • Instruction ID: 2533103f0d440f28e501f616e51135bb2bc76f9fd6c4059d28d7690ec1a0cf3a
                                          • Opcode Fuzzy Hash: 5e927313b045fb50520b99f68cdb8cb6e07c988077a1b5e64f35ee76836d8337
                                          • Instruction Fuzzy Hash: C3718972F08B11DAEB10DBA5D4506AD77A6FB48BA8F804235DE2D47BC4EE78E406D350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s$Connection #%ld to host %s left intact
                                          • API String ID: 1294909896-118628944
                                          • Opcode ID: 7bbbfc9fc39b892fe47f4d760995b619898a2bed64aad6e52c5ec38839e87b67
                                          • Instruction ID: 0ad82a9e9cd20a79e6c9dbae92f2ebe31a0993d3fa29bbeada8ee01d5c938a41
                                          • Opcode Fuzzy Hash: 7bbbfc9fc39b892fe47f4d760995b619898a2bed64aad6e52c5ec38839e87b67
                                          • Instruction Fuzzy Hash: 49918431F086A1E2EB58BB6595403BDA3E6FB44B84F844435CE4E07255CFBCE860E760
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF731671AFB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF731671B11
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF73167192D
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF73167194A
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF73167195E
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF73167197A
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671997
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF7316719BA
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF7316719CE
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF7316719E2
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671A08
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671A1C
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671A30
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671A7F
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671A8C
                                            • Part of subcall function 00007FF7316718B0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671AB5
                                          • memset.VCRUNTIME140 ref: 00007FF731671B45
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$memset
                                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                          • API String ID: 2717317152-3248832348
                                          • Opcode ID: 0b5af3561c7f0beabbbfc97a2aecd37f8a35a6766f80842a6e57c91dfd642cc5
                                          • Instruction ID: 35cf9546ec3c083005725cff2efaa794d68afbbbdc5397dcbfd1c1c2bc0b8e93
                                          • Opcode Fuzzy Hash: 0b5af3561c7f0beabbbfc97a2aecd37f8a35a6766f80842a6e57c91dfd642cc5
                                          • Instruction Fuzzy Hash: 2A71AF62D0CAD2D1E751EFB590103BDA762EB81B94F984136DE9D0B285DFBCE480E720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$memcpy
                                          • String ID: 1.1
                                          • API String ID: 4107583993-2150719395
                                          • Opcode ID: 9c93a6a937aa17bde0d74d21f4712d5c5711554ab9829be0d6950b6c6c408ace
                                          • Instruction ID: d591dcffd1408d24fd3a5a26b8e8898ec4ab64ef3487e81e1da537ea3d641917
                                          • Opcode Fuzzy Hash: 9c93a6a937aa17bde0d74d21f4712d5c5711554ab9829be0d6950b6c6c408ace
                                          • Instruction Fuzzy Hash: 33518072A08B91D6EB649F62E5503AAB3A1FB48B84F848035CF9E47B54CF7CE055E310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLastmallocrecvsend
                                          • String ID: Send failure: %s
                                          • API String ID: 25851408-857917747
                                          • Opcode ID: 673c8457288706f5a134c36b68c9957e0830b558a30659419899d547b49b0c3d
                                          • Instruction ID: 82857cd095dbd0c4941f94a1ae9b9aae119fb3577184c3a9bd2e83a536ecc797
                                          • Opcode Fuzzy Hash: 673c8457288706f5a134c36b68c9957e0830b558a30659419899d547b49b0c3d
                                          • Instruction Fuzzy Hash: 6441F072B05B92D5EB64EF65E8007B9A396BB08BA8F944235CE6D07380DF7CE440D310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Resolving timed out after %I64d milliseconds
                                          • API String ID: 1294909896-3343404259
                                          • Opcode ID: 09adf2ee5de9c113138e5bdaa025590f3709708e40e62865b75a7a1d270c404f
                                          • Instruction ID: 047bf403fcd17c1cd44afe69fcc94b3eece2787677d53c78f2de438c75d74900
                                          • Opcode Fuzzy Hash: 09adf2ee5de9c113138e5bdaa025590f3709708e40e62865b75a7a1d270c404f
                                          • Instruction Fuzzy Hash: 44D19361E08666E5FB24AFB990543BDA3B6EF40B88F846531CE0D17695DFB8E440E360
                                          APIs
                                            • Part of subcall function 00007FF731652880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316528E7
                                            • Part of subcall function 00007FF731652880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652957
                                            • Part of subcall function 00007FF731652880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316529B7
                                            • Part of subcall function 00007FF731652880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652A07
                                            • Part of subcall function 00007FF731652880: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652A57
                                          • MessageBoxA.USER32 ref: 00007FF731653767
                                            • Part of subcall function 00007FF731654350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF731654381
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316537CA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                          • String ID: keyauth.win$null
                                          • API String ID: 3545939226-2841560827
                                          • Opcode ID: 62b5113f44a3402a1324ae18612a13510356cfcaf61231a5455f64cb290a4ed1
                                          • Instruction ID: e96c0856f6c3c0c708c6a0b93aaa0d6797303898898fff64d7f92d65d73e5e67
                                          • Opcode Fuzzy Hash: 62b5113f44a3402a1324ae18612a13510356cfcaf61231a5455f64cb290a4ed1
                                          • Instruction Fuzzy Hash: C051F462F187A1D5FB04EBB5D4243AC6332AB44B88F804035DE4D17B8ADFBC9182D3A1
                                          APIs
                                            • Part of subcall function 00007FF731678FA0: GetModuleHandleA.KERNEL32(?,?,?,00007FF7316A2DFA,?,?,?,?,00007FF73167932B), ref: 00007FF731678FB4
                                          • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF73167932B), ref: 00007FF7316A2E10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: AddressCallerHandleModuleProc
                                          • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                          • API String ID: 2084706301-3788156360
                                          • Opcode ID: 5e3a6711635448fff0480283db2dd73f071ee0026d5417c64c4451555ff8fb5c
                                          • Instruction ID: 56cfca39743108e414259c9a90d77a521bb863e1c02af8a1703d8a5f93f57f9b
                                          • Opcode Fuzzy Hash: 5e3a6711635448fff0480283db2dd73f071ee0026d5417c64c4451555ff8fb5c
                                          • Instruction Fuzzy Hash: 14F08190E0A723E1FF48FB96A88177093D2AF58344FC45038C50D462A1EFBCA495E320
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Resolving timed out after %I64d milliseconds
                                          • API String ID: 0-3343404259
                                          • Opcode ID: 7163487e0e08904306f2315dbf6caa09e5d06ad51b43a8eb750352c4f908bad4
                                          • Instruction ID: 00c13054303d58790830aee031882fa8eed56b0727f955a9e176da2b29b5898a
                                          • Opcode Fuzzy Hash: 7163487e0e08904306f2315dbf6caa09e5d06ad51b43a8eb750352c4f908bad4
                                          • Instruction Fuzzy Hash: 97B1B562E08762E5FB24AFB5905027DA3B6EF41B48F846435CE0E47295DFBDE440E360
                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF731681D10
                                            • Part of subcall function 00007FF7316822A0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7316822FA
                                            • Part of subcall function 00007FF731682050: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7316820E8
                                            • Part of subcall function 00007FF731682050: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7316820F1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$calloc
                                          • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                          • API String ID: 3095843317-1242256665
                                          • Opcode ID: 61a59c7a151553d47fe05b5f846b99ff14d6c5c000ef83b11831b5288ce8ad4a
                                          • Instruction ID: fb9208cb534d69ade2783ccfc5bec9d28db5502e4e98b294699b6ba49f6ddbe5
                                          • Opcode Fuzzy Hash: 61a59c7a151553d47fe05b5f846b99ff14d6c5c000ef83b11831b5288ce8ad4a
                                          • Instruction Fuzzy Hash: 8A41C832E0C692EAEB50FFA5A4103B9A7E3AB85384F944036DA8D47B85DE7CD404D720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: closesocket$calloc
                                          • String ID:
                                          • API String ID: 2958813939-0
                                          • Opcode ID: 4da166a860aaa5a5f36b028cdd6123a8f8e5fb87d46c06d9e6026e5161d811a0
                                          • Instruction ID: 060e7540caf327eb2bbf8224317de4bda950954189e0e3c619d1a5ca6a9668dc
                                          • Opcode Fuzzy Hash: 4da166a860aaa5a5f36b028cdd6123a8f8e5fb87d46c06d9e6026e5161d811a0
                                          • Instruction Fuzzy Hash: 6D419331E08A61E1E700FFB4E4502E9A362EF88728FC84635DE5D862D6EFB8D545D320
                                          APIs
                                          • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7316511FC), ref: 00007FF731660958
                                          • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF7316511FC), ref: 00007FF7316609F9
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF731660A17
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task
                                          • String ID:
                                          • API String ID: 326894585-0
                                          • Opcode ID: b53f007d235b3f06568d166cbfc5e17c10bef2aa46fa8e4ff4674de9681ddfa7
                                          • Instruction ID: 117ad55327308f4def31d435001dbe74c68a505084ac27f7e5506c7554326d28
                                          • Opcode Fuzzy Hash: b53f007d235b3f06568d166cbfc5e17c10bef2aa46fa8e4ff4674de9681ddfa7
                                          • Instruction Fuzzy Hash: B131D862F09A66E1FB25BB91A51037C93669F04BA0F940730DE6D077C2DFBCA8929310
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                          • API String ID: 0-3791222319
                                          • Opcode ID: 7e94522a85ffdfe09165299c90d504e75b726f9f70ae0ce343aad7af42f998ec
                                          • Instruction ID: 7f0f2e6cc30eb671b9ddfae6a4d536947580f8cae4ea0adcded73cbb98a84caf
                                          • Opcode Fuzzy Hash: 7e94522a85ffdfe09165299c90d504e75b726f9f70ae0ce343aad7af42f998ec
                                          • Instruction Fuzzy Hash: 4B51F831E08662E5EB50EBA59944279A392EF447A4F849231DE2D47BD1EF7CE041D331
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freerecv
                                          • String ID:
                                          • API String ID: 2032557106-0
                                          • Opcode ID: 9fb7283d3b3fe2a32a5a4308ef32750d50e53da8e2d5037518f41ed1d519b0cc
                                          • Instruction ID: c9f4ee8a3537c41d322895f99712a111f5098e78e75a912bd9bfad4b9d3cfb17
                                          • Opcode Fuzzy Hash: 9fb7283d3b3fe2a32a5a4308ef32750d50e53da8e2d5037518f41ed1d519b0cc
                                          • Instruction Fuzzy Hash: 09C10972E086A2D6EB259B65E0403B9A7B2FB447A4F844235DEAE437C4DF7CE401D710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                          • API String ID: 1294909896-3248832348
                                          • Opcode ID: f606bcd2038c5ef08dcce9581c18184adf0bd88fa452844af4fc4b9c61b2a22f
                                          • Instruction ID: 5a95061c2569739a6e806c163f07fde557e91621869217b19bcabcab43c09f41
                                          • Opcode Fuzzy Hash: f606bcd2038c5ef08dcce9581c18184adf0bd88fa452844af4fc4b9c61b2a22f
                                          • Instruction Fuzzy Hash: A8519D22E08AD1D1E7419F65D0403EDA7A2EB85B98F8C4136DE8D0B39ADFBDD494D320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ConsoleSleepTitle_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 4275364305-0
                                          • Opcode ID: d93b49df8ad4e5ec2ae08ef71ace1e26886ffdca7d49e109a83afd150722af17
                                          • Instruction ID: 85050e2954b3a82cd470b9c6eb89a9dac2f15d6941cad3496432bf685a999198
                                          • Opcode Fuzzy Hash: d93b49df8ad4e5ec2ae08ef71ace1e26886ffdca7d49e109a83afd150722af17
                                          • Instruction Fuzzy Hash: 5111A361F08596E1EB20FB50E844329A372FF85794FC04235E6DD426D5DFACE040E710
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLastrecv
                                          • String ID:
                                          • API String ID: 2514157807-0
                                          • Opcode ID: cd326ec70821d1c6bd3ccd5998ab6033c7b5e388acd7fa64615cf810a5de8fbd
                                          • Instruction ID: 049cdd5ebef79c8a531a1312601dd64e6c9bde39626d76d52e45a0cf692cc254
                                          • Opcode Fuzzy Hash: cd326ec70821d1c6bd3ccd5998ab6033c7b5e388acd7fa64615cf810a5de8fbd
                                          • Instruction Fuzzy Hash: 0DE0DF22F0460982FF29A7B2A8643381296DB48731F848738CA3B863C0DEAC44D65760
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: __acrt_iob_func__stdio_common_vfprintf
                                          • String ID:
                                          • API String ID: 2168557111-0
                                          • Opcode ID: 0899256543c42a584bb2c1203292e23dbc0e11d5bfc7daf5769558ae29ecc1bd
                                          • Instruction ID: 2c41bbd9e20a270d5b045ffd084f82dee71e6654a5cf893047e5a0592357b8d6
                                          • Opcode Fuzzy Hash: 0899256543c42a584bb2c1203292e23dbc0e11d5bfc7daf5769558ae29ecc1bd
                                          • Instruction Fuzzy Hash: 98E03072A08B81D2D710DB51F81445AF3A5FB987C4F808139EB8D47A24CF7CD1A5CB40
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: closesocket
                                          • String ID:
                                          • API String ID: 2781271927-0
                                          • Opcode ID: 28d1a3e97e11a378cd7bab388fd231acb8ccc8f46742947f7eb31e0aaede86b5
                                          • Instruction ID: 3af2b7e1813f0eeb2af7f5c8d1d19b2e45e356c3813ce9a8083695fbf58cb2db
                                          • Opcode Fuzzy Hash: 28d1a3e97e11a378cd7bab388fd231acb8ccc8f46742947f7eb31e0aaede86b5
                                          • Instruction Fuzzy Hash: 4401B932F05551D1FB44EB6AE19837DA3A2EF88B84F888031D70D4B296DFACD4A58351
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: socket
                                          • String ID:
                                          • API String ID: 98920635-0
                                          • Opcode ID: fcdf1e471a768b8d3800e6a5a8fac55e45bbbeaecbd2d52c19637331be9ebc89
                                          • Instruction ID: 4ac0c8a69c54021f6d9ce071a3349a833b37857e58af85701e938fdbd465fe31
                                          • Opcode Fuzzy Hash: fcdf1e471a768b8d3800e6a5a8fac55e45bbbeaecbd2d52c19637331be9ebc89
                                          • Instruction Fuzzy Hash: 2BE02B36E02111C1DF08B76584511B923527B41734FC44771C53D033C0CE2C926AAB10
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _beginthreadex
                                          • String ID:
                                          • API String ID: 3014514943-0
                                          • Opcode ID: a2f10a116a4385fa7276dd3863204c228892657fe7e053c5a7e9772d6e2cbb02
                                          • Instruction ID: 9c1b60b3f0e1d6abd6795b2ba19057c31917fff443860a5e0310ed666a501d3d
                                          • Opcode Fuzzy Hash: a2f10a116a4385fa7276dd3863204c228892657fe7e053c5a7e9772d6e2cbb02
                                          • Instruction Fuzzy Hash: EED0C263B18A00839B10DFA2A840029E252B788770B888739AE7D827E0EB38D1414600
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ioctlsocket
                                          • String ID:
                                          • API String ID: 3577187118-0
                                          • Opcode ID: 590ac8b3d2ea95d7b222035a517254eae77e8f4ea7ddc23fbb583e43bf786d7b
                                          • Instruction ID: 9825a026126d947cceeec098ebd3d5919fd6e653fed2e89f0cc928292f9cf448
                                          • Opcode Fuzzy Hash: 590ac8b3d2ea95d7b222035a517254eae77e8f4ea7ddc23fbb583e43bf786d7b
                                          • Instruction Fuzzy Hash: E1C08056F15581C2C344AF625485087A7B2BBC4344FD56439D10742524DD3CD6E59B40
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                          • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                          • API String ID: 3939785054-690044944
                                          • Opcode ID: 02b158a5d06cb4d669ca7a5a0a1d934c2b7e1cd1307387fd3b949a54989a76ae
                                          • Instruction ID: 388de60c2811d1324a2b35d91913aa28c4195ba88cdddacb64f9b7a227992520
                                          • Opcode Fuzzy Hash: 02b158a5d06cb4d669ca7a5a0a1d934c2b7e1cd1307387fd3b949a54989a76ae
                                          • Instruction Fuzzy Hash: CCC28471E086A2E5FB50ABA594443F9A792EF41B88F884135CE4D0BBC5DFADE445E330
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                                          • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                          • API String ID: 2059720140-3844637060
                                          • Opcode ID: e3f99c3e3755d2d6c1980cd8f88d78ae643bc3364991d747844ef04f6e2ddb54
                                          • Instruction ID: b9b6ae8cd280b9f7fbfe205e1fa3d4935d3d5e8cc6d4c113e301a7444cd25466
                                          • Opcode Fuzzy Hash: e3f99c3e3755d2d6c1980cd8f88d78ae643bc3364991d747844ef04f6e2ddb54
                                          • Instruction Fuzzy Hash: 8A72A421E0CBA2E9FB60ABA5D4503B9E7B2EF45744F844535CE8E02695DFBCE445E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$#211$fwrite$#217calloc
                                          • String ID: ;binary$DN: $LDAP local: %s$LDAP local: %s$LDAP local: Cannot connect to %s:%ld$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                                          • API String ID: 2742731861-78870445
                                          • Opcode ID: e05f186c5871f8e9a1cf914d91ab134c850205750ee5631c653f6314f1df2d2e
                                          • Instruction ID: 02dbfd16163e2367c2afb020deb22bf9efefdc0441e66015aed16f7c6dd6bd1c
                                          • Opcode Fuzzy Hash: e05f186c5871f8e9a1cf914d91ab134c850205750ee5631c653f6314f1df2d2e
                                          • Instruction Fuzzy Hash: 3942B371F09A62E6F714EBA2D8046BDA3A2FB48B88F804475CE0E57755DEBCE405E350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                          • String ID: array$number overflow parsing '$object$object key$object separator
                                          • API String ID: 1664669839-85532522
                                          • Opcode ID: 6bad89433c570a47db82fdfe098d3b7112479f4ef1bdb9ba293033d34251bd8a
                                          • Instruction ID: 3ff48f3437f659b6b362c7e9ce2dd58069512597a1da45a8bdd855300db73cee
                                          • Opcode Fuzzy Hash: 6bad89433c570a47db82fdfe098d3b7112479f4ef1bdb9ba293033d34251bd8a
                                          • Instruction Fuzzy Hash: C0A207B2E18B96D2EF00EBA8D4503AD6362FB45794F805235DA5D03AD9DFBCE084E350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcmp
                                          • String ID: array$number overflow parsing '$object$object key$object separator
                                          • API String ID: 969624648-85532522
                                          • Opcode ID: cc9bd05c10a0952d493baea29dc97bbe2041c0de7411cdd94aa303596c4bb6ca
                                          • Instruction ID: cc7a4d2e27027f312e4782c4a3e2edb70dc0b162e7ca994cf3e8587b81e30892
                                          • Opcode Fuzzy Hash: cc9bd05c10a0952d493baea29dc97bbe2041c0de7411cdd94aa303596c4bb6ca
                                          • Instruction Fuzzy Hash: 5A92F8B2E18B95D2EB10EBA9D4543AD6362FB453A4F804235DA5D07AD9DFBCE084E310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateNameOpenString
                                          • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                          • API String ID: 561913010-2037819326
                                          • Opcode ID: 8fe9d2f109287e050480a03d61a4f1592479ca31c33be7afb087222c66a7d160
                                          • Instruction ID: ab64e370ff9913ba314b6a002281edf8c04bdb3eba332e78a707966063b018b7
                                          • Opcode Fuzzy Hash: 8fe9d2f109287e050480a03d61a4f1592479ca31c33be7afb087222c66a7d160
                                          • Instruction Fuzzy Hash: 8B429FB2E08A62E1FB10EB95D4402BDA7A2FB44B94F808135DE5E07794DFBCE544E760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLastcallocfreegetsockname
                                          • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                          • API String ID: 2454324209-2383553807
                                          • Opcode ID: 31966fe653b7fed37960368b7c06c3862ad6e197602e1853e4edc5743cd8f9e5
                                          • Instruction ID: b1c119ea4dfe489d40d53c303e759876a8fad3b03c20529158c936e333f80d0f
                                          • Opcode Fuzzy Hash: 31966fe653b7fed37960368b7c06c3862ad6e197602e1853e4edc5743cd8f9e5
                                          • Instruction Fuzzy Hash: 3D22E861F0C7A2E2EB50ABA1D4602BDA7A3FB45784FC04036DA4E47685DFBCE505E720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemallocstrncmp
                                          • String ID: public key hash: sha256//%s$-----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----$;sha256//$sha256//
                                          • API String ID: 1436789207-471711153
                                          • Opcode ID: 741c414627603e13976b1654e94c46e7877726b99649eee4496777f13a4975bb
                                          • Instruction ID: aa484cfa2eb0520de3e9b950695d10b9af046eca08499c661db4b6e5d7792f8d
                                          • Opcode Fuzzy Hash: 741c414627603e13976b1654e94c46e7877726b99649eee4496777f13a4975bb
                                          • Instruction Fuzzy Hash: ACA1AF22F09B62E1FB50AFA294202B9E7A6AF55BC4F844475DD5E07794DFBCE401E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$strchr$_strdupmemsetreallocstrncpy$EnvironmentVariabletolower
                                          • String ID: ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy$memory shortage$no_proxy
                                          • API String ID: 1339443121-1021110354
                                          • Opcode ID: 177f44d6cc9a43f31137bfcb0f99dfd393f9e62ec467c212a4ed2979e01c71b4
                                          • Instruction ID: 042991bdfac0703d132b528e28b99ebc956945a2766990056df19ad332cd63ea
                                          • Opcode Fuzzy Hash: 177f44d6cc9a43f31137bfcb0f99dfd393f9e62ec467c212a4ed2979e01c71b4
                                          • Instruction Fuzzy Hash: B102B821E0D7A2E6EB51EB91A4583B9E796EF85784F884035DE8D07785DFBCE404E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                          • String ID: $CurrentUser$schannel: Failed to import cert file %s, password is bad
                                          • API String ID: 4221717217-4282655970
                                          • Opcode ID: 44284fa79ded30185dcaea1d40745ef51c0fc5c25a02b710c190dcfc99000fb8
                                          • Instruction ID: e666d243521fafdc325c627deab9302731c3c6033bbe84d9aada94bf4736bba3
                                          • Opcode Fuzzy Hash: 44284fa79ded30185dcaea1d40745ef51c0fc5c25a02b710c190dcfc99000fb8
                                          • Instruction Fuzzy Hash: 9C81D821F09662E1FB55EFA29850379A392BF45754F849034CE1E02BD0EFBCE440E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$Xbad_function_call@std@@
                                          • String ID: array$number overflow parsing '$object
                                          • API String ID: 958247072-579821726
                                          • Opcode ID: cc42e23da44563c21996daa89caf7799f9ff30c9e3c015dcccd6dd62b989381a
                                          • Instruction ID: 5e2f0c8c4be8caf1cb30cecbfa1138025b50694cbebbd643ccaf85dd235d74ba
                                          • Opcode Fuzzy Hash: cc42e23da44563c21996daa89caf7799f9ff30c9e3c015dcccd6dd62b989381a
                                          • Instruction Fuzzy Hash: CD32E4B2E18B96D6EF10EBA8D4503ED6362FB44794F805235DA5D06AD9DFBCE080E350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                          • String ID: CurrentUser$schannel: Failed to import cert file %s, password is bad
                                          • API String ID: 4221717217-1887299029
                                          • Opcode ID: 46dca4af87e9991eea0c7ad5b1381903ad70e694a6c3f6e92a9794833b808ff3
                                          • Instruction ID: 7eb4cdbbdc1e682c11dbae50567203775ec80f0ae2b8ab9b37133a6cb36661bc
                                          • Opcode Fuzzy Hash: 46dca4af87e9991eea0c7ad5b1381903ad70e694a6c3f6e92a9794833b808ff3
                                          • Instruction Fuzzy Hash: FE81D821F09662E1FB55EFA29850379A792BF45794F849534CE1E42BD0EFBCE440E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno
                                          • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                          • API String ID: 3939687465-1752685260
                                          • Opcode ID: 08efb8bee4486beec1541706793736939f3f5dfdb77aa2eae10172abc41618e9
                                          • Instruction ID: ba778b64e6e1a37bb5bf7289749978df959ed2f25a36af56f6ae94a168bb40f1
                                          • Opcode Fuzzy Hash: 08efb8bee4486beec1541706793736939f3f5dfdb77aa2eae10172abc41618e9
                                          • Instruction Fuzzy Hash: B551B661E0C6A2E6E721EF91E4503BAB3A6FB48744FC04539CA4E42695DFBCE504E720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _errno$strtol
                                          • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                          • API String ID: 3596500743-988243589
                                          • Opcode ID: 630c3f7c29af7cc51b7054100824388b0dc4b27b1364d234017239c35fcdbd3b
                                          • Instruction ID: 422cc1f5140bf8a95fa1e8ad9565b6155d38621bd7851485fe1dde2b696ca30d
                                          • Opcode Fuzzy Hash: 630c3f7c29af7cc51b7054100824388b0dc4b27b1364d234017239c35fcdbd3b
                                          • Instruction Fuzzy Hash: 4FF11672F18522DAEB24EBA884002BCB3BABB44758F905235DE1E57BD4DFBCA4159350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyReleasememset
                                          • String ID: @
                                          • API String ID: 2041421932-2766056989
                                          • Opcode ID: b19f146303758e271180fad454341801ecbff7d7b13df1b0d4adca5799cf73cb
                                          • Instruction ID: b2d25d8b91e28b341003b7079aa865d2943f94c34048487d8bdf378baf2d7cd6
                                          • Opcode Fuzzy Hash: b19f146303758e271180fad454341801ecbff7d7b13df1b0d4adca5799cf73cb
                                          • Instruction Fuzzy Hash: 6E31A332A08A91D6E760DF62E444A6AB7A2FBC8B80F848035EF4E53B14CF7CD445DB14
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                          • String ID: @
                                          • API String ID: 3606780921-2766056989
                                          • Opcode ID: 2faf0608d56b9c58672882d9ff8660f1ea1e60fa0df29c845616acc5bcf4b34a
                                          • Instruction ID: df23cd83ae59e4497b1f8212b001f574cdd892c5d2fca230d8322dea8d334336
                                          • Opcode Fuzzy Hash: 2faf0608d56b9c58672882d9ff8660f1ea1e60fa0df29c845616acc5bcf4b34a
                                          • Instruction Fuzzy Hash: BB217332A18691D6E760EF91E45066AF3A2FFC9B84F845135EA8E03A18CF3CE445DB50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                          • String ID:
                                          • API String ID: 313767242-0
                                          • Opcode ID: 1a54c212ee74d5254ce934133b79b156ec1c6a6db0b5f5b7bb79e8dd12b40982
                                          • Instruction ID: 1968f7ddf6691e0e53d676ede1a2585812b75ad0c2d36290727bcee4ea6b7629
                                          • Opcode Fuzzy Hash: 1a54c212ee74d5254ce934133b79b156ec1c6a6db0b5f5b7bb79e8dd12b40982
                                          • Instruction Fuzzy Hash: B9313076A09A91DAEB60DFA1E8403E9B3A5FB88704F448039DB4E47B94DF78D548C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                          • String ID: @
                                          • API String ID: 3016261861-2766056989
                                          • Opcode ID: 6c2ab8d22f959655aa670125644ca85f2505b009f973729a6368826819c2f17d
                                          • Instruction ID: 6ad4219b91ffb36548ca955ef023f13b80e622f453d27c2463014010f4b47178
                                          • Opcode Fuzzy Hash: 6c2ab8d22f959655aa670125644ca85f2505b009f973729a6368826819c2f17d
                                          • Instruction Fuzzy Hash: BF41AD62A046A09EF710CBB6E4513EE7BB2EB4A348F444065DE9D13A4ACF3C911AE750
                                          APIs
                                          Strings
                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF7316B0ACB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                          • API String ID: 1848478996-631824599
                                          • Opcode ID: 24a53484bc0fd71449e03691ab0ee63bc227999d08d6eb9eaa3694953670cc44
                                          • Instruction ID: e56d06a88e5fdd9474e70730bbb21b5e518aa80597b35a5fa4023ee377a890bd
                                          • Opcode Fuzzy Hash: 24a53484bc0fd71449e03691ab0ee63bc227999d08d6eb9eaa3694953670cc44
                                          • Instruction Fuzzy Hash: 4B118232E18B52E7E744EB96D550379B3A6FF08345F808139CA4D82650EFBCE464D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Crypt$Context$Release$AcquireRandom
                                          • String ID: @
                                          • API String ID: 2916321625-2766056989
                                          • Opcode ID: d013a4cd2a7bfdb85827b6dcfbc84fd0b7fb8600f1af68ad5829e41dc60a1cf5
                                          • Instruction ID: 442569740511b3d7f256a0c105e6a0b85e035d86b93f211bb5ba0f0c7a325702
                                          • Opcode Fuzzy Hash: d013a4cd2a7bfdb85827b6dcfbc84fd0b7fb8600f1af68ad5829e41dc60a1cf5
                                          • Instruction Fuzzy Hash: CFF06261B08651D2E7109B52F844327E3A2EBCC7D4F844434DE8D46A68DEBCD485DB10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                          • API String ID: 0-1379995092
                                          • Opcode ID: 0c1808b9c04dba6c0537016bc3371ffc92631462d09866dd86f1be3741a9d0a2
                                          • Instruction ID: 83883dd4ace0db967318c46c02ed6df8d65765d43f692032837c258c2ad1dcca
                                          • Opcode Fuzzy Hash: 0c1808b9c04dba6c0537016bc3371ffc92631462d09866dd86f1be3741a9d0a2
                                          • Instruction Fuzzy Hash: 3A423632D189A3D5E720AA58990037AE793FF40794FD86630DE5E476C4DFBEE841A720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                          • String ID:
                                          • API String ID: 2933794660-0
                                          • Opcode ID: 2d4f7db5757917a2a277bb3a7b4c4408b8485e3dabffe06df6407e9d8fc6ad37
                                          • Instruction ID: 9b07851c135a320b59215cbac9b9b4fc0517a826b0ac1193fe2ac81fe1a2ec18
                                          • Opcode Fuzzy Hash: 2d4f7db5757917a2a277bb3a7b4c4408b8485e3dabffe06df6407e9d8fc6ad37
                                          • Instruction Fuzzy Hash: DC114C26B14F11D9EB00EBA1E8442A873B4F758758F840E35DB6D867A4DFB8E154D390
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                          • String ID:
                                          • API String ID: 2110207923-0
                                          • Opcode ID: 4e60c33a2d61307284ef8c5db994e199559ff52cdd7cb4eb6751c0d29896966e
                                          • Instruction ID: aa772b27a1f438b464ca4079230f8a3528dc3a72701545e2fa4459c8c89f726e
                                          • Opcode Fuzzy Hash: 4e60c33a2d61307284ef8c5db994e199559ff52cdd7cb4eb6751c0d29896966e
                                          • Instruction Fuzzy Hash: 0E01D436A08A51D2EB10DF61E04436AF372FB88BC8F548435DB4D02A68CF7CD488DB50
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Crypt$AcquireContextCreateHash
                                          • String ID: @
                                          • API String ID: 1914063823-2766056989
                                          • Opcode ID: dd62d4f9d256574e6267e05a13928312c03464707a5dda229d01d497ea16c598
                                          • Instruction ID: eb5de89618ecb5eacefb0b40365371f037ff26ea72253be9711b00628973e00e
                                          • Opcode Fuzzy Hash: dd62d4f9d256574e6267e05a13928312c03464707a5dda229d01d497ea16c598
                                          • Instruction Fuzzy Hash: 9DE0D861F18562C3F7309B65E401B16A392FB88748F888034CF4C06A14CF7CD145CB54
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _getpidhtons
                                          • String ID:
                                          • API String ID: 3416910171-0
                                          • Opcode ID: 09a5b7d0a19d5a5080428c22b692b7231929b54e28db978406f224c4a795607f
                                          • Instruction ID: 2cb71a12ea2bee45ea3d1857c12386d2eaf0b7c394c5f06daa45a4338da0ee7c
                                          • Opcode Fuzzy Hash: 09a5b7d0a19d5a5080428c22b692b7231929b54e28db978406f224c4a795607f
                                          • Instruction Fuzzy Hash: 1E115A22A247D0DAD304CF76E4001AD77B0FB5CB84B44D62AFB8987B18EB78D690C744
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Xbad_function_call@std@@
                                          • String ID:
                                          • API String ID: 1029415015-0
                                          • Opcode ID: 4d64e340ef3a35a6a2b2a55b040ebe7d34003aab0ad24f2f85e2358cbc881d9c
                                          • Instruction ID: 7cdee86fe711930d6bb72ae3c7e1df53dac07191fbc7e366ab504ed4afa76f13
                                          • Opcode Fuzzy Hash: 4d64e340ef3a35a6a2b2a55b040ebe7d34003aab0ad24f2f85e2358cbc881d9c
                                          • Instruction Fuzzy Hash: C681ACA3B18BA9D9EF00DBA9D0943ACA7B2E745B48F984022CF8D07795DF79D040D364
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                          • Instruction ID: 0879ccc65b74f6cb9d0b55cae3cc2090e86c25326dcc9d79bcf9a8ec00fb87e0
                                          • Opcode Fuzzy Hash: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                          • Instruction Fuzzy Hash: C06127A2F1AB9492EB10DB69E8502B9A362E7597D4F908231DF5D477C9EF7CE041D300
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                          • Instruction ID: fbe477916b6c33231869a857a75229df7d32f96f502d57348422e82122b8d485
                                          • Opcode Fuzzy Hash: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                          • Instruction Fuzzy Hash: 8C416133B1555487E78CCE2AC8256AD73A2F3D9304F95C23DEA1AC7385DE399905CB40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                          • Instruction ID: 28ce4826a97dd9fd2936bf5fb4d741eebd07964e919590767be3b9dd5f6fbf8f
                                          • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                          • Instruction Fuzzy Hash: C5F08C65725B67BEFE40853B4624FBD5E519BC0700FA369748C80020CBCAAE5493D724
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2531883bdb2675076cff1241557530729214863f5c933d0601999c3a7faa8fa8
                                          • Instruction ID: 59ce9bb87cc3754578f00cc3a6d1922d1bd964fcdd08c26072b27d4ca88f838e
                                          • Opcode Fuzzy Hash: 2531883bdb2675076cff1241557530729214863f5c933d0601999c3a7faa8fa8
                                          • Instruction Fuzzy Hash: B6A01122A0A80AC0A3208B02E2A0E20A3A2FB8CB883808020880E028208E28A002C300
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9c8db9603258850444462101a3ae1cdcc35cbb873210dfaf0ec72ac43398cd4d
                                          • Instruction ID: 6041bee71ab35545a7fd10a993741568a71520419ed19561364980a5aad151b2
                                          • Opcode Fuzzy Hash: 9c8db9603258850444462101a3ae1cdcc35cbb873210dfaf0ec72ac43398cd4d
                                          • Instruction Fuzzy Hash: AEA00125D2CD26F0EB14EB82A950024A7B6BB54305B869035C20E410609EBCA600A2A0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$CounterPerformanceQuery
                                          • String ID: Closing connection %ld
                                          • API String ID: 3490100708-2599090834
                                          • Opcode ID: cdcbae72db95bf63457d18ded92aa631f3e30a14882dcc80f85a26a89bb00687
                                          • Instruction ID: 899f25d9daba6e094d0f58ddb3db71f1d683227e783c6a22e6348e5816b977fd
                                          • Opcode Fuzzy Hash: cdcbae72db95bf63457d18ded92aa631f3e30a14882dcc80f85a26a89bb00687
                                          • Instruction Fuzzy Hash: 27C14A76A08B91D2E750AF61E4502AC7336FB85F98F480235DEAD07659CF78D155E330
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                                          • API String ID: 1294909896-2200874227
                                          • Opcode ID: 8e4fe92576e85a1649832a746bfe2ac2763d99e700bc8479731e5c23ff789ab4
                                          • Instruction ID: 84512bf23fcf663c71580ab2b42ee6d68714d977309e0dc91ca4105012ce7288
                                          • Opcode Fuzzy Hash: 8e4fe92576e85a1649832a746bfe2ac2763d99e700bc8479731e5c23ff789ab4
                                          • Instruction Fuzzy Hash: CF029021E097A2E2EB60FB91E8403BAA392EF44784F844035CE4D47795EFBCE545E760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfree$strpbrk
                                          • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                          • API String ID: 2737852498-2994854565
                                          • Opcode ID: b3c887b8b654f7e6ab9bd426e25545138578bed1ec83a85998221e109ef5ae0e
                                          • Instruction ID: cb202631c0252628370ca5985d0369cd9fe05d9514b0cf9955d124c59d5e6f18
                                          • Opcode Fuzzy Hash: b3c887b8b654f7e6ab9bd426e25545138578bed1ec83a85998221e109ef5ae0e
                                          • Instruction Fuzzy Hash: 5AD1A021F09B72E2FB10EBA198102B9A3A2BF45B94F944575DD4E07781DFBCE505E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc$memcpy$htonl
                                          • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                          • API String ID: 82385936-242323837
                                          • Opcode ID: b5ce5a9e2a0b33df0e939376c1fe06cecc69fbaa3637c0c0980714c72d35468e
                                          • Instruction ID: 4422a3e4381acd214d573bf222b9b8e63e0ec1ec35a22d4e5432f84236fa56f1
                                          • Opcode Fuzzy Hash: b5ce5a9e2a0b33df0e939376c1fe06cecc69fbaa3637c0c0980714c72d35468e
                                          • Instruction Fuzzy Hash: C5C13C71F18A62D6E710ABA5E4542ADB7B6FB45B88F804035DE8E43B54CFBCE405E720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: calloc$_strdupfreehtonsmemset
                                          • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                          • API String ID: 130798683-4053692942
                                          • Opcode ID: b7ea18d54f0fbc825fb5669daafabcae6a8462ca2209896e4bea7f4fb4aa7d12
                                          • Instruction ID: 93bfd7d512ac56086d8f9e00f60e0e4afe687662c88159cad2d2fa7da05bab27
                                          • Opcode Fuzzy Hash: b7ea18d54f0fbc825fb5669daafabcae6a8462ca2209896e4bea7f4fb4aa7d12
                                          • Instruction Fuzzy Hash: 60E19072E08AA2E6EB60AF61D4403B9B7A6FB84B88F844135DE4D07745DFBCE544D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                          • String ID: array$number overflow parsing '$object
                                          • API String ID: 1346393832-579821726
                                          • Opcode ID: 612217a731006b17a9bf7d36795b1e63913d7f320859813cc151115b1c0ee28f
                                          • Instruction ID: 4487b4aba12b25cf05d0172ad3cc8eb5113bf01dd5b95a92262e3e306a11f784
                                          • Opcode Fuzzy Hash: 612217a731006b17a9bf7d36795b1e63913d7f320859813cc151115b1c0ee28f
                                          • Instruction Fuzzy Hash: 9A12E7B2E18796D2FB00EBA8D4543AD6362FB457A4F805235DA5D02AD9DFBCE081E350
                                          APIs
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E4D6
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E4FC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E50D
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E57B
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E5AC
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E5CC
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E5DE
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E640
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E6B1
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E6C8
                                          • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E783
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E7F7
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF73169DC0F), ref: 00007FF73169E800
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr$free$_strdupcalloc
                                          • String ID: LDAP$base$one$onetree$sub$subtree
                                          • API String ID: 112326314-884163498
                                          • Opcode ID: b72b3b6b8f8b35fc2830f8e4368748d3916e01b9f25a2d53a481e4d0df09ac53
                                          • Instruction ID: f2194ff275885a71fbbaf54cf86bc7d1fa1865eb77f661c187bf64238e7ec79b
                                          • Opcode Fuzzy Hash: b72b3b6b8f8b35fc2830f8e4368748d3916e01b9f25a2d53a481e4d0df09ac53
                                          • Instruction Fuzzy Hash: 83B1AF26E09B62E2EB51EB95940067DA3A2FF44B84FC48475DE8D07784EF7CE451E720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memchrstrtol
                                          • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                          • API String ID: 1626215102-895336422
                                          • Opcode ID: 79dfef3ee0d82b343d4b81e40e272c507a7aa2e2bd38e7d364f08c563dddb735
                                          • Instruction ID: 354d82d3df18636cf27f41abea6f16c624b7bf27337fe96addf18aa4fb4e7bb4
                                          • Opcode Fuzzy Hash: 79dfef3ee0d82b343d4b81e40e272c507a7aa2e2bd38e7d364f08c563dddb735
                                          • Instruction Fuzzy Hash: 6261A360E0C662F6FB14EB9699002B9A752AF417E4FC08132D91E4B7D5DFBCE106E360
                                          APIs
                                            • Part of subcall function 00007FF731666070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731670670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316624A1), ref: 00007FF731666097
                                            • Part of subcall function 00007FF731666070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731670670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316624A1), ref: 00007FF7316660A3
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73166C9D4
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73166C9DC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73166CA03
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73166CA0C
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73166CA90
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73166CA99
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                          • API String ID: 1294909896-1595554923
                                          • Opcode ID: 6bdb922d749ab1fe29328e538f3ef6b7cd3e7e9cfbaf12b4b060728a50306d1a
                                          • Instruction ID: 80c79e0f309bfa7d3c733423f4192000fd6697e3c1195e549d5f2ea67b424a09
                                          • Opcode Fuzzy Hash: 6bdb922d749ab1fe29328e538f3ef6b7cd3e7e9cfbaf12b4b060728a50306d1a
                                          • Instruction Fuzzy Hash: 84E18521F09BA2E1EB65AB9295402B9A7B2BF05B84FC84435CE4D47641DFBCF854E360
                                          APIs
                                            • Part of subcall function 00007FF731654350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF731654381
                                          • memcpy.VCRUNTIME140 ref: 00007FF7316564C6
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF731656558
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF731656599
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316566E3
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731656722
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731656770
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316567B1
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165680E
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316568C8
                                            • Part of subcall function 00007FF7316AFB48: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF73165442E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF7316AFB62
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731656909
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316569D6
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731656A17
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF731656A3A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                                          • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                                          • API String ID: 264867259-3075834232
                                          • Opcode ID: 5ddee20f24811701f88de3ed6b3b9c5beeb918b66c6a729a8a008020f288624f
                                          • Instruction ID: 49a8bb345a46e162fad6ae0fe51cfbe76c8aa4448ffef439331bb284e55c4c2b
                                          • Opcode Fuzzy Hash: 5ddee20f24811701f88de3ed6b3b9c5beeb918b66c6a729a8a008020f288624f
                                          • Instruction Fuzzy Hash: 1D12D7B2F08652D1FB10EBA5E41036DA762EB447A8F804635DA6D037DADFBCE485E350
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                          • String ID:
                                          • API String ID: 1087521380-0
                                          • Opcode ID: 38ea0279ecf3060a7191ead8b4a3581ef11fd8d8a316d763dfd1daf95e724c62
                                          • Instruction ID: 8657f55ebfafcec5f34bd0fb9dbb6301988941b0ffc9b30b1737cbce9346b3e6
                                          • Opcode Fuzzy Hash: 38ea0279ecf3060a7191ead8b4a3581ef11fd8d8a316d763dfd1daf95e724c62
                                          • Instruction Fuzzy Hash: 4CB18121F0AB62E5EB55AFA59914378A7B2AF45B94F881134CE5D43780DFBCE850E330
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchrstrrchr$_strdupstrstr
                                          • String ID: .$/$/$/$?
                                          • API String ID: 2325335452-1821401756
                                          • Opcode ID: 9261ab79bdb83ea22a8fa9ae64580533c3681aa6c0cda1dfe81c3d98f48dc030
                                          • Instruction ID: e1592c669fa5a2072dbaf06af4e8e56715ce4f70576a8014fe5ba10a7a668dd6
                                          • Opcode Fuzzy Hash: 9261ab79bdb83ea22a8fa9ae64580533c3681aa6c0cda1dfe81c3d98f48dc030
                                          • Instruction Fuzzy Hash: BE81E212E0C6E2E2FB65AB95910077DEB93AF45784F8844B1CE9D063C6DEBCE455B320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr$free
                                          • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.70.0%sQUIT$CLIENT libcurl 7.70.0DEFINE %s %sQUIT$CLIENT libcurl 7.70.0MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                                          • API String ID: 3578582447-31095704
                                          • Opcode ID: 3818cbc8e39213c928cda0c38d8a3541617fcfd322a322e3fd4af905bb9cf079
                                          • Instruction ID: 0dde6987ae75b58c5a4dcb2e23fa26cc10058df1200e79d069fe8694da712cd5
                                          • Opcode Fuzzy Hash: 3818cbc8e39213c928cda0c38d8a3541617fcfd322a322e3fd4af905bb9cf079
                                          • Instruction Fuzzy Hash: BD818F21E0D6A2F2FB51BB9299502B9E793AF45BC4FC88071C94D07785DEACE605E330
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 8259ff6e623f5e8fe84b6f773224f5a953ae370b270943317448fd41960c9f86
                                          • Instruction ID: d3187fb652bf44b986c56e4aeadd1f06e5ffbd1315ff0e2acea3e8754fce78fd
                                          • Opcode Fuzzy Hash: 8259ff6e623f5e8fe84b6f773224f5a953ae370b270943317448fd41960c9f86
                                          • Instruction Fuzzy Hash: B991C276A08B91E3E7499F71E9902A8B368F749F48F440139EFAD47354CF74A261E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                                          • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                          • API String ID: 3103143820-2414412286
                                          • Opcode ID: b4f9b2d5e7cbae1782e3f6f8a12a44ccccba11d09565d8c439cd8e380772ba0a
                                          • Instruction ID: a4a873b69e423ca4bd3d696d661492777467afbcf11e9a0c81f0a37156b7a54c
                                          • Opcode Fuzzy Hash: b4f9b2d5e7cbae1782e3f6f8a12a44ccccba11d09565d8c439cd8e380772ba0a
                                          • Instruction Fuzzy Hash: A8D19522F096A2E3EB54EBA1E5402BDE3A2FB45B84F800036DB4D07A55DFBCE560D710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                                          • API String ID: 1294909896-874090715
                                          • Opcode ID: 093fa01c1f5bd7a98eb4c303981484f46682d263194a912cf4eeb29883cd8169
                                          • Instruction ID: c2afc6b24b8e047a1e0a60b4e0c0b025fc13c12d781749d4ef243f2add29b405
                                          • Opcode Fuzzy Hash: 093fa01c1f5bd7a98eb4c303981484f46682d263194a912cf4eeb29883cd8169
                                          • Instruction Fuzzy Hash: 07A1C132F08662E6FB10EBA1D8546BDA7A6BB44794F844931DE8C53785DFBCE504E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                                          • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                                          • API String ID: 2243338858-131330169
                                          • Opcode ID: 9bb391558646337b25e735532d6e92d88ebe20401bd44c15c974a5a0c0c4ffcd
                                          • Instruction ID: fe5fb7db4eedd04012779ac71094247e91e2da62d3ef01cfe82408ab1603aec8
                                          • Opcode Fuzzy Hash: 9bb391558646337b25e735532d6e92d88ebe20401bd44c15c974a5a0c0c4ffcd
                                          • Instruction Fuzzy Hash: 8191AF22F08B92E7EB54AB659444379A3E2FB85B80F944076DE9E03795DF7CE440E710
                                          APIs
                                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316719F9,?,?,00000000,00007FF731671F35), ref: 00007FF73166AD43
                                          • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316719F9,?,?,00000000,00007FF731671F35), ref: 00007FF73166ADBD
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316719F9,?,?,00000000,00007FF731671F35), ref: 00007FF73166ADE1
                                          • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316719F9,?,?,00000000,00007FF731671F35), ref: 00007FF73166AE30
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316719F9,?,?,00000000,00007FF731671F35), ref: 00007FF73166AE6A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316719F9,?,?,00000000,00007FF731671F35), ref: 00007FF73166AE7C
                                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316719F9,?,?,00000000,00007FF731671F35), ref: 00007FF73166AE8F
                                          • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316719F9,?,?,00000000,00007FF731671F35), ref: 00007FF73166AEAA
                                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316719F9,?,?,00000000,00007FF731671F35), ref: 00007FF73166AEC0
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316719F9,?,?,00000000,00007FF731671F35), ref: 00007FF73166AEC9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$fclose$__acrt_iob_func_unlinkcallocfputsqsort
                                          • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                          • API String ID: 1368378007-4087121635
                                          • Opcode ID: 344d1e83408e5aa8c09dd1b5b124e3602bc2af5de0146423da4577ad8867d292
                                          • Instruction ID: f6372f72f72e4000637ad1bd058f5c5d7f70fa6a72cf202ab661f7173d2e753f
                                          • Opcode Fuzzy Hash: 344d1e83408e5aa8c09dd1b5b124e3602bc2af5de0146423da4577ad8867d292
                                          • Instruction Fuzzy Hash: 2D519211F0D662E2FF65BBA29D1427AA3B2AF45B85FC49434CD4E06350EEBCE404F260
                                          APIs
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165560E
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF73165563C
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF73165564A
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731655684
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316556D5
                                          • memset.VCRUNTIME140 ref: 00007FF731655503
                                            • Part of subcall function 00007FF731654350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF731654381
                                            • Part of subcall function 00007FF731656350: memcpy.VCRUNTIME140 ref: 00007FF7316564C6
                                            • Part of subcall function 00007FF731651FF0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652161
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731655842
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF73165586E
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF73165587C
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316558B7
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165590A
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316559F1
                                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF731655A09
                                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF731655A16
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                                          • String ID: value
                                          • API String ID: 2102519606-494360628
                                          • Opcode ID: 0681b0cbd6cc313949f343e8ef1c8002e7ee2f51d413c373bf9241906f22b9b9
                                          • Instruction ID: 15d3af6d9b592601f159889c2845d944b2bcb7d6ca9951b8b61413e25d707be8
                                          • Opcode Fuzzy Hash: 0681b0cbd6cc313949f343e8ef1c8002e7ee2f51d413c373bf9241906f22b9b9
                                          • Instruction Fuzzy Hash: ECF10962E086D1D5FB10EBB5E4543ADA762EB857A4F404231EAAD03AE9DFBCD085D310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Cert$CertificateCertificatesContextEnumFreeStore
                                          • String ID: ALPN, server did not agree to a protocol$http/1.1$schannel: ALPN, server accepted to use %.*s$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                                          • API String ID: 2572311694-3353508759
                                          • Opcode ID: 103a66c3a53550784711af1dfa48bdffb5b22969c7d859b1a8e8efaaf0d7177c
                                          • Instruction ID: b087e48b4b467a4fd33c43d6303c03b428ae601dda9560d8184eb0caf9941166
                                          • Opcode Fuzzy Hash: 103a66c3a53550784711af1dfa48bdffb5b22969c7d859b1a8e8efaaf0d7177c
                                          • Instruction Fuzzy Hash: 61B1D472E08A62E5EB60EB55D8143B9A393FB84B84FC44035CA1D47B95DFBCE401E760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$strchr$_strdup
                                          • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                          • API String ID: 1922034842-2519073162
                                          • Opcode ID: 618ecbf9edcba6c5a583dceb0031c8d968e55155e3ae0f44d7de65b39f56fd4a
                                          • Instruction ID: 7d7bb3fa4f77c296f8cfd383a5f5bf90b396eebe64a2109db66b40ab91a04748
                                          • Opcode Fuzzy Hash: 618ecbf9edcba6c5a583dceb0031c8d968e55155e3ae0f44d7de65b39f56fd4a
                                          • Instruction Fuzzy Hash: E091CC21E09672E6FB61EB51D410379E792AF48B84FC44039CE4E47AD5EEADE541E330
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7316A066F), ref: 00007FF7316AD96D
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0000000100000000,?,00007FF7316A066F), ref: 00007FF7316AD98F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7316A066F), ref: 00007FF7316AD9A0
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF7316A066F), ref: 00007FF7316AD9CE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: ../$/..$/../$/./
                                          • API String ID: 111713529-456519384
                                          • Opcode ID: 61c15189d735682e971e48453faa0514a71c150c6ab138010393682c7d56857a
                                          • Instruction ID: 0f1b61057851719440e2a49e5342b9917a338608c28ae657ebd1fb8c7d686c02
                                          • Opcode Fuzzy Hash: 61c15189d735682e971e48453faa0514a71c150c6ab138010393682c7d56857a
                                          • Instruction Fuzzy Hash: 637120E1E0C6A2E1FB21BB51991027DEBA3AB55B94F844171CF9D026D6DFBCE051E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                          • API String ID: 111713529-3006446216
                                          • Opcode ID: ead7ad64410cf63012cd3b6e98572aabadeff694823e11d38ff1ffd43fa03750
                                          • Instruction ID: 2094ff989fd8638c24ecd106816fdfb1831e1f1be62658be650d4fd140a58aeb
                                          • Opcode Fuzzy Hash: ead7ad64410cf63012cd3b6e98572aabadeff694823e11d38ff1ffd43fa03750
                                          • Instruction Fuzzy Hash: 3F71FBE2E0D7D2E5EB11EBA590142B9FBA6EF46749F985072CA4E03351DF6CD405E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                          • API String ID: 2190258309-1086287758
                                          • Opcode ID: d6ceaab0806046a6fad15daabaa3b331c93cb5b9507ece998b51a21d75b291da
                                          • Instruction ID: 7373eddda2329bbb6ccbe44b67c77067b562abaf422a8062321e133fd14829fa
                                          • Opcode Fuzzy Hash: d6ceaab0806046a6fad15daabaa3b331c93cb5b9507ece998b51a21d75b291da
                                          • Instruction Fuzzy Hash: DDB16072E08B56D6EB10AFA5E8402ADB7A5FB48B88F800039DE8E47B54DF7CD544E710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                          • API String ID: 1294909896-1220118048
                                          • Opcode ID: f0158090d86be3429eb3269982509cc72675253f20fd575ca3fe3ae1e362a893
                                          • Instruction ID: 64a7cdbcf43ab2a88f65a9d2b3e13a20c0f269d712a2b5584d6f20f5b1920073
                                          • Opcode Fuzzy Hash: f0158090d86be3429eb3269982509cc72675253f20fd575ca3fe3ae1e362a893
                                          • Instruction Fuzzy Hash: 427192A1E09766E1EB10EBE2A4501F9A3A2FF48B84F944032DE4D03796EFBCD505D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloctolower
                                          • String ID: %%%02x
                                          • API String ID: 1244608590-4020994737
                                          • Opcode ID: cc941b5b1586ca65034f02fda84f81cd4fb17835c43a73507d46e3afe6f7d722
                                          • Instruction ID: efdf2dcaf7fba6fd6f1a30a9053c7bcdbb2b3405747d80cdedfd7972fc50e8b5
                                          • Opcode Fuzzy Hash: cc941b5b1586ca65034f02fda84f81cd4fb17835c43a73507d46e3afe6f7d722
                                          • Instruction Fuzzy Hash: B5A1B812E0D2B2E6FB616B659110379AFE69F05B84F8A44F1DE8D462C5DEACE444F330
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memcmp
                                          • String ID: $CAPABILITY$EXAMINE$EXPUNGE$FETCH$LIST$LSUB$NOOP$PREA$SEARCH$SELECT$STORE$UID$Unexpected continuation response
                                          • API String ID: 1475443563-555813803
                                          • Opcode ID: f824413ec63595f229157022f7262be96b8ecc5a249fb8cb69c045449cfec291
                                          • Instruction ID: a7668e7edcf45948b3d2008e4f3749111041ec30745e90020db684cc3bf11eb4
                                          • Opcode Fuzzy Hash: f824413ec63595f229157022f7262be96b8ecc5a249fb8cb69c045449cfec291
                                          • Instruction Fuzzy Hash: C5D15F63E0C662F1FB256E91CD142B8E7A3AB11794FC49071DA1D46986EFECE841E331
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID:
                                          • API String ID: 111713529-0
                                          • Opcode ID: 621cbfd0ee36ffef54caf14af25ee3b9e37cafa5b82458fd53113b4841491521
                                          • Instruction ID: ece47d4fc7db68540f43cef500c0e896645997ac0c5657defbdaa6722b0586f1
                                          • Opcode Fuzzy Hash: 621cbfd0ee36ffef54caf14af25ee3b9e37cafa5b82458fd53113b4841491521
                                          • Instruction Fuzzy Hash: 81618D76A05B51D2EB25DF56A454229B3A1FB88B84B858035CF8E43B90EF7CE494E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                          • API String ID: 1294909896-2312071747
                                          • Opcode ID: a0623ea6344bcf45b5f90fc84e39796b348e01075dae96949922a8793e9a13ae
                                          • Instruction ID: 101776d9a10c4beee1331c0ad9b1bfcc78bd26f7734f805be462b3e7886d2370
                                          • Opcode Fuzzy Hash: a0623ea6344bcf45b5f90fc84e39796b348e01075dae96949922a8793e9a13ae
                                          • Instruction Fuzzy Hash: F9D1E721E0D6A2E7EBA4FBA194503BDA352FB45754FC04279CA6E076C1DFACE444A360
                                          APIs
                                            • Part of subcall function 00007FF731654350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF731654381
                                            • Part of subcall function 00007FF731656350: memcpy.VCRUNTIME140 ref: 00007FF7316564C6
                                            • Part of subcall function 00007FF731651FF0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652161
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165A891
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF73165A8BF
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF73165A8CD
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165A907
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165A964
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165AA1D
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF73165AA4B
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF73165AA59
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165AA93
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165AAE4
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165AB2E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                          • String ID: value
                                          • API String ID: 3212548336-494360628
                                          • Opcode ID: 6b5334c8dc40afd695f9f5f7814dc70773cd0d43c74a1f3ab58cc3c0daa169ad
                                          • Instruction ID: 0c76caa15857ba6a1a08ecd56dcaaff30c5edd21789dc6dba944194b809ba9f2
                                          • Opcode Fuzzy Hash: 6b5334c8dc40afd695f9f5f7814dc70773cd0d43c74a1f3ab58cc3c0daa169ad
                                          • Instruction Fuzzy Hash: 60A1E772E18A91D6EB00EBA9E4543AD6362FF453A4F805335DA6D02AD9DFBCE081D350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                          • String ID: Set-Cookie:$ignoring failed cookie_init for %s$none
                                          • API String ID: 4109794434-4095489131
                                          • Opcode ID: 0eeaf11df58c9bde20a6e3c1becd47c5d211bcaa5ae6dfd947c6e12309e66ec9
                                          • Instruction ID: e2fed85580f9768e7f3b21572e5c3c9aecdf6fca386b2dc0eb4cc538e0c2762d
                                          • Opcode Fuzzy Hash: 0eeaf11df58c9bde20a6e3c1becd47c5d211bcaa5ae6dfd947c6e12309e66ec9
                                          • Instruction Fuzzy Hash: 5161E221F0C7A2E1EB50AB6199042BDA7A6FF45B84F885439DE8D03781DFBCE401E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$calloc$malloc
                                          • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                          • API String ID: 3103867982-1477229593
                                          • Opcode ID: abcaebdcec3108e36cd59e43220c0eb99015a202a648407847131c0655e3d7ce
                                          • Instruction ID: bcd7edfa05e555a02eea4bcabe1eddd69780c19114e98551847c28159d0986c3
                                          • Opcode Fuzzy Hash: abcaebdcec3108e36cd59e43220c0eb99015a202a648407847131c0655e3d7ce
                                          • Instruction Fuzzy Hash: 25C13AB2A04B61D6EB10EFA5E4502ADB7B6FB44B88F400036DE4D87B58DFB8D845D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Issuer: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$Issuer$Subject$TRUE$Version
                                          • API String ID: 2190258309-1457932261
                                          • Opcode ID: ffcff0d822d8f7f5c7eb8353cc099688e07f61669229ae3a7ba24ad747551c18
                                          • Instruction ID: c5c7378dcc7f1ba902f6aecf41cd0ff92971e37e1e48d4739279d7e8e16b5a20
                                          • Opcode Fuzzy Hash: ffcff0d822d8f7f5c7eb8353cc099688e07f61669229ae3a7ba24ad747551c18
                                          • Instruction Fuzzy Hash: C061F2A1E0D7A2E1EB11EBA194143FAA392BB45794FC48536CE5D07395EFBDE104D320
                                          APIs
                                          • memset.VCRUNTIME140 ref: 00007FF73169A6CB
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73169A7F5
                                            • Part of subcall function 00007FF731666070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731670670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316624A1), ref: 00007FF731666097
                                            • Part of subcall function 00007FF731666070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731670670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316624A1), ref: 00007FF7316660A3
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73169A7AF
                                            • Part of subcall function 00007FF731665FD0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF731665FE0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freestrncpy$_strdupmemset
                                          • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                          • API String ID: 3826632026-748038847
                                          • Opcode ID: 59a0c5fa885d2920454bd0d086efa8d0fdb8e179524ebb4e6a53ff4d96d24a27
                                          • Instruction ID: 0ecfa471dd6e8ea375af291f7ba1d7b93f86bd8a054a259f179abfc5ec928032
                                          • Opcode Fuzzy Hash: 59a0c5fa885d2920454bd0d086efa8d0fdb8e179524ebb4e6a53ff4d96d24a27
                                          • Instruction Fuzzy Hash: 41718C31E0CAD2E1FB21AF55D4412E9A3A2FB84784F845032DA8D47254EFB8D545E760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: sendto$ErrorLast
                                          • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                          • API String ID: 4042023021-4197595102
                                          • Opcode ID: 85231d28fff2e654bee0dea8e08f6af6eeea1f587eb2a535d9c6f41173a7fb84
                                          • Instruction ID: f671aab9aaf37c67b0045743c88f998d483e6acba120645eece7dd993a1f7193
                                          • Opcode Fuzzy Hash: 85231d28fff2e654bee0dea8e08f6af6eeea1f587eb2a535d9c6f41173a7fb84
                                          • Instruction Fuzzy Hash: 40B1C272A086A2D6E721EF69D8403ADB7A2FB48F88F844132CE4D4B759DF78D401D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLastsend
                                          • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                          • API String ID: 1802528911-931584821
                                          • Opcode ID: c0ccde3566b09747bdcd1574ce02ccefcf66fd362645a6cd761a98cee10aabe0
                                          • Instruction ID: 79bc05d7c326e2b0eb86e9b05a81d4e188b031bc3ae6f2431784e76036febc3e
                                          • Opcode Fuzzy Hash: c0ccde3566b09747bdcd1574ce02ccefcf66fd362645a6cd761a98cee10aabe0
                                          • Instruction Fuzzy Hash: 5F91DF22A08AD1E5F721AF94E4047EAA3A2FF847A8F840235EE4D07B85DF7CD245D350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: sendto$_time64
                                          • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                          • API String ID: 2327272419-1785996722
                                          • Opcode ID: fbf5753c1b2dcb24c4e6be8a7fbe5a8ea5f7a693a1b0e401017e265d019b06a4
                                          • Instruction ID: 551655bf21addb64fdbeeabbb7b06de4321596c68244624855181b4987e68be8
                                          • Opcode Fuzzy Hash: fbf5753c1b2dcb24c4e6be8a7fbe5a8ea5f7a693a1b0e401017e265d019b06a4
                                          • Instruction Fuzzy Hash: B691AE32A186A1D6E711DF69D4403A97BA1FB88F88F848136CA4D4B768DF79D406D360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdup$freestrchrstrncmpstrtol
                                          • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                          • API String ID: 2070079882-2404041592
                                          • Opcode ID: d0dbf708304496b083f23b7e812b48d865a99afd1e2578677d33c2e86739b3fa
                                          • Instruction ID: c80dcb714889f6e966976191720720f206fc418f274bb37ba4b5251709efaa14
                                          • Opcode Fuzzy Hash: d0dbf708304496b083f23b7e812b48d865a99afd1e2578677d33c2e86739b3fa
                                          • Instruction Fuzzy Hash: D951FA21E086E6E6FB51ABA59424379E7D39F05B84FC84031CECD062C1DFACE545E720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                          • String ID: Set-Cookie:$none
                                          • API String ID: 4109794434-3629594122
                                          • Opcode ID: 9f5bed46c0964185472ff9964054de0d46ab92f24e80c46b5d6bfa1eefba3946
                                          • Instruction ID: 1c27966e10b28506e0e4187475cb173dcc852f0e71b15db89a79d7aa506d6e84
                                          • Opcode Fuzzy Hash: 9f5bed46c0964185472ff9964054de0d46ab92f24e80c46b5d6bfa1eefba3946
                                          • Instruction Fuzzy Hash: D851C521F0D7A2E1FB55AB916910279E7E2AF45B80F955438CE8E03781DFBCE446E360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memcpy
                                          • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                          • API String ID: 3510742995-1652449680
                                          • Opcode ID: 0a5120772036d3f2536d4dc9d905eb8926beb600ab6b3706c495f539b64e461b
                                          • Instruction ID: 658927d0fcbfd835aea467f93b8e3124ae9c8b32efe0705b8837690f6d0d7f19
                                          • Opcode Fuzzy Hash: 0a5120772036d3f2536d4dc9d905eb8926beb600ab6b3706c495f539b64e461b
                                          • Instruction Fuzzy Hash: 6FA1A431E08AA3E1EB50EFA1D4503F9A392EB44B98F945131DE0D5B285EFBCE445E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                          • API String ID: 1294909896-3146291949
                                          • Opcode ID: c6d6408244153583df09f91122f28af32bbeb0fa9cc065ef9557b59c520eb09d
                                          • Instruction ID: ca57e7572c225466cb952253a23f4b54b5fea053218b332ac624c6efb3ec4387
                                          • Opcode Fuzzy Hash: c6d6408244153583df09f91122f28af32bbeb0fa9cc065ef9557b59c520eb09d
                                          • Instruction Fuzzy Hash: 2091A721F0DB62E6FB64ABA1945037DA392EF45788F844035CB5D07A81EFACF460E361
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc$_time64calloctolower
                                          • String ID: :%u$Shuffling %i addresses
                                          • API String ID: 133842801-338667637
                                          • Opcode ID: 37e83f0708112b4b4e4d776fa3a74a9243a2a4ff4985d18aaf8c6fe5b855d056
                                          • Instruction ID: a8413d699eac592921fbe4c7316a3d2c140095b637dc2fbb91a2a6311533d068
                                          • Opcode Fuzzy Hash: 37e83f0708112b4b4e4d776fa3a74a9243a2a4ff4985d18aaf8c6fe5b855d056
                                          • Instruction Fuzzy Hash: 7671E576E08AA2D1EB10AF55E5007BDA7A6FB48B98F844531CE5E07394DF7CE458D310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                          • API String ID: 1865132094-1312055526
                                          • Opcode ID: 31c77a37b0c0b8fbe5e53ac8bd18da749b3546c27af0e0e94c4b5068321a577e
                                          • Instruction ID: 09fb4643f2e227c3d6784907618d37b464dc3824ad9f7d76793c7095e94ba10f
                                          • Opcode Fuzzy Hash: 31c77a37b0c0b8fbe5e53ac8bd18da749b3546c27af0e0e94c4b5068321a577e
                                          • Instruction Fuzzy Hash: AA71D362E0C7A3D0E760ABA594403BDA7A2EB85B94F980035DE4D47699CFBDD441E320
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF73167192D
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF73167194A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF73167195E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF73167197A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671997
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF7316719BA
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF7316719CE
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF7316719E2
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671A08
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671A1C
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671A30
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671A7F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671A8C
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731671F35), ref: 00007FF731671AB5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 9dafe04a3beda65af2da05c8c2c950cb73e504e5584e316465673385af97ca7b
                                          • Instruction ID: 830ccdb930d9d7235398a3996cd567d386bbc9ad10aee58db51a4825a5eade4e
                                          • Opcode Fuzzy Hash: 9dafe04a3beda65af2da05c8c2c950cb73e504e5584e316465673385af97ca7b
                                          • Instruction Fuzzy Hash: 2A51E831A08A92D1EB14AFA1D8502FDA3A2FF85F88F884435DE4E4B655CEA89445E370
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73169FA3B
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73169FAA1
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73169FAAF
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73169FBAD
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73169FC16
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73169FC2E
                                            • Part of subcall function 00007FF73169EB80: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF73169EB90
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73169FC56
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73169FC6D
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73169FC92
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73169FCDF
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73169FCF4
                                            • Part of subcall function 00007FF73169FE30: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73169EE62,?,?,00000000,00007FF731675F6B,?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF73169FE3C
                                            • Part of subcall function 00007FF73169FE30: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73169EE62,?,?,00000000,00007FF731675F6B,?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF73169FE46
                                            • Part of subcall function 00007FF73169FE30: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73169EE62,?,?,00000000,00007FF731675F6B,?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF73169FE50
                                            • Part of subcall function 00007FF73169FE30: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73169EE62,?,?,00000000,00007FF731675F6B,?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF73169FE5A
                                            • Part of subcall function 00007FF73169FE30: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73169EE62,?,?,00000000,00007FF731675F6B,?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF73169FE64
                                            • Part of subcall function 00007FF73169FE30: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73169EE62,?,?,00000000,00007FF731675F6B,?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF73169FE6E
                                            • Part of subcall function 00007FF73169FE30: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73169EE62,?,?,00000000,00007FF731675F6B,?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF73169FE78
                                            • Part of subcall function 00007FF73169FE30: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73169EE62,?,?,00000000,00007FF731675F6B,?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF73169FE82
                                            • Part of subcall function 00007FF73169FE30: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73169EE62,?,?,00000000,00007FF731675F6B,?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF73169FE8C
                                            • Part of subcall function 00007FF73169FE30: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73169EE62,?,?,00000000,00007FF731675F6B,?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF73169FE96
                                            • Part of subcall function 00007FF73169FE30: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF73169EE62,?,?,00000000,00007FF731675F6B,?,?,00000000,00007FF7316719B3,?,?,00000000,00007FF731671F35), ref: 00007FF73169FEA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$calloc$_strdup
                                          • String ID: ,$:
                                          • API String ID: 2460172880-4193410690
                                          • Opcode ID: 7f1723af25d2d3e2730a72a3583ce6dabcb50eb040c99ff26131150ba0febd47
                                          • Instruction ID: a6901c95dea7cd7622391eddab567b88e044d49e4fe80eda8ed7713602b2ebdc
                                          • Opcode Fuzzy Hash: 7f1723af25d2d3e2730a72a3583ce6dabcb50eb040c99ff26131150ba0febd47
                                          • Instruction Fuzzy Hash: 0351F712E0CB96D3F721AF7495102B9A362BF55B88F8592B4CE8D02652DFACF5C5E310
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdup$free$strrchr$_access_stat64
                                          • String ID:
                                          • API String ID: 2557200964-0
                                          • Opcode ID: a425e0188cbebe21396c5b31fd7196939b60543e69e3bf0485de30aa4f04b208
                                          • Instruction ID: fa042d76931054cb97b9c645e6ce2099be3d9fa6860a06cff365dc4e4eaa60f4
                                          • Opcode Fuzzy Hash: a425e0188cbebe21396c5b31fd7196939b60543e69e3bf0485de30aa4f04b208
                                          • Instruction Fuzzy Hash: 23418221F09B12E5FB10BF92A854279A3B6FF49B90F844034CA9E57791DFBCE455E220
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy$strchr
                                          • String ID:
                                          • API String ID: 1615377186-0
                                          • Opcode ID: 4a31933ddea44201a5d47b42c714698563d84d1637834a4103e73a14b779df92
                                          • Instruction ID: 7eb998ade4566c378452d8bfe0824b0c55c3af71c495a39d808937196452bd22
                                          • Opcode Fuzzy Hash: 4a31933ddea44201a5d47b42c714698563d84d1637834a4103e73a14b779df92
                                          • Instruction Fuzzy Hash: 89519F25F09BA1E2EB25AF55A514279E3A2BF48BC4F884439CE8E07744DF7CE405E320
                                          APIs
                                          Strings
                                          • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF731674649
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Couldn't find host %s in the .netrc file; using defaults
                                          • API String ID: 2653869212-3983049644
                                          • Opcode ID: 4dcf73271c8b8bacb8cfe7207693d9b5d91f111473b558ca7ff9bc1d3b6bb3d1
                                          • Instruction ID: c3ceaf5244b0741468880053676e9b09f3f70d4207cb95c1f7c947281c97ed2c
                                          • Opcode Fuzzy Hash: 4dcf73271c8b8bacb8cfe7207693d9b5d91f111473b558ca7ff9bc1d3b6bb3d1
                                          • Instruction Fuzzy Hash: 4871DC22E08BA2E3EB65ABA5D458379E7A2FB84744F440035DB9D47790DFBDE410E320
                                          APIs
                                          Strings
                                          • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF731674649
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Couldn't find host %s in the .netrc file; using defaults
                                          • API String ID: 2653869212-3983049644
                                          • Opcode ID: f2588b72eae4d2d83d4234019271e759b3b16d48f596f5c2917e1ce51cc32042
                                          • Instruction ID: 07cbfc3cbff4bfb8adb4ab50fae122202fa322305975c21e78ccc6ea07aa2263
                                          • Opcode Fuzzy Hash: f2588b72eae4d2d83d4234019271e759b3b16d48f596f5c2917e1ce51cc32042
                                          • Instruction Fuzzy Hash: 6151C362E08BA2D7EB159BA1D45837DA7A1FB44B84F894035CB9D47750DF7CE440E720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                          • API String ID: 600764987-1052566392
                                          • Opcode ID: 0efca67b4cdc14fbe91d37422af2e9fb08fc75ec36ce691b1a4c732ea022d591
                                          • Instruction ID: 261f1b68b76a7f8a1b5ecfcada48a7154465651a82ecd7c9b9b80f90b6b331e4
                                          • Opcode Fuzzy Hash: 0efca67b4cdc14fbe91d37422af2e9fb08fc75ec36ce691b1a4c732ea022d591
                                          • Instruction Fuzzy Hash: FA317262E0C6D1E6E761EFA1E4143AEB3A6FB88744FC04539CA8E02A95DF7CD544D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                          • API String ID: 600764987-2710416593
                                          • Opcode ID: a0204534bdfcb8b00a98a7e01e510a1d63ffabb6fbdf480f0e4bbfb348c73876
                                          • Instruction ID: a0a182197f46475f199f0d66bdcbb78efd2bdbee6ca2932c93cecfd8b8988894
                                          • Opcode Fuzzy Hash: a0204534bdfcb8b00a98a7e01e510a1d63ffabb6fbdf480f0e4bbfb348c73876
                                          • Instruction Fuzzy Hash: A6316162E0C6D1E6E761EFA1E4103AAB3A6FB88744F804539CA8E02A95DF7CD544D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                          • API String ID: 600764987-1381340633
                                          • Opcode ID: 298e794ac7706a66fab8b4d1c88976078ee655fcbdcb2b83b484b773f6ff4f63
                                          • Instruction ID: 32475f34b670c9b79c5a48703cc4abba2045baafdac6bb6fd6930f56f77393a2
                                          • Opcode Fuzzy Hash: 298e794ac7706a66fab8b4d1c88976078ee655fcbdcb2b83b484b773f6ff4f63
                                          • Instruction Fuzzy Hash: 2A317262E0C6D1E6E761EFA1E4103AEB3A6FB88744FC04539CA8E02A95DF7CD544D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                          • API String ID: 600764987-3862749013
                                          • Opcode ID: de0156c4063bd9a466d38293046c8cbb20a83bbdd5fd275fc8d816d0a695292a
                                          • Instruction ID: 761599afd97d647dcaacf58386224d444809c5b8aa368eb7f227128b3deffe63
                                          • Opcode Fuzzy Hash: de0156c4063bd9a466d38293046c8cbb20a83bbdd5fd275fc8d816d0a695292a
                                          • Instruction Fuzzy Hash: 95317262E0C6D1E6E721EFA1E4103AEB3A6FB88745FC04539CA8E02A95DF7CD544D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                          • API String ID: 600764987-1502336670
                                          • Opcode ID: a99f060a03aed788ed5e06c1aa8b7c80c7450bad84408ad51638c64175808135
                                          • Instruction ID: 327eb8e323f726549bdb6282dbf1be6b95476544c475d0cc4dc46741beba1397
                                          • Opcode Fuzzy Hash: a99f060a03aed788ed5e06c1aa8b7c80c7450bad84408ad51638c64175808135
                                          • Instruction Fuzzy Hash: 52317462E0C6D1E6E761EFA1E4103AEB3A6FB88744FC04539DA8E02A95DF7CD544D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                          • API String ID: 600764987-1965992168
                                          • Opcode ID: 829df8a539cfc324d627f26e87fab25fce76e1812c0feca66b179d4148e9b6fe
                                          • Instruction ID: 4ae0e248447b349fed76022f2f88272cc7e25ca9868d5296963568a075237507
                                          • Opcode Fuzzy Hash: 829df8a539cfc324d627f26e87fab25fce76e1812c0feca66b179d4148e9b6fe
                                          • Instruction Fuzzy Hash: 31317262E0C6D1E6E761EFA1E4103AEB3A6FB88744FC04539CA8E02A95DF7CD544D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                          • API String ID: 600764987-2628789574
                                          • Opcode ID: 97b1c77c699c43dc9b389d94b9c168d1f79c38719a14beb900fe4c4e939f7505
                                          • Instruction ID: 3b1d7deefed9606560a41f95e82531e15e331d32354be6d4693c2830e8e16720
                                          • Opcode Fuzzy Hash: 97b1c77c699c43dc9b389d94b9c168d1f79c38719a14beb900fe4c4e939f7505
                                          • Instruction Fuzzy Hash: 7A317262E0D6D1E6E721EFA1E4103AEB3A6FB88744FC04539CA8E02A95DF7CD544D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                          • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                          • API String ID: 600764987-618797061
                                          • Opcode ID: baaace8c9324e1153c16d76581dd1b850064508bf1f345ef6eeb36c0a0138756
                                          • Instruction ID: f37ce8acec85220174ad0d1cac8e116b97aa90626912b9aef5401b8284a19c7e
                                          • Opcode Fuzzy Hash: baaace8c9324e1153c16d76581dd1b850064508bf1f345ef6eeb36c0a0138756
                                          • Instruction Fuzzy Hash: 03318262E0C6D1E6E721EFA1E4143AEB3A6FB88744F804539CA8E02A95DF7CD544D720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_time64
                                          • String ID:
                                          • API String ID: 3087401894-0
                                          • Opcode ID: 94b7a02d5bc3b31133621eaaf653b4e2e7eeaf76c314e2bfd27b0698e7b4643e
                                          • Instruction ID: 7dbc7537598f9ce7f45c0e6f1589b2ea46a07923dd4e10ab428c48d61da909bc
                                          • Opcode Fuzzy Hash: 94b7a02d5bc3b31133621eaaf653b4e2e7eeaf76c314e2bfd27b0698e7b4643e
                                          • Instruction Fuzzy Hash: 02213C36F08A61E1EB20AFA2E840229B371FB88F84F484435DE9E13714DEBCD441E360
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                          • API String ID: 0-808606891
                                          • Opcode ID: b7f0683384f41ca6ab58209a4010d6c5d75d2bd6ba60dd59bf4ed1c60fdea11b
                                          • Instruction ID: 0968073f5b255383b91ad60e0dc1661f9ee8e2a839e381bddd91f55c507206cd
                                          • Opcode Fuzzy Hash: b7f0683384f41ca6ab58209a4010d6c5d75d2bd6ba60dd59bf4ed1c60fdea11b
                                          • Instruction Fuzzy Hash: C7B190A2D08A91E5E7249F68D46027CB773FB15B58FE04531DA4E022D4DFB8E985E360
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7316AEC4A
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7316AEC98
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7316AECFB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7316AEE39
                                            • Part of subcall function 00007FF7316A2BE0: strchr.VCRUNTIME140(00000000,?,?,00007FF7316A219F), ref: 00007FF7316A2C26
                                            • Part of subcall function 00007FF7316A2BE0: strchr.VCRUNTIME140(00000000,?,?,00007FF7316A219F), ref: 00007FF7316A2C36
                                            • Part of subcall function 00007FF7316A2BE0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,00007FF7316A219F), ref: 00007FF7316A2C60
                                            • Part of subcall function 00007FF7316A2BE0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7316A2C95
                                            • Part of subcall function 00007FF7316A2BE0: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7316A2CBA
                                            • Part of subcall function 00007FF7316A2BE0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7316A2CDC
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7316AEEC4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdup$callocmallocstrchr$freestrncpy
                                          • String ID: GSSAPI$GSSAPI handshake failure (empty challenge message)$Kerberos
                                          • API String ID: 370574955-353107822
                                          • Opcode ID: 2fe9f476cda5ddcfb5fd74fde3a49d13dafdadeb69060985bcf90e8757b530e3
                                          • Instruction ID: 78fea5a2f102e3db0d71b013a538cb93bdb567dabe714784639fe1471e63b6c5
                                          • Opcode Fuzzy Hash: 2fe9f476cda5ddcfb5fd74fde3a49d13dafdadeb69060985bcf90e8757b530e3
                                          • Instruction Fuzzy Hash: 8CA16A72E08B65DAEB50EFA5E4402ADB3A6FB44B88F800036DE4D53B58DF78E815D750
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 1169197092-2292467869
                                          • Opcode ID: ca865e3b18f49c2f7f6df22b3d467dfa3524c642cbc228afabb56fa03d8f7f64
                                          • Instruction ID: fffcc7af0fcd6ca613daca51ab03004447b141e8a7650468251393d1aeb8842a
                                          • Opcode Fuzzy Hash: ca865e3b18f49c2f7f6df22b3d467dfa3524c642cbc228afabb56fa03d8f7f64
                                          • Instruction Fuzzy Hash: 2D916122E0C7A2E9EF71ABA59554379E7F2EF05744F884035CE8E06695DFACE444E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$__Host-$__Secure-
                                          • API String ID: 1169197092-978722393
                                          • Opcode ID: fcc99ede26ec38440564b6c2f8745eb3033eae7c13b2b39be326ceef7692c5fb
                                          • Instruction ID: 355cc931c5b774fe75d526daaa43beb3bdec52e98fd0ca36bdb093239713e4c8
                                          • Opcode Fuzzy Hash: fcc99ede26ec38440564b6c2f8745eb3033eae7c13b2b39be326ceef7692c5fb
                                          • Instruction Fuzzy Hash: A5715321E0C7A2E9FF71ABA69444379E7F2AF05744F884035CE8E06695DFACE444E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$strchrstrtol
                                          • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                                          • API String ID: 137861075-1224060940
                                          • Opcode ID: 4e57ebf75fa7549b9b18d69bf1f02a4c5f2f03d803ecc02c17af4985ee83a9e8
                                          • Instruction ID: f69daf92866d516d393fd5441fdd95b338d90baf714c8fe802b16883de1def05
                                          • Opcode Fuzzy Hash: 4e57ebf75fa7549b9b18d69bf1f02a4c5f2f03d803ecc02c17af4985ee83a9e8
                                          • Instruction Fuzzy Hash: 7051F422E08AE2E5EB31EF51A8003A9A792FB45B98F844135DEDD07799DF7CE501D720
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ALL$FLUSH$RELOAD$SESS$Set-Cookie:
                                          • API String ID: 1294909896-1147549499
                                          • Opcode ID: 9d5eb10f013f42e61abe6509040428495e53b4b6b69cbb74a3940447ef100371
                                          • Instruction ID: a86e22b673079b82b6f3ccc87e8c676a181ed9a1938cd09c16b0f2e324f6c015
                                          • Opcode Fuzzy Hash: 9d5eb10f013f42e61abe6509040428495e53b4b6b69cbb74a3940447ef100371
                                          • Instruction Fuzzy Hash: B7418F10F1C573E2FB24BBA299512B9D3A3AF44BC0F885035DE0E47686DEADE401A370
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdup$callocfreestrrchr
                                          • String ID: Wildcard - Parsing started
                                          • API String ID: 2641349667-2274641867
                                          • Opcode ID: efd104096123f095724a507316b2b3770aa51028f776586ecbdeaaf1593d2643
                                          • Instruction ID: 123cd88f87e00fce8e3e059a31439d04a65db027aebc36047d82c442612e2fbe
                                          • Opcode Fuzzy Hash: efd104096123f095724a507316b2b3770aa51028f776586ecbdeaaf1593d2643
                                          • Instruction Fuzzy Hash: CF516D32E08B52D6EB15EF91E4441B8B7A6FB84B44F894475CE5E0B354EFB8E445E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                          • API String ID: 2653869212-3672398475
                                          • Opcode ID: e07c45d19973509e67b550ba4295e2b84292b797af6f8f338bbd6149bdbebad7
                                          • Instruction ID: d69183d8f803b017a4514361a345c1dfad0b218e7b46bcbecdd6719a53888fb0
                                          • Opcode Fuzzy Hash: e07c45d19973509e67b550ba4295e2b84292b797af6f8f338bbd6149bdbebad7
                                          • Instruction Fuzzy Hash: E541D6A5F097A2E4EB10ABA594141F9A766BF05788FC84436CE4E17356DF7CE040E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: mallocmemcpy
                                          • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                          • API String ID: 4276657696-1832275178
                                          • Opcode ID: 7d32dc7c02c0576a480f03aa2b20523e87f0181136edf8925a4e73fa6a3427c9
                                          • Instruction ID: 8dabf47437682c4b089c490825810a9dff137d4d6a8bf1f9d43e18e66d0b679b
                                          • Opcode Fuzzy Hash: 7d32dc7c02c0576a480f03aa2b20523e87f0181136edf8925a4e73fa6a3427c9
                                          • Instruction Fuzzy Hash: FEA1A362E09BA2E5EB64EF91A5003A9B7AAFF44B84F8581B1CE4D03759DF7CD400E710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 3401966785-2901970132
                                          • Opcode ID: fbe24e366b728afa5db670c27b8319507fe6065f7f31e2c79264c5bae932625d
                                          • Instruction ID: 27265a6054fc3ddad702cb092f4ef9af9ae63162502c9529bc90df04af4e18d5
                                          • Opcode Fuzzy Hash: fbe24e366b728afa5db670c27b8319507fe6065f7f31e2c79264c5bae932625d
                                          • Instruction Fuzzy Hash: A56146A1E087A2E5EB18ABE180141B9A7A7FF05785F845535CE5F077D5EEBCE004E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3401966785-517259162
                                          • Opcode ID: 742c0360e6210f7455115ce56e8553b7ac11c260097db8010f3a55c0742de8cc
                                          • Instruction ID: e11a421c65656b9d1472d579dc775b651ad26c8688012411b458447c654aa990
                                          • Opcode Fuzzy Hash: 742c0360e6210f7455115ce56e8553b7ac11c260097db8010f3a55c0742de8cc
                                          • Instruction Fuzzy Hash: 81613891E096B2E5FB18A7A184142B9AB93AF057C4F844536CE5F077D5EEADE005E320
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF731684E28), ref: 00007FF7316A1950
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF731684E28), ref: 00007FF7316A1987
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF731684E28), ref: 00007FF7316A19AE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                          • API String ID: 1294909896-3948863929
                                          • Opcode ID: 28345fe83e5f92978302311b7c25afe45d2fd59016ff0eb21e1732458eff48fc
                                          • Instruction ID: a9e859df88ed8a504192322d75004c368af5dc2b118254179ef630d5e7a95896
                                          • Opcode Fuzzy Hash: 28345fe83e5f92978302311b7c25afe45d2fd59016ff0eb21e1732458eff48fc
                                          • Instruction Fuzzy Hash: 5A618B72A08B91D1EB60EF95E4483AAB3A6FB84B84F804036DE8D47794DFBCD445D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                          • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                          • API String ID: 1392894463-1168109407
                                          • Opcode ID: 18990fc156d9d11678551ccf624d1351fa5d6f5ee740d5d836fb751b64834d78
                                          • Instruction ID: c28ae2e9870e35b6d05414207aae45304a37cee53886980d826905ae2a2e2687
                                          • Opcode Fuzzy Hash: 18990fc156d9d11678551ccf624d1351fa5d6f5ee740d5d836fb751b64834d78
                                          • Instruction Fuzzy Hash: 83411A21E0C6A6E3FB50AF95A4402B9A792EF45B80FC46171DA5E473C9DF6CE505E330
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr$mallocrealloc
                                          • String ID: 0123456789-$<DIR>$APM0123456789:
                                          • API String ID: 359134164-4291660576
                                          • Opcode ID: 1572c55741b108669f971dfd891189aed3ed9b688e2cf8bed39c0b620db78256
                                          • Instruction ID: 04fd1158213dc867d79962ac54aa4295129620360a1bab1e95cb1a135d15245a
                                          • Opcode Fuzzy Hash: 1572c55741b108669f971dfd891189aed3ed9b688e2cf8bed39c0b620db78256
                                          • Instruction Fuzzy Hash: CBB17FB6E08B51D6EB24AF69D45033DA7A6FB44B58F948035CE4E07395CFB8E441E360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: malloc$Ioctlsetsockopt
                                          • String ID: Failed to alloc scratch buffer!$We are completely uploaded and fine
                                          • API String ID: 3352517165-607151321
                                          • Opcode ID: 37c91d115c048257879a0c65adaa0570cb7da73129e3d55efdf3d83ff34d8aa6
                                          • Instruction ID: c4f584887f7a7bee7d86f721f1adb8ac40592da1568a39844cbd794fe261d4eb
                                          • Opcode Fuzzy Hash: 37c91d115c048257879a0c65adaa0570cb7da73129e3d55efdf3d83ff34d8aa6
                                          • Instruction Fuzzy Hash: 18B18032E08AD2D5EB62AF65D4043FDA392EB44B98F484535CE4D0A789DFBC94A5D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: %s?%s$Failed sending Gopher request
                                          • API String ID: 111713529-132698833
                                          • Opcode ID: 164ea82d3232166ef85f91b6db07d9d597c5792fc24d443685aab8426ac854b5
                                          • Instruction ID: f254c365727efddb9196449b00e167dfe40d35df04c507ff35f0f8aeb0d8a7e2
                                          • Opcode Fuzzy Hash: 164ea82d3232166ef85f91b6db07d9d597c5792fc24d443685aab8426ac854b5
                                          • Instruction Fuzzy Hash: 2851E821F09AA2D2F711ABA6A4005B9A391FF85BE4F844231DE6D477D5DF7CD402E710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                          • String ID: value
                                          • API String ID: 1346393832-494360628
                                          • Opcode ID: 4a4d25d41ed406c1d0a011403156945727fdde6037d227963cedff3a9bb42d56
                                          • Instruction ID: 8f4892396bd887aba9a6e0064d44806efbb52e5665ab02b18158ff3d75c49d19
                                          • Opcode Fuzzy Hash: 4a4d25d41ed406c1d0a011403156945727fdde6037d227963cedff3a9bb42d56
                                          • Instruction Fuzzy Hash: 78613772E18A91D6EB10DBB5E8543ED6362EF443A4F405335DAAC02AD9DFBCE081D350
                                          APIs
                                          • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF731697536
                                          • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF73169758B
                                          • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF7316975FC
                                          • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF731697609
                                          • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,0000006C,?,00000000), ref: 00007FF73169771B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _close$_fstat64_openstrchr
                                          • String ID: Can't get the size of %s$Can't open %s for writing
                                          • API String ID: 423814720-3544860555
                                          • Opcode ID: 47806318dad57eb09a6b322e9798bef99cc3e6e357c7198381fcfe81f338dd94
                                          • Instruction ID: 7403bbf50bf44f4e450ec5881da399d302be66204e3f8addc4608fad88570f70
                                          • Opcode Fuzzy Hash: 47806318dad57eb09a6b322e9798bef99cc3e6e357c7198381fcfe81f338dd94
                                          • Instruction Fuzzy Hash: E651C662F08AA2E2EB14AB6594103BDA3D7FF84BD4F848435DA4E47381DFBCE4019760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdupstrtol
                                          • String ID: %%%02x
                                          • API String ID: 2999891020-4020994737
                                          • Opcode ID: 644ecf454b5406c55117dfc577d459684ad165775d5b9113ed441861368e03cd
                                          • Instruction ID: d2d842193df37588b62ff229b893b7747b975df75949b61e4a4f523edbb878b1
                                          • Opcode Fuzzy Hash: 644ecf454b5406c55117dfc577d459684ad165775d5b9113ed441861368e03cd
                                          • Instruction Fuzzy Hash: 4551E811E0D2B2E6FB61A7509010378AF969F41754F8A01F5DE9E063C1DEADE444F320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1496848336-4020994737
                                          • Opcode ID: bb92e0fb6e8724d6a603b74c0048d4e019eb1dcf875e4f0697c5b41cb2e9f126
                                          • Instruction ID: a4bf9b264bc12db47006278b1e38f30fb304493ea046776959ff999e0822fcaa
                                          • Opcode Fuzzy Hash: bb92e0fb6e8724d6a603b74c0048d4e019eb1dcf875e4f0697c5b41cb2e9f126
                                          • Instruction Fuzzy Hash: A041D611E0D2F2E6EB62AB516114378AF96AF06754F8A01F5DEDE063C1DEADE444F320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_strdupmalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 111713529-517259162
                                          • Opcode ID: 0fa73a337b14f544b56cbf689623e98a816b00dcf3c2286807af888b4a2c9cbe
                                          • Instruction ID: 68131e347f97bba396ed98ea84457caeb879635afcbd7ccc86e9d8becfd0d60d
                                          • Opcode Fuzzy Hash: 0fa73a337b14f544b56cbf689623e98a816b00dcf3c2286807af888b4a2c9cbe
                                          • Instruction Fuzzy Hash: 1D318591E097A2E4EF10ABE194141F9A7A76F05788FC85835CE4E17396EFBDE404E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-599393795
                                          • Opcode ID: 388a09dec5b697b908bc13682b02e5d7ea3e4acabdcfc6577ff0b92c602df413
                                          • Instruction ID: e49336279a70bbde7dff0a94b41d5448090acb03c63534988add403d8ff9b3a5
                                          • Opcode Fuzzy Hash: 388a09dec5b697b908bc13682b02e5d7ea3e4acabdcfc6577ff0b92c602df413
                                          • Instruction Fuzzy Hash: 7961F0A1E0D6F2E4EB10ABA594141B9FBA6AF01784FC49436CE8D07795DFBDE501E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc$memcpy
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 901724546-1663925961
                                          • Opcode ID: 88c815334131e338bb9b5bca162bc0b0591a3bf54374b822b0adf169f96e1fa6
                                          • Instruction ID: 1978008539cc9e9b84fc1e7b45de332f3177241657b096714fdf70b5635e8d3c
                                          • Opcode Fuzzy Hash: 88c815334131e338bb9b5bca162bc0b0591a3bf54374b822b0adf169f96e1fa6
                                          • Instruction Fuzzy Hash: 6F5178A1F086A2D1EF18AA9990143B9A796FB417D4F840136CE9F077D5EEACE005E321
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID:
                                          • API String ID: 1169197092-0
                                          • Opcode ID: 1b0595316675f82772fc28900d3198f3d8a03ff6b87a63347f3563558c6d9905
                                          • Instruction ID: 13c591226fe562cb5c520daf572650eec4135f20f63350c43813dc64ac9438d6
                                          • Opcode Fuzzy Hash: 1b0595316675f82772fc28900d3198f3d8a03ff6b87a63347f3563558c6d9905
                                          • Instruction Fuzzy Hash: 71517F26F1ABA1D2EB55DF95E050128B7B4FB48B84B481179DF9D03B48DF38D4A1D710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-3876350232
                                          • Opcode ID: 3c568e79d8b76ca8c0f4947349ea53ad1015d81a9fc9ab77821cedc04fbb5508
                                          • Instruction ID: 3c7b1e3d1eeafc9d5ba1c5b2eedabdc61159bb5ff71660c5a7212354d39161e4
                                          • Opcode Fuzzy Hash: 3c568e79d8b76ca8c0f4947349ea53ad1015d81a9fc9ab77821cedc04fbb5508
                                          • Instruction Fuzzy Hash: E25194A1E097A2E4EB10ABA194101F9A767BF05B88FC85436CE4E17295DFBDE505E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 3401966785-2901970132
                                          • Opcode ID: 546c04391f3f1894b024eb3058d86346fbee1fd25c8aed46030c2e58979d9950
                                          • Instruction ID: 2b59164d31981934ffc81e68718aa5ddcd7e0a72dcd3b681daefa3725a1e871e
                                          • Opcode Fuzzy Hash: 546c04391f3f1894b024eb3058d86346fbee1fd25c8aed46030c2e58979d9950
                                          • Instruction Fuzzy Hash: 9B41B6A1E087A2E4EB14ABE194141F9A3A7BF05789F845535CE4D07795EFBCE104E320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 055e168fb65f423c57915a892bfce5b182b090623d16bc49fd49c5fdfd9f067a
                                          • Instruction ID: facd2c05072b2c7d067f4c246ceae7d7aa8eb04c524273b494c89a0641aaafdb
                                          • Opcode Fuzzy Hash: 055e168fb65f423c57915a892bfce5b182b090623d16bc49fd49c5fdfd9f067a
                                          • Instruction Fuzzy Hash: A4415172E08B62D2E721AF61E840238B3B5FB49F98F844535DA8D53755CF78D850E3A0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: c643178a85888b15959d4e7ca118a99b6d7baaba478ac413579d56a64d74c09d
                                          • Instruction ID: 47406d4fd48cf24171165e7a68c32ffcde0bea8739262ff301a34772170ba378
                                          • Opcode Fuzzy Hash: c643178a85888b15959d4e7ca118a99b6d7baaba478ac413579d56a64d74c09d
                                          • Instruction Fuzzy Hash: 0B311836B08A61D2E720AF91E804229B375FB89FC4F485435DE9D03B58CEBDD841E750
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: aab127bf0e8542732e3c18ba64e321ddd3c5e6f1a73537df46da66dd3b5eae98
                                          • Instruction ID: f377e56ef92a45b6f4166ba26515abf2aeb83fbd9703161790970b61c5b58364
                                          • Opcode Fuzzy Hash: aab127bf0e8542732e3c18ba64e321ddd3c5e6f1a73537df46da66dd3b5eae98
                                          • Instruction Fuzzy Hash: 450188A6B14A51D2DB24AFA2E954138A332FF89F89B441435CE9E43728CF6CD855F360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpymemset
                                          • String ID:
                                          • API String ID: 1579693990-0
                                          • Opcode ID: 9adbed3489a0455967ee38d16e91ff20980ce936b9dff803bb5791a7768888f6
                                          • Instruction ID: 9c9a7d4865baa0daae84b321072e4e710fe1ca266ea6d813038e987254ea843c
                                          • Opcode Fuzzy Hash: 9adbed3489a0455967ee38d16e91ff20980ce936b9dff803bb5791a7768888f6
                                          • Instruction Fuzzy Hash: F4919491F0D7A2E3FB54BA969850379A392BF55BC4F884034DE4D47786EFACE411A320
                                          APIs
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7316798E8), ref: 00007FF731679A35
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7316798E8), ref: 00007FF731679A4F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64$Internal error removing splay node = %d
                                          • API String ID: 1114863663-13178787
                                          • Opcode ID: d020502a0aad6548a9fc5c856e23caf1e5c9a0eb830765948bd8cbd63a349f29
                                          • Instruction ID: 096018763f04b8a3a01db76f7dab5b37307c19ef05eb9f0e1c62201f663d8b78
                                          • Opcode Fuzzy Hash: d020502a0aad6548a9fc5c856e23caf1e5c9a0eb830765948bd8cbd63a349f29
                                          • Instruction Fuzzy Hash: 23A1F132E08A92D6EB20EF55E4807BDBBE5FB49B58F858135CA8D42254DF7CD208D720
                                          APIs
                                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF73166B26A,?,?,?,?,?,?,?,00007FF73166B037), ref: 00007FF731688251
                                          • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF7316883F3
                                          • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF731688410
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr$_errno
                                          • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                          • API String ID: 2644425738-1191287149
                                          • Opcode ID: 7c5d4e7d2faa273dc8e58ced809aa81b5d23591f7467f2b6c40110dc8b8441fb
                                          • Instruction ID: e4ea3e93f3e4f0da16697ceef0b85a6150d088aea22c9dafb90a89511acf4ad0
                                          • Opcode Fuzzy Hash: 7c5d4e7d2faa273dc8e58ced809aa81b5d23591f7467f2b6c40110dc8b8441fb
                                          • Instruction Fuzzy Hash: 0C514622F0D7A6E1EF61EB95A40017EF396AB46B88FC45035DA4D07B49DEBCE841D321
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 1169197092-2292467869
                                          • Opcode ID: 89921e5045aa1bf9a23ae42e992a4559efa58c6d9410c08d490ab42addd9fe22
                                          • Instruction ID: aee82cf56646e727d8a63341d697801850fb2419e2e4319514b2dbf5cf9ca7c7
                                          • Opcode Fuzzy Hash: 89921e5045aa1bf9a23ae42e992a4559efa58c6d9410c08d490ab42addd9fe22
                                          • Instruction Fuzzy Hash: 73615122E0D7A2E9FF71AB959444379E7F6AF05744F884136CE8E02695DFACE444E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdup$strchr
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 3404610657-2292467869
                                          • Opcode ID: 718985d21e520d1b072cf07532dfd847f788abc06b80695c7eb07deb992d717e
                                          • Instruction ID: e944d54c4acefb023271df28815e54e04795fb071c785cb7dc3ef16f0b97e809
                                          • Opcode Fuzzy Hash: 718985d21e520d1b072cf07532dfd847f788abc06b80695c7eb07deb992d717e
                                          • Instruction Fuzzy Hash: 47616222E0D7A2E9FF71ABA59444379E7F6AF04744F884036DE8D02695DFACE444E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freememcpy$malloc
                                          • String ID: Failed to alloc scratch buffer!
                                          • API String ID: 169112436-1446904845
                                          • Opcode ID: 7003f5548eb5358d85f7ebd30a04f5c6e39e6462f2b69b151650209b3d6d25c0
                                          • Instruction ID: 1dbf924cd39ff1bc7127efcfef28c9fc6494fa772e8dc77e282e5b194747d0a3
                                          • Opcode Fuzzy Hash: 7003f5548eb5358d85f7ebd30a04f5c6e39e6462f2b69b151650209b3d6d25c0
                                          • Instruction Fuzzy Hash: 6F51B972A18BD1E6EB20AFA6A0002AAB7A9FB09784F840035CF8D47751CF7CE154D720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                                          • API String ID: 2190258309-3231818857
                                          • Opcode ID: 55d78412daaa31d674ec054b636355c7addbf0a6c2a3f49e325662ff4e4aa6d3
                                          • Instruction ID: 8fe46570923cfab13941094faeab78c70a17f38c6b91b1c793fca90edc0bd5df
                                          • Opcode Fuzzy Hash: 55d78412daaa31d674ec054b636355c7addbf0a6c2a3f49e325662ff4e4aa6d3
                                          • Instruction Fuzzy Hash: 1C51F4A2E0C6E2E5EB10DBA5A4042BDF7AAFB45B81F845431CA8D03755DFBCD505E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLastfreememcpy
                                          • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout!
                                          • API String ID: 1248052217-2335292235
                                          • Opcode ID: 5d14121661d1e2f5dbcd0de15715932a0bc18030e3bf133a22cf6d3d745a1936
                                          • Instruction ID: 505ab76b905342f3d070dc93a5c71d4a78c1c55ae64050e2cae0990a408c0e37
                                          • Opcode Fuzzy Hash: 5d14121661d1e2f5dbcd0de15715932a0bc18030e3bf133a22cf6d3d745a1936
                                          • Instruction Fuzzy Hash: 37510B21F08AA3E6FB64B6B684103B99352BF84794F848175DE4D872C5EFACE445A310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memchrmemcpyrecvfrom
                                          • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                          • API String ID: 3107918033-477593554
                                          • Opcode ID: 3a54981905c914cdaef3556359282fe403773f15e8db7d6cbb4857878a6436a4
                                          • Instruction ID: 673ded19e2d027ac5b3c9d27bddd72291e584f25a85e42b689515a72248fd9dd
                                          • Opcode Fuzzy Hash: 3a54981905c914cdaef3556359282fe403773f15e8db7d6cbb4857878a6436a4
                                          • Instruction Fuzzy Hash: 0751E471E085A2E6EB64EF65D4103B9B392EB46B84F848132DA4D47789DF7CE405EB30
                                          APIs
                                            • Part of subcall function 00007FF731656E10: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF73165240B), ref: 00007FF731656E8E
                                            • Part of subcall function 00007FF731656E10: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF73165240B), ref: 00007FF731656E9C
                                            • Part of subcall function 00007FF731656E10: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF73165240B), ref: 00007FF731656EB2
                                            • Part of subcall function 00007FF731653BF0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF731651DCB), ref: 00007FF731653C36
                                            • Part of subcall function 00007FF731655E10: memcpy.VCRUNTIME140(?,?,?,00007FF731651DFA), ref: 00007FF731655EA1
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316524A9
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7316524E8
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652536
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652584
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                                          • String ID: at line $, column
                                          • API String ID: 2665656946-191570568
                                          • Opcode ID: ac706bb0521000e4c115238f0d9df125bc0f969b470b4f5ee90fe16b4f1feced
                                          • Instruction ID: 2a4ab03db5fa14f6338c6034aa0a31115015b9519f6ce218541ec63b7f578761
                                          • Opcode Fuzzy Hash: ac706bb0521000e4c115238f0d9df125bc0f969b470b4f5ee90fe16b4f1feced
                                          • Instruction Fuzzy Hash: 6C51C6A2F04A92D5FB00EBB5D4543AC6372EB487A8F405234DE6D13BDADEB8D485E350
                                          APIs
                                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,00000000,?,?,00007FF73165318B,?,?,?,00007FF731653144), ref: 00007FF731654AD3
                                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF73165318B,?,?,?,00007FF731653144), ref: 00007FF731654B27
                                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,00000000,?,?,00007FF73165318B,?,?,?,00007FF731653144), ref: 00007FF731654B4E
                                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF73165318B,?,?,?,00007FF731653144), ref: 00007FF731654B76
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,00000000,?,?,00007FF73165318B,?,?,?,00007FF731653144), ref: 00007FF731654BBC
                                          • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,00000000,?,?,00007FF73165318B,?,?,?,00007FF731653144), ref: 00007FF731654BC3
                                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,00000000,?,?,00007FF73165318B,?,?,?,00007FF731653144), ref: 00007FF731654BD0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                                          • String ID:
                                          • API String ID: 1492985063-0
                                          • Opcode ID: 5dcba8bc086b18adc160d8fe20d3abbad6873a0da564532fe75aa746724f9a3a
                                          • Instruction ID: c43f0b3777832ab19946517d32641c1b873e42a60538ec96159e649ef0a9a65f
                                          • Opcode Fuzzy Hash: 5dcba8bc086b18adc160d8fe20d3abbad6873a0da564532fe75aa746724f9a3a
                                          • Instruction Fuzzy Hash: 2151B432A08A51D2EB60DF5BE0A0338E7A2EB84F95F54C675CE5E437A4DF79D442A310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                          • API String ID: 1294909896-1255959952
                                          • Opcode ID: 3f6686c5872a1f6a81ecd9e0f058412ef29e7e2cd2025b5abae98a3b82803512
                                          • Instruction ID: 1992c300ed423a60ad033204a0adfdaec726650e1f119249478122c458fe3f84
                                          • Opcode Fuzzy Hash: 3f6686c5872a1f6a81ecd9e0f058412ef29e7e2cd2025b5abae98a3b82803512
                                          • Instruction Fuzzy Hash: E551E7B2E09662E5FB11EBA5D4402BDA7A6FB41B94F884031DA8D83681DFBDE451D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: 1fb06e9a3e7450c4a3794c0b93c4f63385b47844a9cf2e3dc595b16c47b35eb1
                                          • Instruction ID: e2caa26647456e57d96381f2efe1558377500fecdadbc7fbb879385154d8dd88
                                          • Opcode Fuzzy Hash: 1fb06e9a3e7450c4a3794c0b93c4f63385b47844a9cf2e3dc595b16c47b35eb1
                                          • Instruction Fuzzy Hash: 8841D611E0D2F2E6EB62AB556110379AF96AF01754F8A01F5DEDE063C1DEADE444F320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: dfaed6e386e33724cb2e223900adcbd9f7fef9935f9687bffa3bbf8d2aa51031
                                          • Instruction ID: 23577c268459835bce1f66bf59287d8af6757287c379589b2764e2030f96cb17
                                          • Opcode Fuzzy Hash: dfaed6e386e33724cb2e223900adcbd9f7fef9935f9687bffa3bbf8d2aa51031
                                          • Instruction Fuzzy Hash: D241E511E0D2F2E6FB62A7556110378AF969F02754F8A01F1DEDE063C1DEADE444E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: b67b34d9d2b74a6abba1901238562642ff15dceaa1a23bc772bb3e51d676fca3
                                          • Instruction ID: 86b4665c8575a0ca6d01865fb68848899356a60ae91af16b413b329ffbf5e689
                                          • Opcode Fuzzy Hash: b67b34d9d2b74a6abba1901238562642ff15dceaa1a23bc772bb3e51d676fca3
                                          • Instruction Fuzzy Hash: B341E611E0D2F2E6FB62AB956110378AF969F06754F8A01F1DE9E063C1DEADE444F320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: 3c17b8edd8f51791b30496a62c6b8e61968bdc908898effc3d30ade1595102bd
                                          • Instruction ID: 87b3e14d2c2b82b96d1daeed0f0528322d2fe510ba5d4ddf475f190f5966cc28
                                          • Opcode Fuzzy Hash: 3c17b8edd8f51791b30496a62c6b8e61968bdc908898effc3d30ade1595102bd
                                          • Instruction Fuzzy Hash: 3C41E611E0D2F2E6FB62AB556110378AF969F02754F8A01F1DE9E063C1DEADE444F320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: 2e3edc563f2aee38bc4da222f14dc07a5d5f3b87b8ef437c646bcd55731b9087
                                          • Instruction ID: 6ec5a03e34454e2f0fbaa10ff6edbe0928b5dde3df961689b810cfa7e334b640
                                          • Opcode Fuzzy Hash: 2e3edc563f2aee38bc4da222f14dc07a5d5f3b87b8ef437c646bcd55731b9087
                                          • Instruction Fuzzy Hash: 7341E611E0D2F2E6FB62AB656110378AF969F02754F8A01F1DE9E063C1DEADE444F320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: a5c0cff52b00059ef7d8c77f212d0b1658b3423eb890fb7911eff90761143d53
                                          • Instruction ID: 04b814884b345aee493d1afbb76ad26a341c775d27a55853ead33977cfdaf6d9
                                          • Opcode Fuzzy Hash: a5c0cff52b00059ef7d8c77f212d0b1658b3423eb890fb7911eff90761143d53
                                          • Instruction Fuzzy Hash: 7941D511E0D2F2E6FB62AB556110378AF969F02754F8A01F1DE9E063C1DEADE444F320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: %%%02x
                                          • API String ID: 1941130848-4020994737
                                          • Opcode ID: eebc2a546fc8e6feac9b87d948e5f37beee0bb11b8e0f088ce828c99f435c154
                                          • Instruction ID: a232c66f81fe68b4d3d199a4aa4e155a6d377e567bf0bd62d324e205fe8b4de5
                                          • Opcode Fuzzy Hash: eebc2a546fc8e6feac9b87d948e5f37beee0bb11b8e0f088ce828c99f435c154
                                          • Instruction Fuzzy Hash: 9741E511E0D2F2E6FB62AB556110378AF969F06750F8A01F1DE9E063C1DEADE444E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _time64
                                          • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                          • API String ID: 1670930206-870032562
                                          • Opcode ID: 293506947766e32d74f725f200bba93e5a6cab1f91c5436f01adaa20fbc03ab6
                                          • Instruction ID: eaa5a77cfe3020b9c827c03c132e18e767606b0980b15607c906238868f884b5
                                          • Opcode Fuzzy Hash: 293506947766e32d74f725f200bba93e5a6cab1f91c5436f01adaa20fbc03ab6
                                          • Instruction Fuzzy Hash: 0A411372F24625D3DB20DF6AE400668B3A1F798F88F905032DE0C8B789DE79E541CB40
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr
                                          • String ID: 100-continue$Expect$Expect:$Expect: 100-continue
                                          • API String ID: 2830005266-711804848
                                          • Opcode ID: 7e7249d2413e93b8756c8e5a769afa0f3ec6f63a671b70d6ce7e4fc1b7ebd840
                                          • Instruction ID: 2983df14410f9e4e7ad78791c3e4171d65ff6fca68893a8a9bcd487329f8b20b
                                          • Opcode Fuzzy Hash: 7e7249d2413e93b8756c8e5a769afa0f3ec6f63a671b70d6ce7e4fc1b7ebd840
                                          • Instruction Fuzzy Hash: 43412D21F0C7A2E2EF14FB9AA4002B8E792DF45784FC85034DE4D0BB8ADE9CE4419724
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: fseek
                                          • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                          • API String ID: 623662203-959247533
                                          • Opcode ID: 4a180bee4e4fa4266d05dc575f122d72706373429b7470aa6994d42db28c7cb0
                                          • Instruction ID: 0589c380d29e2370eb4b9e2823f16ea2a9923762070304747b23369a02fea834
                                          • Opcode Fuzzy Hash: 4a180bee4e4fa4266d05dc575f122d72706373429b7470aa6994d42db28c7cb0
                                          • Instruction Fuzzy Hash: C541C572E04A92D1EB50EFA694403B85393EB84B84F885031DE0E4B399DFBDE490D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                                          • API String ID: 2190258309-3662781045
                                          • Opcode ID: 950803be5321596d8ae6dcd6400d6715bd22c82becce96dbb6edd16642afa6e7
                                          • Instruction ID: 410e6846b810ef50068fecc60c9fbb827232621323aad62aa7d692121d52fa36
                                          • Opcode Fuzzy Hash: 950803be5321596d8ae6dcd6400d6715bd22c82becce96dbb6edd16642afa6e7
                                          • Instruction Fuzzy Hash: 8441B262E08AA2E1EB10EFA5E4001F9E3AAFB45784FC86032DA8D17755DFBCD545D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-659367561
                                          • Opcode ID: f392083efe6b65ded1fc2e6bc662f49a9fc365949f050ff65cdf9f05b9f96eba
                                          • Instruction ID: 28a593d4cd011869e55de9d7ad05a177c153903eea3bb548a87839c0dc652f07
                                          • Opcode Fuzzy Hash: f392083efe6b65ded1fc2e6bc662f49a9fc365949f050ff65cdf9f05b9f96eba
                                          • Instruction Fuzzy Hash: FF41BB91F0D6A2E4EF10ABE594141F9AB97AF05788FC45831CE4E17796EE7DE004E360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: .
                                          • API String ID: 1865132094-916926321
                                          • Opcode ID: 027f7fe9b366bf7d7183bdacec28f6c9f86bb076554f293a86ea0004c285c0c6
                                          • Instruction ID: 868e643e63806e048c3ae100e9a40bf26b8d5b4eda1ac6eee3eba4ea99b720c2
                                          • Opcode Fuzzy Hash: 027f7fe9b366bf7d7183bdacec28f6c9f86bb076554f293a86ea0004c285c0c6
                                          • Instruction Fuzzy Hash: 0D41B622F08F65E2FB10EB959500379A3AAFB44B80F854075DA4D8B680DFBCE451E7A0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3401966785-517259162
                                          • Opcode ID: 25f84c5534454b8c43c74e32c76f92ce0ee4c5d2a495e4f678ebbaf9449bc15d
                                          • Instruction ID: 5fa31de185e80e2d04ea5615c9ecbc0852d0e7653a8a52a479c374e3e7e43f13
                                          • Opcode Fuzzy Hash: 25f84c5534454b8c43c74e32c76f92ce0ee4c5d2a495e4f678ebbaf9449bc15d
                                          • Instruction Fuzzy Hash: 3341B6A1E097A2E0EB10ABA294141F9A763BF05788FC45435CE0E17795EFBDE504E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc$memcpy
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 3519880569-1663925961
                                          • Opcode ID: 41a64bd3ee70ac3280c524507bdb8a6bfecaf95fafe27d1a23f5f35e8675915e
                                          • Instruction ID: 943ce2d1f55f01ae90f8a5374f244901fada408466bb4c69aa9dfaeaf6598c80
                                          • Opcode Fuzzy Hash: 41a64bd3ee70ac3280c524507bdb8a6bfecaf95fafe27d1a23f5f35e8675915e
                                          • Instruction Fuzzy Hash: 4131C5A1F09B92D1EF20EB96A4142B9A3A6BF45BD4F841532CE5D17795EF7CE001D310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: __stdio_common_vsscanf_strdupfree
                                          • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                          • API String ID: 860312144-3309259123
                                          • Opcode ID: 4f8b19885a3942946affcb2a731a69568565c9aeb0bd8ea935e111cb0f4ff412
                                          • Instruction ID: 612598e8e94ecc655d2b26871704118e5913a5356a74ad3706efb61901a83cca
                                          • Opcode Fuzzy Hash: 4f8b19885a3942946affcb2a731a69568565c9aeb0bd8ea935e111cb0f4ff412
                                          • Instruction Fuzzy Hash: 3B31A032E0C662E2EB60FB90E4001BDA366FF45B84F944072CA4D47A55DFACE851E3A1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: Start Date: %s$FALSE$Start Date$TRUE
                                          • API String ID: 1865132094-176635895
                                          • Opcode ID: 26fd87226f7b76be0d7ca323069a9011490084f438441079654d859d0cb0e761
                                          • Instruction ID: ee5cf853bc1d4824d9a19b480e9d6736b8d520ebe40a574c2a4e608d710dbf03
                                          • Opcode Fuzzy Hash: 26fd87226f7b76be0d7ca323069a9011490084f438441079654d859d0cb0e761
                                          • Instruction Fuzzy Hash: EC21D3A1F0C6E2E5EB20AB91A4542B9B7A7FB05788FC88431CA4E07355DF7DE440D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc$_strdup
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1941130848-1663925961
                                          • Opcode ID: ca1245fe2eff767ec2f233e59202265185292fa145f8adc7ec0566ffc5c026f4
                                          • Instruction ID: cd3231a98bd0b99458d073fa46755667bc525ef1d33e8ed1aeb9963ec1a73249
                                          • Opcode Fuzzy Hash: ca1245fe2eff767ec2f233e59202265185292fa145f8adc7ec0566ffc5c026f4
                                          • Instruction Fuzzy Hash: 2C216562F08B92D5EB50EB95A4542BAA3A6FF45784F841431DE4D17725EF7CD001D710
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731673196), ref: 00007FF73166F9A1
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731673196), ref: 00007FF73166F9B1
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731673196), ref: 00007FF73166F9BF
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731673196), ref: 00007FF73166F9CD
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731673196), ref: 00007FF73166F9DB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731673196), ref: 00007FF73166F9E9
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731673196), ref: 00007FF73166F9F7
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731673196), ref: 00007FF73166FA05
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 6067c455441f06eacc75c484e81e95a2b8bf68b1b5c4620927136906145762a9
                                          • Instruction ID: 1ea423ae2c38efe426cb9c64c1353ef20306ec2dfd340e5f6f5402cc6c2c4bbc
                                          • Opcode Fuzzy Hash: 6067c455441f06eacc75c484e81e95a2b8bf68b1b5c4620927136906145762a9
                                          • Instruction Fuzzy Hash: A801D776A08B11D2D710AF61E58423CB3B5FB89F887501529CEDE43718CF78C4A5E360
                                          APIs
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7316732DB), ref: 00007FF731672A77
                                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF7316732DB), ref: 00007FF731672AA8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: calloc
                                          • String ID:
                                          • API String ID: 2635317215-0
                                          • Opcode ID: 4fe3cdd50797a9d4038df01a147244b90b8d9f1f8f08ad952520229b325114c1
                                          • Instruction ID: 267e8213e6864a7d03f6ecadfa5a513f26479b4680a3fa2db9fa58def135b6d3
                                          • Opcode Fuzzy Hash: 4fe3cdd50797a9d4038df01a147244b90b8d9f1f8f08ad952520229b325114c1
                                          • Instruction Fuzzy Hash: 4E91AD22A09BC1D9D7159F7894403ED77A1F759B28F48023ACFAC0B3C6CF6991A4D721
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1775671525-0
                                          • Opcode ID: a20e593d4bd82ef9cc10abe2e2397c5f0dd4fde0d56d9362464a2f7d70bc2716
                                          • Instruction ID: 25f7632d34d6aaeed7c7deddc90bdb780c595e812f79ca1627d24312281661ef
                                          • Opcode Fuzzy Hash: a20e593d4bd82ef9cc10abe2e2397c5f0dd4fde0d56d9362464a2f7d70bc2716
                                          • Instruction Fuzzy Hash: 5F31E1A1B18A61E1EF14EB5295141B8E36AEF48BE0F940631DE6D07BC5CFBCE085D320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ConditionMask$InfoVerifyVersion
                                          • String ID:
                                          • API String ID: 2793162063-0
                                          • Opcode ID: 886a942f540bc7cf8f29631a9320e31e516c52bfc616a14f4d3cfc983c6169fc
                                          • Instruction ID: 81d5f44398ac55cdff447c2322e5e311e630c81d4436f37e9b44a8f84967647e
                                          • Opcode Fuzzy Hash: 886a942f540bc7cf8f29631a9320e31e516c52bfc616a14f4d3cfc983c6169fc
                                          • Instruction Fuzzy Hash: 9341F822E1C6A1D6F330EB51B4147BAF3E1EBD5301F419239EAC903A54DE7DE495AB10
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                          • API String ID: 1294909896-2901970132
                                          • Opcode ID: 7c92a4bbe7371fb4b1d8e617a56d88ad3c7bf77f1d7e34ffe023260c47be8e9d
                                          • Instruction ID: 40dc6431dee77f04cdfd51aa2947a741a71e8c15bb3dbdd19c4887a76e0afd7b
                                          • Opcode Fuzzy Hash: 7c92a4bbe7371fb4b1d8e617a56d88ad3c7bf77f1d7e34ffe023260c47be8e9d
                                          • Instruction Fuzzy Hash: 7041C5A1E087A2A4EB10ABA194141F9B7A7FF05789F885535CE5E07795EF7CE104D320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupstrchr$mallocstrncpy
                                          • String ID:
                                          • API String ID: 2121287944-0
                                          • Opcode ID: f3e0fd5fc6c556495a85d1937cda66a0595a23ab214d23e79ede491f7e511163
                                          • Instruction ID: 3e31cb8dce698d527ff26f84dd85f72a39f391bff496e8fa90a17e05ad612421
                                          • Opcode Fuzzy Hash: f3e0fd5fc6c556495a85d1937cda66a0595a23ab214d23e79ede491f7e511163
                                          • Instruction Fuzzy Hash: 1F31A322E0DB91DAEB54FF92A440279A7A2BF49B80F544638DE5F03791DFBCE0509310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memcpy$freemalloc
                                          • String ID: PLAIN
                                          • API String ID: 3313557100-4000620671
                                          • Opcode ID: b2f10b0df633edde4c663c154711e900b01d618fb6a07a779d575b7840397b43
                                          • Instruction ID: 807d8c929d6332461d9e549d6ce8b1e4bc79eb01433906984f71aa4e6cc55d26
                                          • Opcode Fuzzy Hash: b2f10b0df633edde4c663c154711e900b01d618fb6a07a779d575b7840397b43
                                          • Instruction Fuzzy Hash: C731F3A6E08B91D2EB10DF91E4502AAB791FB45BE8F848631DE9C077D5DE7CE015D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-517259162
                                          • Opcode ID: 7b7e3b5bfc8c0bbd38473bdcac9e04d71a842dd77c58079ce5dae42441d08063
                                          • Instruction ID: b9dc96ac0ab076c2383318adca63d448dc4564dfbfbdc3027cb9533979705f52
                                          • Opcode Fuzzy Hash: 7b7e3b5bfc8c0bbd38473bdcac9e04d71a842dd77c58079ce5dae42441d08063
                                          • Instruction Fuzzy Hash: 2A41BAA5F097A2E4EB10ABA194141F9A766BF05BC8F885436CE4E17795DF7CE104E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: callocfreememcpystrchr
                                          • String ID: CAPA$Got unexpected pop3-server response
                                          • API String ID: 2887963327-1591402739
                                          • Opcode ID: 7b13aeeb5f174c84a05b40aad520cf0a66e54b04a4a91b3024b38faf5081b1cc
                                          • Instruction ID: 3f6e7372f0a112bbf5a31c36d82efc61bcb311d0c27c961abf807df61cb8770d
                                          • Opcode Fuzzy Hash: 7b13aeeb5f174c84a05b40aad520cf0a66e54b04a4a91b3024b38faf5081b1cc
                                          • Instruction Fuzzy Hash: FC310361F0CBA2F3EB09AB9195402B9A39ABF01354F844175CA1E83391CFBCF465E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$%s%lx$Signature
                                          • API String ID: 2190258309-1406629954
                                          • Opcode ID: 9264e6448cedd647a91235911ff1229aaed000e140e40ead4778aa69a6d9dffe
                                          • Instruction ID: 31205ef1cd933411a74fea96b54d07f47398e2196d99ee430afcefe75324418b
                                          • Opcode Fuzzy Hash: 9264e6448cedd647a91235911ff1229aaed000e140e40ead4778aa69a6d9dffe
                                          • Instruction Fuzzy Hash: DD31E5A2F086A2E5EB20ABA5E4542B9A3A6FF45BC4FC41431DE4D07755EE6DE000E720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 1294909896-517259162
                                          • Opcode ID: ea154de60150d50552c2718d6fc22c5b5b235f255668f2ffea73f60108924b44
                                          • Instruction ID: c9cee3619199789f8cbb5dd858ead61748ab2c98d21b69d3ea99f15e977eaf8b
                                          • Opcode Fuzzy Hash: ea154de60150d50552c2718d6fc22c5b5b235f255668f2ffea73f60108924b44
                                          • Instruction Fuzzy Hash: 87318791E097A2E4EF10ABE194140F9A767AF05788FC45835CE4E17396EEBDE404E320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupcallocfree
                                          • String ID:
                                          • API String ID: 1236595397-0
                                          • Opcode ID: e8613d0294d1cc7f92a55901f0896a61e06b1b620139e0056f4eaf019247f7ed
                                          • Instruction ID: ae0e1746d8964d0536a1c722e07ba92a0a671cf84ebe868159f86ca5e64cc703
                                          • Opcode Fuzzy Hash: e8613d0294d1cc7f92a55901f0896a61e06b1b620139e0056f4eaf019247f7ed
                                          • Instruction Fuzzy Hash: 0231E232E08B99C2EB40DB64E0103BDA7A1EB86B88F981074DE8C0B794DF7DD4919720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3061335427-517259162
                                          • Opcode ID: bd3d540a2484f9cd3a53e73c16194a4881832abcfbe8509155d6b2d58ebfcfa6
                                          • Instruction ID: 9159d7143e20a4c869af51f76266da0760b9473eb28150bb8906c5ded6d1a020
                                          • Opcode Fuzzy Hash: bd3d540a2484f9cd3a53e73c16194a4881832abcfbe8509155d6b2d58ebfcfa6
                                          • Instruction Fuzzy Hash: B731A991E097A2E4EF10ABE194140F9A767AF05788FC45835CE4E17396EF7DE400E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                          • API String ID: 3061335427-517259162
                                          • Opcode ID: db235a4450c5f349b9ab72eb30da38325840abdeb67f20acb983d19fc2a4c14d
                                          • Instruction ID: 9afbd9b61bceb39dae19852b4144a7f4f1b28267736d3fb6b43d7542b0405add
                                          • Opcode Fuzzy Hash: db235a4450c5f349b9ab72eb30da38325840abdeb67f20acb983d19fc2a4c14d
                                          • Instruction Fuzzy Hash: C331A891E097A2E4EF10ABE194140F9A767AF05788FC45836CE4E17396EF7CE400E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: OS/400$SITE NAMEFMT 1
                                          • API String ID: 3061335427-2049154998
                                          • Opcode ID: ad2d57b8bdb64e64066a1e9082085b36c03f6f800f1ceea49132c5796a990990
                                          • Instruction ID: 5063a65ac8eb8a4a66eac8a68189a49b84b1d1785c72dcbbe1ad782352cb1401
                                          • Opcode Fuzzy Hash: ad2d57b8bdb64e64066a1e9082085b36c03f6f800f1ceea49132c5796a990990
                                          • Instruction Fuzzy Hash: 9331B431E0D7E2D2F771ABA5A5503B8A362BB45784F8080B1CA8D53685DEBCE446F720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                          • String ID:
                                          • API String ID: 469868127-0
                                          • Opcode ID: 8733a8bd44e2f7f02a246a01e5749e81d6759ab44664e7c36cc05855e83f8b24
                                          • Instruction ID: d8f33f05742c9a2cd84523b56a7183cd57a9fd232e1f42bc1e0b893267d5bf02
                                          • Opcode Fuzzy Hash: 8733a8bd44e2f7f02a246a01e5749e81d6759ab44664e7c36cc05855e83f8b24
                                          • Instruction Fuzzy Hash: 20212F36B08A51D6E720EF92E58026DA371FB89B91F444135CF8E03B55CFB9E4A5D710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _errno_strdup
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 2151398962-2292467869
                                          • Opcode ID: fe4fbd5b161871837b2c6627368ccb15061f77f956633df05ad5df12efc7a7c4
                                          • Instruction ID: 1b507cb2ae881e2c765ed5a27a9210e2545085b0afa363f8c75927ddc5fc5a77
                                          • Opcode Fuzzy Hash: fe4fbd5b161871837b2c6627368ccb15061f77f956633df05ad5df12efc7a7c4
                                          • Instruction Fuzzy Hash: D3616422D0C7A2E9FF71AB9594443B9E7F6AF04744F884136DE8D02695DFACE444E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupstrchr
                                          • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                          • API String ID: 3727083984-2292467869
                                          • Opcode ID: cb176cf49a18697cb9ff187e0e2f934d8353dd0dd209865de60e80541dbafc35
                                          • Instruction ID: 03807c6898e80a620d644a6207aed721cb56ecfd5cca364483b9f815c7aa2e3c
                                          • Opcode Fuzzy Hash: cb176cf49a18697cb9ff187e0e2f934d8353dd0dd209865de60e80541dbafc35
                                          • Instruction Fuzzy Hash: E4617222E0D7A2E9FF71ABA59444379E7F6AF04744F884036DE8D02695DFACE444E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: Forcing HTTP/1.1 for NTLM$The requested URL returned error: %d
                                          • API String ID: 1865132094-1204028548
                                          • Opcode ID: a5ad95a8d7228f168eaad1fb3b6ca0d0b0f4a4159d4623a918b39f703ac308c2
                                          • Instruction ID: 5d251191168efc8f469919c0825664dfd8080fc46d051865dd8dd9d318e9e27e
                                          • Opcode Fuzzy Hash: a5ad95a8d7228f168eaad1fb3b6ca0d0b0f4a4159d4623a918b39f703ac308c2
                                          • Instruction Fuzzy Hash: 2351CB71E0C6A2E1F7A4AFE4C1403F9A792EB49788F880039DA4E47A85DF6CE450D330
                                          APIs
                                            • Part of subcall function 00007FF731654350: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF731654381
                                            • Part of subcall function 00007FF731653C70: memcpy.VCRUNTIME140 ref: 00007FF731653CC3
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652722
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF731652770
                                          • __std_exception_copy.VCRUNTIME140 ref: 00007FF7316527C0
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF73165280D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                          • String ID: out_of_range
                                          • API String ID: 2484256320-3053435996
                                          • Opcode ID: 416aaa0d375e5eec63550c4ab23ce1862656c62d6f6218db7ac47a387bde8a41
                                          • Instruction ID: 434badeaf478ab2ad4b4876eda0c49120d50261650e070798d0e5eef987ad05e
                                          • Opcode Fuzzy Hash: 416aaa0d375e5eec63550c4ab23ce1862656c62d6f6218db7ac47a387bde8a41
                                          • Instruction Fuzzy Hash: 1651B272F18B52E9FB00DFA5D4503AC7366EB48798F808235EA5D02AD9DFB8E195D310
                                          APIs
                                          • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF731654381
                                          • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF731654446
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF73165449A
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7316544A1
                                            • Part of subcall function 00007FF7316AFB48: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF73165442E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF7316AFB62
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID: https://keyauth.win/api/1.2/
                                          • API String ID: 1155477157-3933380396
                                          • Opcode ID: 80e07f2ec084bafb4c9b2edb4020a5aa9b86da915471fa139b76f77608c9046b
                                          • Instruction ID: 00049f67e13bb6c3f1696f3964d2b2c58c406142451f580e8144e2a2f43de973
                                          • Opcode Fuzzy Hash: 80e07f2ec084bafb4c9b2edb4020a5aa9b86da915471fa139b76f77608c9046b
                                          • Instruction Fuzzy Hash: 88310AA2F0A6A595EF19EA9795202789752DF04FF4F840670CE3D077D5EEBCE4829310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: tolower$_time64
                                          • String ID: :%u$Hostname in DNS cache was stale, zapped
                                          • API String ID: 4068448496-2924501231
                                          • Opcode ID: a1bcfb6b737e128f22dc2304d54d207902b239ab6957f751d3e806f713f45f87
                                          • Instruction ID: 7f71647cf56432619a75d88c466e2d7b9b86906a58905c6124469eefc1fa8959
                                          • Opcode Fuzzy Hash: a1bcfb6b737e128f22dc2304d54d207902b239ab6957f751d3e806f713f45f87
                                          • Instruction Fuzzy Hash: F541F822E186A2E5EB10FB51E4407B9A766FB44B98FC54232DE6D07785DF7CE005D310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_close_openmalloc
                                          • String ID: Couldn't open file %s
                                          • API String ID: 3412525164-447283422
                                          • Opcode ID: 7856573c67e4ecf729b0dc835e39a869844de092acf3b00592fb5aa2bffd79d6
                                          • Instruction ID: e75528c25bdc321a53361e5173b0f42a5ce991f5f1f103b464da77e2f7668abb
                                          • Opcode Fuzzy Hash: 7856573c67e4ecf729b0dc835e39a869844de092acf3b00592fb5aa2bffd79d6
                                          • Instruction Fuzzy Hash: 4841E032E08AA1D2EB149F65E40027AE7A2FB45B94F888071DA9D47785CFBCE001DB20
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ErrorLast$_errnofreememcpyrecv
                                          • String ID: Recv failure: %s
                                          • API String ID: 267823591-4276829032
                                          • Opcode ID: 9f37ef25d2cbde7e44d61f655dfd075aa7a26731cbe2d316d942a178f3c2f71e
                                          • Instruction ID: 766a142f4e03bfce704645e2a63ba222ba4374ede3eeba04b18b0dd92e26e01d
                                          • Opcode Fuzzy Hash: 9f37ef25d2cbde7e44d61f655dfd075aa7a26731cbe2d316d942a178f3c2f71e
                                          • Instruction Fuzzy Hash: 7F31CE76F05B61D1EB11AF96E8802B9A3A1BB48FD8F904135CE1D07384EEBCD456E350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: Connection died, retrying a fresh connect$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                          • API String ID: 1865132094-195851662
                                          • Opcode ID: b2f75524ccea4e637de733992f4f779450420ae890607c224c1569b4bb52aa83
                                          • Instruction ID: afe4eba3563a089e37393f4bc9306fbcc9d49fc0f797b05cb3b3892cf04d6498
                                          • Opcode Fuzzy Hash: b2f75524ccea4e637de733992f4f779450420ae890607c224c1569b4bb52aa83
                                          • Instruction Fuzzy Hash: D841E532F0CA92D1EB55EB65E4403A9A792EB84B88F888431DB5D07796CFBCD491D710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfreestrpbrk
                                          • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                                          • API String ID: 1812939018-579818044
                                          • Opcode ID: e8bf0f1166062040c79a1d659e28989542820538a677ba05d44a4a9e570ddb35
                                          • Instruction ID: bf1b5ea51a61ef77213af228f3ba26f3e21d3dfd70737682c636e849d3a7ea92
                                          • Opcode Fuzzy Hash: e8bf0f1166062040c79a1d659e28989542820538a677ba05d44a4a9e570ddb35
                                          • Instruction Fuzzy Hash: 5931E862E18B81D2EB01EB65E4402B9E7A2FB85B90F888235DA5E077D1DFBCD541D310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: %s: %s$FALSE$TRUE
                                          • API String ID: 1865132094-3430445539
                                          • Opcode ID: 3825d031a93768815eb6b5328640b0091a31a05f0c4b0cbf60904bbfdb54b7ed
                                          • Instruction ID: d5f15cdd023ba7cc285d3f5ab0e47c709393fed10dd39b840123d64eba112b01
                                          • Opcode Fuzzy Hash: 3825d031a93768815eb6b5328640b0091a31a05f0c4b0cbf60904bbfdb54b7ed
                                          • Instruction Fuzzy Hash: 61016591E087A2E6EF61AB96A4503F6A392BB05B84FD44435CE4E03751DFACE145E320
                                          APIs
                                            • Part of subcall function 00007FF7316A4BD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316A1665), ref: 00007FF7316A4BF6
                                            • Part of subcall function 00007FF7316A4BD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316A1665), ref: 00007FF7316A4C17
                                            • Part of subcall function 00007FF7316A4BD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316A1665), ref: 00007FF7316A4C32
                                            • Part of subcall function 00007FF7316A4BD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316A1665), ref: 00007FF7316A4C40
                                            • Part of subcall function 00007FF7316A4BD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316A1665), ref: 00007FF7316A4C52
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7316A4CF6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: HTTP$NTLM
                                          • API String ID: 2190258309-4188377180
                                          • Opcode ID: d700e50b9f6d607d8b3a74ecd7020a60d0401cc3b52875f11de2c358a72f89e2
                                          • Instruction ID: ca2c2889f704476ea9307d2317d7f93a9473e8a1bb4214b087a9ef84a30e6b21
                                          • Opcode Fuzzy Hash: d700e50b9f6d607d8b3a74ecd7020a60d0401cc3b52875f11de2c358a72f89e2
                                          • Instruction Fuzzy Hash: C6618C72A09B91D2E7609F56E84026AB3A6FB88B84F944035DF8D43B58DF7CD454DB10
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                          • API String ID: 1294909896-1891748601
                                          • Opcode ID: d1dbb01f54f92b8f2f1cdad09fed6d72f8988b886edd537990e46cf6e09fd01c
                                          • Instruction ID: 11d78339ce7f4beb95b114cd209fb77618c486ba1614026708f1b2f767f818d1
                                          • Opcode Fuzzy Hash: d1dbb01f54f92b8f2f1cdad09fed6d72f8988b886edd537990e46cf6e09fd01c
                                          • Instruction Fuzzy Hash: 1C51C861D0D6A2E3EBA5F7B090503B9A352EB45364FC04279DA6E076C2DFFCE445A360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: TRUE
                                          • API String ID: 3401966785-3412697401
                                          • Opcode ID: c025a0c3dc1ec3e80a8e52a6cec06fdbfe740c0ae21a7d2b85079ddef5b95d9f
                                          • Instruction ID: 188f0916ee93ce6ba9c007ce2f5332449287ade42d9d037a26e2a15e664aa9bb
                                          • Opcode Fuzzy Hash: c025a0c3dc1ec3e80a8e52a6cec06fdbfe740c0ae21a7d2b85079ddef5b95d9f
                                          • Instruction Fuzzy Hash: 4F417BA9F186F291FB069A558914379ABA3EB417E0F844637CA6F433C5DDACD081E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$mallocmemcpy
                                          • String ID: %s: %s
                                          • API String ID: 3401966785-1451338302
                                          • Opcode ID: dc1ef0588320f42d92b7cff0719b3b8cc03c3838bfdfd30c54a14f295920d0a3
                                          • Instruction ID: 5e45d4a707b22e339198dd4225fb1005cf0d5b2240d1db6f5d849b1fb2203d9d
                                          • Opcode Fuzzy Hash: dc1ef0588320f42d92b7cff0719b3b8cc03c3838bfdfd30c54a14f295920d0a3
                                          • Instruction Fuzzy Hash: D4413B91E092F196EF28AA9650243B59793AB45BE0F98423ACF9F077C5DE9CD045E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Start Date: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Start Date
                                          • API String ID: 1294909896-619256714
                                          • Opcode ID: b593b65929af07077842564f2cb30784d05489b30c400f16d670199426e054dd
                                          • Instruction ID: eb3f077f2b18fb8298ba4bec88c7a7a830c990349868b1710c916d74073dbd30
                                          • Opcode Fuzzy Hash: b593b65929af07077842564f2cb30784d05489b30c400f16d670199426e054dd
                                          • Instruction Fuzzy Hash: 8951E5E1E0C6E2E4EB10AF9595141B8F7A6FB05780FC49471CA8E06754DFBDE641E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Start Date: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Start Date
                                          • API String ID: 1294909896-2752585153
                                          • Opcode ID: 4741d83406359ee3f7d6043eaef330398b2e05172c69b4ec56a369e3b47ed9a8
                                          • Instruction ID: b168c5aa07b904052ac2bc1eab810226e21083658c3700d013696219d47301f6
                                          • Opcode Fuzzy Hash: 4741d83406359ee3f7d6043eaef330398b2e05172c69b4ec56a369e3b47ed9a8
                                          • Instruction Fuzzy Hash: 513193A1E0CAA2E4EB10AFA594101B9F797FB05784FC88471CB4D16295DFBDE544E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 2190258309-1663925961
                                          • Opcode ID: 7e941dfaf5f8a2d93b432d2b7afcc53c8c33386750d809cd1a2bcc3477fb2b98
                                          • Instruction ID: 5ca029a84b6b68ed083cd419ee5996830d0592864209733e3fc53e8ebbf5df25
                                          • Opcode Fuzzy Hash: 7e941dfaf5f8a2d93b432d2b7afcc53c8c33386750d809cd1a2bcc3477fb2b98
                                          • Instruction Fuzzy Hash: 0B21E062F08AD2D6EB109BA6E4042FAA3A6FB48BD8F880532DE5D53795DF7CD101D310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Failure sending QUIT command: %s$QUIT
                                          • API String ID: 1294909896-1162443993
                                          • Opcode ID: 807ef8fa226970ae5b9040265797cb9f53c43fdafe48f57b89e976fbdb420d33
                                          • Instruction ID: 97108da0268ecf1fd4858c754458fe75d299405827c86a36492e31fd1dea1bab
                                          • Opcode Fuzzy Hash: 807ef8fa226970ae5b9040265797cb9f53c43fdafe48f57b89e976fbdb420d33
                                          • Instruction Fuzzy Hash: 3D319631F087A2E2EB90EFA2D4443B9B396FB45B84F844039DA4E07655DF6CD051E360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$calloc$memcpy
                                          • String ID:
                                          • API String ID: 3478730034-0
                                          • Opcode ID: 551880f0cf651d9d3cd7b3d72f1750254fa78b1a94682acab546ab4d6fd1212c
                                          • Instruction ID: 90e65c7045b7e0bbe73112917df6cdbc0b6303d4eacfc423e781f804476644b5
                                          • Opcode Fuzzy Hash: 551880f0cf651d9d3cd7b3d72f1750254fa78b1a94682acab546ab4d6fd1212c
                                          • Instruction Fuzzy Hash: 2F21C471E08B92D6E724AF62A410239B7A2FB89BD4F844234DE9E17794DF7CD450E720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr$_strdupmalloc
                                          • String ID:
                                          • API String ID: 4236146995-0
                                          • Opcode ID: ac77d55da153c51ce4b0da4844e3ee0dc72817ed75bc1a3428b20dbaeaf331c7
                                          • Instruction ID: 8d0bb80107158defbf718643948dd7c160dc826a44954fcdadaf98da1db0be1d
                                          • Opcode Fuzzy Hash: ac77d55da153c51ce4b0da4844e3ee0dc72817ed75bc1a3428b20dbaeaf331c7
                                          • Instruction Fuzzy Hash: B9219D62F15B85D2EB81DF6190443ACA3E2EB89B84F481135DE4D0B748EF79D491D730
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 2190258309-1663925961
                                          • Opcode ID: 0524c1bf4175a93633869f3fc57a9e9334e9eb6c4924e45b541d7c896293409d
                                          • Instruction ID: 79366edf91ad82ebac157700cfc20bc961679d9a4b52aa2dc3d3ab4e644fcf5f
                                          • Opcode Fuzzy Hash: 0524c1bf4175a93633869f3fc57a9e9334e9eb6c4924e45b541d7c896293409d
                                          • Instruction Fuzzy Hash: AF21E5A2F08692E5EB10EB95E4102FAA366FF447C4F841432DE4D07715EE7CD001D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: malloc$free
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1480856625-1663925961
                                          • Opcode ID: 0e76b6a316340a42a1bc527b4a0993da5b2c0cb114230e1b1a20d8241241b9a3
                                          • Instruction ID: f55ed5bda621e50e0b2cf4cd4533bf853f6d677c8c72d6df5ec9e1180ffdc6b8
                                          • Opcode Fuzzy Hash: 0e76b6a316340a42a1bc527b4a0993da5b2c0cb114230e1b1a20d8241241b9a3
                                          • Instruction Fuzzy Hash: C52171A2F08A92D5EB10EB96E4542EAA3A6FF85788F841432DE4D17725EF7CD001D710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: malloc$free
                                          • String ID: Signature: %s$Signature
                                          • API String ID: 1480856625-1663925961
                                          • Opcode ID: 7e4034373774d43b519a8af8c2c682e0bc05bde0d65ec1908a57987c2b653275
                                          • Instruction ID: 9213318b85dc1ace6a1c47582a69acddd17660344e2456f689307b2b79f94042
                                          • Opcode Fuzzy Hash: 7e4034373774d43b519a8af8c2c682e0bc05bde0d65ec1908a57987c2b653275
                                          • Instruction Fuzzy Hash: D12171A2F08A92E6EB50EB96E4542EAA3A6FF85784F841432DE4D17725EF7CD001D710
                                          APIs
                                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF731662EB9), ref: 00007FF73166381F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strncpy
                                          • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                                          • API String ID: 3301158039-3625861382
                                          • Opcode ID: 1ff2dce18e257e774129ac5e1c4637ee97025658beddbabc7998c3cc9fc065be
                                          • Instruction ID: 4eb25bfd4c616e6508af23668a703f9b855d4c14ae5b8c44e537455a683cb6d6
                                          • Opcode Fuzzy Hash: 1ff2dce18e257e774129ac5e1c4637ee97025658beddbabc7998c3cc9fc065be
                                          • Instruction Fuzzy Hash: 8211E761E0C693F0FB18A7D9E5542B897B2EF85740FC98035C61E06785CEECE481E220
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                          • String ID:
                                          • API String ID: 469868127-0
                                          • Opcode ID: 059db627849e2e226bb10930d3277cc3b65913901b4ea62fb5c050b9fbc6cc93
                                          • Instruction ID: 9b23b5f46ef20ccd8a4457fb6903bb5c4a1b5ee773d21fa05a50fa9b04a2d75a
                                          • Opcode Fuzzy Hash: 059db627849e2e226bb10930d3277cc3b65913901b4ea62fb5c050b9fbc6cc93
                                          • Instruction Fuzzy Hash: 4611EC36B04A51D6E710EF92E180229B371FB89B91F544135DF8E03B44CFB9E4A5D710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: FALSE$TRUE
                                          • API String ID: 1865132094-1412513891
                                          • Opcode ID: f1a68c5537dbf8c23db2369df14daea5e9d1e5d646dd923bf12f28056a1744cf
                                          • Instruction ID: 6097c0fafe1c7708eabfdf0351a7a4d76534f8ef31218daaf2a1c7e85132c235
                                          • Opcode Fuzzy Hash: f1a68c5537dbf8c23db2369df14daea5e9d1e5d646dd923bf12f28056a1744cf
                                          • Instruction Fuzzy Hash: EE41F9E6F0A7B5E4FF119AA59414278A7E3AB05794FA44536CE4F073C0EEADE441E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _time64$ErrorLast
                                          • String ID: TFTP response timeout
                                          • API String ID: 3339832089-3820788777
                                          • Opcode ID: 1741c2b3a3ef580584a93da6dde3718fcfcede63748f4220ffc3383607af794c
                                          • Instruction ID: 35fbf952446036a41aad3c4949a76a266da92632a89fd9afe152ef34abe54901
                                          • Opcode Fuzzy Hash: 1741c2b3a3ef580584a93da6dde3718fcfcede63748f4220ffc3383607af794c
                                          • Instruction Fuzzy Hash: 3441C432F09A51D2EB60AFA5D8002B9A792EB49BA4F808235DE2D477D5DFBCD401D760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: fwrite
                                          • String ID: ...$...
                                          • API String ID: 3559309478-2253869979
                                          • Opcode ID: 8108603736209bb098f9a9e31943748ac7ad89f18f806ab5dd93ef5962823fb4
                                          • Instruction ID: 4dd0ff68c3babfaddbaa64e70931bc620af584366cf61cdc89407e583cfc430f
                                          • Opcode Fuzzy Hash: 8108603736209bb098f9a9e31943748ac7ad89f18f806ab5dd93ef5962823fb4
                                          • Instruction Fuzzy Hash: 7731C231E18A91E1FB64EB51E4147F9A3A2FB84B94F848231CA5E03794CFBDE055D790
                                          APIs
                                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7316844A9), ref: 00007FF731684AFD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: realloc
                                          • String ID: Failed to alloc memory for big header!$Rejected %zu bytes header (max is %d)!
                                          • API String ID: 471065373-1365219457
                                          • Opcode ID: 4c44fc8c2847de9bbbd9c680b45044438693ee4e238ce7601bbe6f48ff3c2ebb
                                          • Instruction ID: 47c9818eda606677ad862e58b79bafe8cb183d09b47ce3f94241e6df091a82b5
                                          • Opcode Fuzzy Hash: 4c44fc8c2847de9bbbd9c680b45044438693ee4e238ce7601bbe6f48ff3c2ebb
                                          • Instruction Fuzzy Hash: 38217C32B18A94D6EB44EB66E4802ADA362FB49BC4F444036EF5D03B59DF7CD5A2D340
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$_strdup
                                          • String ID: :
                                          • API String ID: 2653869212-336475711
                                          • Opcode ID: 18a252802a4c2c691ca69fad7a51561af876a6c654b711007ac977ba48ab96a6
                                          • Instruction ID: add443c51ad11518767f502caa69a58216a33ef4c6045687cd8e5d26893147db
                                          • Opcode Fuzzy Hash: 18a252802a4c2c691ca69fad7a51561af876a6c654b711007ac977ba48ab96a6
                                          • Instruction Fuzzy Hash: E9217F22A09B96D6EB61AF55A5003A9B3B1FB84B94F844135CF9D43784EF7CD410D720
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %s%s$LIST "%s" *
                                          • API String ID: 0-1744359683
                                          • Opcode ID: 24136d207ae102c5ea7ef9a2db057a650322fa4e370001de2a68ccbc906af9fe
                                          • Instruction ID: ff8f7865e689fcff4b4a0184b8a6f4be4d56d92aa1a4d3b6969efac5dcde31c7
                                          • Opcode Fuzzy Hash: 24136d207ae102c5ea7ef9a2db057a650322fa4e370001de2a68ccbc906af9fe
                                          • Instruction Fuzzy Hash: 14119D22F18662E1EB14EB96E4801BCA3A2BB48BC4F844531DE0E17B51DFACE551D350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfreemalloc
                                          • String ID: Start Date: %s$Start Date
                                          • API String ID: 3985033223-2389359183
                                          • Opcode ID: c3b8626d892d8b0656b9452877c82dfeb00f746fadc55ff2821d253b1793e36a
                                          • Instruction ID: 33ac441c04213a5f018ca8a4eb83e86b06d3457451c7283363b12f8e31b56f9b
                                          • Opcode Fuzzy Hash: c3b8626d892d8b0656b9452877c82dfeb00f746fadc55ff2821d253b1793e36a
                                          • Instruction Fuzzy Hash: 5E01D491E0C6A2E1EB10AB9154241B9B7A7BF05785FC89871CB4A061A5EFBDA504E331
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strchr$mallocmemcpy
                                          • String ID:
                                          • API String ID: 320687583-0
                                          • Opcode ID: 0199e1b4cc222dfa996a3a7a7b04aa24882031ec62ccacbaa9e0b16e1c7dd0e8
                                          • Instruction ID: 97583925f32d8ab06565548cee2b3f4a5a4404b04ef648b36bab2878f843b2bb
                                          • Opcode Fuzzy Hash: 0199e1b4cc222dfa996a3a7a7b04aa24882031ec62ccacbaa9e0b16e1c7dd0e8
                                          • Instruction Fuzzy Hash: 42210911E0D6A2E1EF65AB5291502B9E7D39F48BC4F8C8135DE8E07B86DF6CD501D220
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                          • API String ID: 1294909896-910067264
                                          • Opcode ID: 175b8fed516aa4291b1f46da496cdeccca5547fd3abd262188f1c2dcfda0c20d
                                          • Instruction ID: 232e14b10724c10e6b5674028405ebf4bca44c6c410f51a6f9dfa259f72577c5
                                          • Opcode Fuzzy Hash: 175b8fed516aa4291b1f46da496cdeccca5547fd3abd262188f1c2dcfda0c20d
                                          • Instruction Fuzzy Hash: F451E7E2E086F5E4EB119F95A904179EBA7EB01780FD49037DA8D02754DFBCD441E324
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                                          • API String ID: 1294909896-2632828617
                                          • Opcode ID: 2d567fc7870b19634a2cbb62e17730c428280785e8b13154c206ba112d2b15db
                                          • Instruction ID: edfe095344db24e7f540e01d35c07ca5022b2cee5ffa4bbd609c0afaff51f1a6
                                          • Opcode Fuzzy Hash: 2d567fc7870b19634a2cbb62e17730c428280785e8b13154c206ba112d2b15db
                                          • Instruction Fuzzy Hash: F741D8A1E0C6B1E5EB609F95A4042B9E796FB01B90FD58431CE8D03755CFBCE446E320
                                          APIs
                                          • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73165D1D8), ref: 00007FF73165D69E
                                          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73165D1D8), ref: 00007FF73165D6CC
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73165D1D8), ref: 00007FF73165D735
                                            • Part of subcall function 00007FF7316AFB48: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF73165442E,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF731651B89), ref: 00007FF7316AFB62
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF73165D742
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                          • String ID:
                                          • API String ID: 2942768764-0
                                          • Opcode ID: e313eb31bb9c36e5e7182acaf55df2307521fd66a11ad611a39392af3f5df12e
                                          • Instruction ID: faa8ab40cd29f4fcf76fbe57e2c50472a05343e5139054bbc86a51e41ba25988
                                          • Opcode Fuzzy Hash: e313eb31bb9c36e5e7182acaf55df2307521fd66a11ad611a39392af3f5df12e
                                          • Instruction Fuzzy Hash: 9341F6B2F05AA1E5EF14EFA5D41427DA362BB44BA0F948631CB6D037C5DF6CE0519320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1775671525-0
                                          • Opcode ID: f57466c40c565452301723b37a3341091d7968150f5e4cfc42a57b952f741096
                                          • Instruction ID: effcc0d9423250ea155eea52ceef043f3df1c433315eebad83e894b4aa3aaccf
                                          • Opcode Fuzzy Hash: f57466c40c565452301723b37a3341091d7968150f5e4cfc42a57b952f741096
                                          • Instruction Fuzzy Hash: 9031D521E19F51D1EF20EB52A54026AA3A2EB04BE0F954639DEAD077C5DF7CE0819390
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF73168D31B), ref: 00007FF7316AB1CE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s
                                          • API String ID: 1294909896-3043279178
                                          • Opcode ID: 352856b1eae17858e1b077f2ee5fd32b90ad45b0c77a443594dcac492bc27cdb
                                          • Instruction ID: 4352fdb43dbf1e9dbad295bce03148f84d9f4ea5c658b9b41d9ccda503b3cb7f
                                          • Opcode Fuzzy Hash: 352856b1eae17858e1b077f2ee5fd32b90ad45b0c77a443594dcac492bc27cdb
                                          • Instruction Fuzzy Hash: 3341BE32A18B91D2EB50EB55B4401AEB3A1FB85BA0F444139DF9E03BA1DF7CE491D310
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF73168EB60,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF7316AB603
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7316AB68C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s
                                          • API String ID: 1294909896-3043279178
                                          • Opcode ID: ab711b374cce4f61b9c1c04fbc7c9437e1ddaaeae5eb021ca5eae824c80ea905
                                          • Instruction ID: 5bc08b33d449f7d7367690d31dc6bcdb5a52ca3c7c601555b234f2ce9a51284e
                                          • Opcode Fuzzy Hash: ab711b374cce4f61b9c1c04fbc7c9437e1ddaaeae5eb021ca5eae824c80ea905
                                          • Instruction Fuzzy Hash: 9441A372A18B91D2EB11EB6AB4401AAF3A1FB45B94F444134DF8E03BA1DF7CE091D710
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 1775671525-0
                                          • Opcode ID: b48b9fb4136db3c1fc78f3a36e8555c0a0b74b4d90e57a5bfe19da46bb14fc38
                                          • Instruction ID: bb14d9fa975ec2dd5c3943e2f2efda76e123b58916ecd98de49d6a80542cb164
                                          • Opcode Fuzzy Hash: b48b9fb4136db3c1fc78f3a36e8555c0a0b74b4d90e57a5bfe19da46bb14fc38
                                          • Instruction Fuzzy Hash: 52311062F09B65E5EF10AF52A50036CA3A2EB04BD4F888635DE6D077C5CFBDE051A320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                          • API String ID: 1294909896-918878739
                                          • Opcode ID: 6c645be8e5b1f5d6d945d0e325e0d0960cc81af97aaf99509a56fb7c7365217d
                                          • Instruction ID: 6f9fec56b86f7bd87f08a5ee02580aa656102db8fac650ed9fbcc1fd51e8ff3b
                                          • Opcode Fuzzy Hash: 6c645be8e5b1f5d6d945d0e325e0d0960cc81af97aaf99509a56fb7c7365217d
                                          • Instruction Fuzzy Hash: 1E31E2A6E09AE6E4EB11DFA5D9041B9E7A3FB44B84FC45032DA4E03694DFBCE541D320
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF731696B44
                                            • Part of subcall function 00007FF731676430: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF731676555
                                            • Part of subcall function 00007FF731676430: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF731676570
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: fwrite$free
                                          • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                                          • API String ID: 3468156532-1133524294
                                          • Opcode ID: 85b19cdabee01aa8169689ccd1cff8ffe183e717a987165f202e7447560ac795
                                          • Instruction ID: 6204d959623adc527543807aba72022319e3f1da5be706cd5996e4f37085f728
                                          • Opcode Fuzzy Hash: 85b19cdabee01aa8169689ccd1cff8ffe183e717a987165f202e7447560ac795
                                          • Instruction Fuzzy Hash: 8D417436E08B91D5EB20EF66E4441ADA362EF84B85F854036DE4E4B385DFBCE441D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                          • API String ID: 1294909896-1153420294
                                          • Opcode ID: f3e28e3f91499ebf32120d26d22ad79634019ec5771c8a1804892b3f14b7e7f3
                                          • Instruction ID: 58ba465b9baa44dc8a9ed7b2a0caedc4870e95b8cb09c49ab351bc9ba859eca9
                                          • Opcode Fuzzy Hash: f3e28e3f91499ebf32120d26d22ad79634019ec5771c8a1804892b3f14b7e7f3
                                          • Instruction Fuzzy Hash: 9D31A4A2E08BA1E5EB60AFD194406F9B796FB45B84FE44032CE4D03655DFBCD545E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpy
                                          • String ID: TRUE
                                          • API String ID: 3056473165-3412697401
                                          • Opcode ID: acf237168278095a5ad18c07f63b861f156cdde06034463f095727a3b20c5360
                                          • Instruction ID: 4da73736dbeb5a72729a38e4e0fd3f3fb917e0368a6acfda79cb267fc18afdee
                                          • Opcode Fuzzy Hash: acf237168278095a5ad18c07f63b861f156cdde06034463f095727a3b20c5360
                                          • Instruction Fuzzy Hash: 582127A9F096A290EF02DA9699103759763AB44BE4F944132CD1E037C4DEBCD081D310
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF731670BD2
                                          • memcpy.VCRUNTIME140 ref: 00007FF731670C0D
                                            • Part of subcall function 00007FF731665F60: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF731665F75
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF731670C42
                                            • Part of subcall function 00007FF731666070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731670670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316624A1), ref: 00007FF731666097
                                            • Part of subcall function 00007FF731666070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731670670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316624A1), ref: 00007FF7316660A3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$malloc$memcpy
                                          • String ID: %s:
                                          • API String ID: 901724546-64597662
                                          • Opcode ID: 7873c5d0c5948a78ce4733ab3e2681e264897296f48dbc720c30851681a58c1d
                                          • Instruction ID: d7dbded6789c1cbcf825e658d28ee0b967ad868eed5747c9d1532174317d6f8a
                                          • Opcode Fuzzy Hash: 7873c5d0c5948a78ce4733ab3e2681e264897296f48dbc720c30851681a58c1d
                                          • Instruction Fuzzy Hash: 6921E422A08BA5E1DB10DF52E9501AAB3A5FB44FE8F880231EE5D07395DF7CD545C360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpy
                                          • String ID: %s: %s
                                          • API String ID: 3056473165-1451338302
                                          • Opcode ID: b82b03f04f390be818fbb6db6f418002d24d1c316bb8b4d2d42c20403c707f8a
                                          • Instruction ID: 0483e296ccc3ece69c80f29337e7a4937888624eadd5fa84e5a8bccb73285201
                                          • Opcode Fuzzy Hash: b82b03f04f390be818fbb6db6f418002d24d1c316bb8b4d2d42c20403c707f8a
                                          • Instruction Fuzzy Hash: 8421D091E087A2D1EF60AA92A4103B6E352BF45BE4F984132CE5D07BD5DFACE0459310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Start Date: %s$%s%lx$Start Date
                                          • API String ID: 1294909896-3519493645
                                          • Opcode ID: 685cbd80c030dd2c6b8e0356103f785b027d0646e53f3bb5b06b1b57ae0b9610
                                          • Instruction ID: 435cc6cf7f217e1fe70e32ec4a97e9230c0fd64d7d9776d9e3deb498980e1f4f
                                          • Opcode Fuzzy Hash: 685cbd80c030dd2c6b8e0356103f785b027d0646e53f3bb5b06b1b57ae0b9610
                                          • Instruction Fuzzy Hash: 6C21C791F0C2A2E4EF10ABE594142B9A793AF05784FC49871CB0E46695DEAEE504E330
                                          APIs
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7316798E8), ref: 00007FF731679A35
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF7316798E8), ref: 00007FF731679A4F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64
                                          • API String ID: 1114863663-3980630743
                                          • Opcode ID: ac4d088b5b4cb0edd8e0ae16900b4eb76ded520f9b3fbbc3f0ac6101dcccb983
                                          • Instruction ID: 87279f3e428a060ee6e72b4a8cd5f59231c41a822903eef123e788dbceb61195
                                          • Opcode Fuzzy Hash: ac4d088b5b4cb0edd8e0ae16900b4eb76ded520f9b3fbbc3f0ac6101dcccb983
                                          • Instruction Fuzzy Hash: 40210132E0D57391EF21AB61D4506B8BBE69B05B48F899130CA4A42294CFACE600E7B0
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7316A47D9,00000000,?,?,00007FF7316A3D96), ref: 00007FF7316A3A99
                                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7316A47D9,00000000,?,?,00007FF7316A3D96), ref: 00007FF7316A3AD0
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7316A47D9,00000000,?,?,00007FF7316A3D96), ref: 00007FF7316A3AE2
                                          • memcpy.VCRUNTIME140(?,?,?,00007FF7316A47D9,00000000,?,?,00007FF7316A3D96), ref: 00007FF7316A3B0A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: freemallocmemcpyrealloc
                                          • String ID:
                                          • API String ID: 3881842442-0
                                          • Opcode ID: f977fe82b170d04b32b457185a74ddf0502a1c6528f5c0329a6fcf7a66f72f91
                                          • Instruction ID: 13b3c9b327f28a5f1c3e050d34db5e2f637c84abfcb4b57ece070f09bee497d8
                                          • Opcode Fuzzy Hash: f977fe82b170d04b32b457185a74ddf0502a1c6528f5c0329a6fcf7a66f72f91
                                          • Instruction Fuzzy Hash: 91216D66A09B91C2DB44CF56E090229B3A1FB88FC8B888035DF5E47759DF78D491C710
                                          APIs
                                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF731670DF9,?,?,?,?,00007FF73167019B), ref: 00007FF73168C8A8
                                          • GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF731670DF9,?,?,?,?,00007FF73167019B), ref: 00007FF73168C8CE
                                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF731670DF9,?,?,?,?,00007FF73167019B), ref: 00007FF73168C8EF
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF731670DF9,?,?,?,?,00007FF73167019B), ref: 00007FF73168C900
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: realloc$EnvironmentVariablefree
                                          • String ID:
                                          • API String ID: 2828309815-0
                                          • Opcode ID: 5919ed26601e5a1983441ff13bfa5010129d55b5ebbfabf283f15f6243ff0c7b
                                          • Instruction ID: 6d3906cc05542d7ced651aa334fa034248f7bbb07c1e69e61ed5f172e159a954
                                          • Opcode Fuzzy Hash: 5919ed26601e5a1983441ff13bfa5010129d55b5ebbfabf283f15f6243ff0c7b
                                          • Instruction Fuzzy Hash: 1111A721F09752D1EB60AB52658027AE3D6BB48BC0F440075DE8D43F44DEBCE440A754
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$freemalloc
                                          • String ID:
                                          • API String ID: 2605342592-0
                                          • Opcode ID: 691b6e5f2e5f0e80202c136731c855dd7b1e8b803b645f1d4182ee7e7330f53a
                                          • Instruction ID: 5b2f1759362846a0e8877c76d36b902b14192097ec149f58975b45b3fa7e1f6f
                                          • Opcode Fuzzy Hash: 691b6e5f2e5f0e80202c136731c855dd7b1e8b803b645f1d4182ee7e7330f53a
                                          • Instruction Fuzzy Hash: 3C118B35F09B91D6E714AFA6B800169B7A5FF88B80B884038DF8A43B15DFB8E611D750
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: Proxy-Connection: Keep-Alive
                                          • API String ID: 1294909896-2835282938
                                          • Opcode ID: 940235ba96ecd116c11ce8e31b952d266a1eb65064ca4e9b5e6f911fc8cbd765
                                          • Instruction ID: b72e2882c149d3696f394279e7e1003c3de6fdf3437188f76012cf4f4bcea909
                                          • Opcode Fuzzy Hash: 940235ba96ecd116c11ce8e31b952d266a1eb65064ca4e9b5e6f911fc8cbd765
                                          • Instruction Fuzzy Hash: 2201C462F04651D2FB156B95F4503A9A3A1AF48BF0F444234DEA9077D0DFBCD885E360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$CriticalDeleteSectionclosesocket
                                          • String ID:
                                          • API String ID: 3086658127-0
                                          • Opcode ID: 2c8760eac0806ac4aa8723237bf3783410c6d585aa1a93ed934bdf19cfdcb40a
                                          • Instruction ID: 1769015668984d7c0060917b025545e09a40d7363950f3e2f835489e24b4334a
                                          • Opcode Fuzzy Hash: 2c8760eac0806ac4aa8723237bf3783410c6d585aa1a93ed934bdf19cfdcb40a
                                          • Instruction Fuzzy Hash: 83015212E18A92C3E714EF75C8601786321FFE9F1CB416325DE6E011A59FA8E5D0D310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64
                                          • API String ID: 1114863663-3980630743
                                          • Opcode ID: 89454fb526bf0e432c533c576cda4cd321a1537bb584723e0669b3bfcf89d262
                                          • Instruction ID: 362e6488b7950786ba406c1a8ab61c99167abfc9ff600df3a83eb230ad33c644
                                          • Opcode Fuzzy Hash: 89454fb526bf0e432c533c576cda4cd321a1537bb584723e0669b3bfcf89d262
                                          • Instruction Fuzzy Hash: EBF0E921F1E563D0EF15BB929850AB5A7E69F49B94F885035C91A816D4CE6CE200E370
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64
                                          • API String ID: 1114863663-3980630743
                                          • Opcode ID: 559271b8de5394c04adcda180b7cde2114d229b2169a1a980bd2519a6ba06669
                                          • Instruction ID: 96afedeefe66d0379d3f157f2620ebc9bbecf879c4e9ad12c87b39b9873c67b7
                                          • Opcode Fuzzy Hash: 559271b8de5394c04adcda180b7cde2114d229b2169a1a980bd2519a6ba06669
                                          • Instruction Fuzzy Hash: 4EF0E921F1A563D0EF15BB929850AB5A7E69F49B94F885035C91A816D4CE6CE200E370
                                          APIs
                                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF731676EB6), ref: 00007FF7316A1B14
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _errno
                                          • String ID: %lx
                                          • API String ID: 2918714741-1448181948
                                          • Opcode ID: 80c34f630e15ed1a23192204764717f9e83153c5307471567d3b3e133f06cf10
                                          • Instruction ID: f716d450fc71a91893a3891d8c7a9acb92c111993f9e7cdcaa4529900f91937c
                                          • Opcode Fuzzy Hash: 80c34f630e15ed1a23192204764717f9e83153c5307471567d3b3e133f06cf10
                                          • Instruction Fuzzy Hash: AE817CA2E0C1F1D5E768AB65945027DFBD2FB85790F544236EAAE422C0DEBCD841DB20
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF73168D203), ref: 00007FF73168D8F2
                                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF73168D203), ref: 00007FF73168D943
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupmalloc
                                          • String ID: (){ %*]
                                          • API String ID: 3515966317-731572209
                                          • Opcode ID: bdd1c43b3494f96c2aad5221c01ac2cadb3a7930ebfd7d110b4e8fbb3137c04d
                                          • Instruction ID: 00e13ec2974c05602e7a5589b65f211b060c32d40ca9d19337a947e64feefd91
                                          • Opcode Fuzzy Hash: bdd1c43b3494f96c2aad5221c01ac2cadb3a7930ebfd7d110b4e8fbb3137c04d
                                          • Instruction Fuzzy Hash: 59316B13D0C6A5E4FF216BA16840378ABD39F56768FC94131DA9E03BC3CE6DA405E231
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: mallocrealloc
                                          • String ID:
                                          • API String ID: 948496778-3916222277
                                          • Opcode ID: a2ff660f8911486f5e09a836224ee4278f170a739adc915ed60c233465fbcead
                                          • Instruction ID: 078960939e60e341d28d71de24cc875a8ebf45802cefb1e0b4da12cd46a45bb0
                                          • Opcode Fuzzy Hash: a2ff660f8911486f5e09a836224ee4278f170a739adc915ed60c233465fbcead
                                          • Instruction Fuzzy Hash: FE11D372A09F91C1EB449F56E100268B3A1FB08FE4F844235EE9E07798EF78D490C350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: getsockoptsetsockopt
                                          • String ID: @
                                          • API String ID: 194641219-2726393805
                                          • Opcode ID: 2a4013e67eaf20f38f0cc8df687051bb739da5ee28b32884e97c5335b44393c9
                                          • Instruction ID: 92787325945114843c1f1aa011a1a78c751b1f7fb35a6d3f63da4c3fb0439302
                                          • Opcode Fuzzy Hash: 2a4013e67eaf20f38f0cc8df687051bb739da5ee28b32884e97c5335b44393c9
                                          • Instruction Fuzzy Hash: 20119472E081A2D6F720EF91E404665F7A2FB85344F944034DA89466E4DFFDE589DB20
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfree
                                          • String ID: TRUE
                                          • API String ID: 1865132094-3412697401
                                          • Opcode ID: be029bd6a1667cbe2f6cba47e9e4bccf039cfda38148d3da651511633063af34
                                          • Instruction ID: b2f3f52a9d66fed61a4177c0dd0fc71bf69290fb1e003650acbc579a753b2054
                                          • Opcode Fuzzy Hash: be029bd6a1667cbe2f6cba47e9e4bccf039cfda38148d3da651511633063af34
                                          • Instruction Fuzzy Hash: 1B019BAAF096A5E4EB02DB95D904279A7A3BB04BD4F844436CE4F07394DEBCD081D320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: _strdupfreemalloc
                                          • String ID: %s: %s
                                          • API String ID: 3985033223-1451338302
                                          • Opcode ID: e8e740b37246a4764d6c3ce1eb164d90d97fc3f94e3ec7d35f47fa24bbdef41c
                                          • Instruction ID: 2601ec9f655e4b3694345182e84f49d27199a092e5336cdc7fbeebd5b69eee97
                                          • Opcode Fuzzy Hash: e8e740b37246a4764d6c3ce1eb164d90d97fc3f94e3ec7d35f47fa24bbdef41c
                                          • Instruction Fuzzy Hash: CCF04451E0C6A1E1EB61AB92A8007F6D3526F45BC4FD84431CE5D07756DFACD146E320
                                          APIs
                                            • Part of subcall function 00007FF731666070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731670670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316624A1), ref: 00007FF731666097
                                            • Part of subcall function 00007FF731666070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731670670,?,?,?,?,?,?,?,?,?,?,00000000,00007FF7316624A1), ref: 00007FF7316660A3
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73166C576
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73166C586
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF73166C594
                                          • memset.VCRUNTIME140 ref: 00007FF73166C5CF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free$memset
                                          • String ID:
                                          • API String ID: 2717317152-0
                                          • Opcode ID: eaa7c906f893e631f80e24afcd7594a9ff7dc79e7c09c795ab08258e7351f13f
                                          • Instruction ID: ac7f6d5fb37dcf26fe89977564391171b16ef1cfa5ef22aa87117d0dfbc4ba63
                                          • Opcode Fuzzy Hash: eaa7c906f893e631f80e24afcd7594a9ff7dc79e7c09c795ab08258e7351f13f
                                          • Instruction Fuzzy Hash: 7621F832E18B91E3E314DB22D6903A8A370FB99744F519225EB9943A11DFB4F1F1D350
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 4dc756646f465d19538aa0d0ebc42b3fd6a2a7856d82e2757587a04e2cbd417f
                                          • Instruction ID: 83a2417fb19d5ae5166cda5d858ad0b9726c521f9daa605fd02fb006590fac9b
                                          • Opcode Fuzzy Hash: 4dc756646f465d19538aa0d0ebc42b3fd6a2a7856d82e2757587a04e2cbd417f
                                          • Instruction Fuzzy Hash: 7D112B76E08A51D2EB54AF65E59033CA3A6FF84F88F944435CA8E02764CF7CD850E320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: c78045512bd42d14feec1b2225692ea8de54b7c52051612741a62dcf1c59137d
                                          • Instruction ID: d9755da8ac0a1acb05a26a99eaba8715776782c478f991c48e0d0da4499f7172
                                          • Opcode Fuzzy Hash: c78045512bd42d14feec1b2225692ea8de54b7c52051612741a62dcf1c59137d
                                          • Instruction Fuzzy Hash: 78112836A04B50D6D7509F65E580368B3A4F788F88F88403ADE8E57328CF38E895E760
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316A127E), ref: 00007FF7316A51A6
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316A127E), ref: 00007FF7316A51C7
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316A127E), ref: 00007FF7316A51E2
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF7316A127E), ref: 00007FF7316A51F0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: a9be8488605f3ddb21fcd3ebe878c33e1fc0cdb249d0500abf06e90a83e44b1c
                                          • Instruction ID: a2284bd38ff9aeca39aa181002742633add897549a00892a2bb90470706445bf
                                          • Opcode Fuzzy Hash: a9be8488605f3ddb21fcd3ebe878c33e1fc0cdb249d0500abf06e90a83e44b1c
                                          • Instruction Fuzzy Hash: 2C11D376A04B11D2DB04EF66E99013CB3BAFB94F887500026CA9E43768CF78D850E390
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731678D45,?,?,00000000,00007FF731671A01,?,?,00000000,00007FF731671F35), ref: 00007FF7316A2B30
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731678D45,?,?,00000000,00007FF731671A01,?,?,00000000,00007FF731671F35), ref: 00007FF7316A2B56
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731678D45,?,?,00000000,00007FF731671A01,?,?,00000000,00007FF731671F35), ref: 00007FF7316A2B64
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF731678D45,?,?,00000000,00007FF731671A01,?,?,00000000,00007FF731671F35), ref: 00007FF7316A2B72
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.3964985108.00007FF731651000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF731650000, based on PE: true
                                          • Associated: 00000000.00000002.3964970404.00007FF731650000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965025998.00007FF7316B2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965045023.00007FF7316C9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.3965058606.00007FF7316CF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff731650000_AimPrivStoreAtt117.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 6c82a7f5d3641403fc023f898a11a514918f0a9b425e138897a8f8dbfb6ab1b0
                                          • Instruction ID: b768c148e9d164b0e12c1f5688d7bd67d2f6b840fbde6fcba437bb18b0dc1966
                                          • Opcode Fuzzy Hash: 6c82a7f5d3641403fc023f898a11a514918f0a9b425e138897a8f8dbfb6ab1b0
                                          • Instruction Fuzzy Hash: 29F0E776A04B01D2DB14AF62E994128B3B5FF98F88B514535CEAE43768CF78C864E360